Feeds

Yahoo! To! Switch! On! Webmail! Crypto! By! Default! Next! Year!

Never mind NSA backdoors, Purple Palace has got your back

Reducing security risks from open source software

Following in the footsteps of Facebook, Google, and Microsoft, Yahoo! has said that it will make SSL encryption the default for all users of its Yahoo! Mail service beginning in January.

The Purple Palace confirmed the plan in an emailed statement to the Washington Post on Monday.

Yahoo! has only offered SSL encryption for its email service since January of this year, well behind other, competing webmail services, and the feature is currently only enabled for users who opt in.

By comparison, Google's Gmail service has made SSL the default since January 2010, and the online ad giant has been gradually switching on the protocol for search and other services ever since.

Microsoft followed suit in 2012 by adding encryption to its own webmail service during the migration of its users from Hotmail to Outlook.com, and Facebook switched on SSL by default for all of its worldwide users in August of this year.

Yahoo! has been criticized for dragging its feet to do the same, even as security researchers have raised concerns that SSL web encryption may actually have been compromised by domestic spying programs, based on documents revealed by NSA leaker Edward Snowden.

In July, Snowden made the eyebrow-raising claim that Microsoft had collaborated with the NSA and the FBI to build a government backdoor into its encrypted Outlook.com service, a charge Redmond has since denied in a letter to the US Attorney General.

More crucially, however, researchers now believe that spy agencies including the NSA and the GCHQ have been actively working to compromise many of the encryption methods used on the web for years, and that deciphering SSL-encrypted communications may present little difficulty for them.

If that is in fact the case, then Yahoo!'s decision to switch on SSL years after most of its competitors is not just very late, but very little.

Still, any move toward increased security at the Purple Palace is welcome. In a statement to the Washington Post, the company said it "takes the security of [its] users very seriously." ®

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
NIST told to grow a pair and kick NSA to the curb
Lrn2crypto, oversight panel tells US govt's algorithm bods
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.