Email Authentication /Benchmark. The kind of forensic examination that security experts conducted on data purportedly from the laptop com...
But email services such as Google periodically replace their secret or private keys. If they had a routine practice of releasing these old keys — say, a year after they stopped using them — the whole verification system would stop working. Anybody could use the old private keys — now made public — to sign an email, which means verification would be rendered meaningless.
Frauds would be much too easy to be valuable, Green said. All emails would be equally suspect and unverifiable. “The fact that Google signed it means that we can verify the contents even if they’re stolen. And I think that’s a mistake on Google’s part,” Green said. “Signing this email encourages theft.” Google said making such changes have to be done in an industry-wide way.
“We’re working with standards bodies, like IETF, and other email providers to enhance these standards. These changes cannot be performed unilaterally and require an industry shift to ensure that the security of email is not compromised,” said Google spokesperson Kaylin Trychon, referring to the Internet Engineering Task Force, an organization that helps set tech standards.
The other expert who examined the data for The Post, Jake Williams, who conducts forensic analyses for financial services companies and others, disagreed with Green. “I don’t think releasing [DomainKeys Identified Mail] signing keys makes theft any less likely, but it does make what we did far less reliable,” Williams said.