jh1 said:
If anything convinces everyone that Hushmail is on the up and up it should be this:
https://www.hushmail.com/services-downloads?
All of their source code available for download. You can compile that yourself and never use any precompiled code from them. Open Source programs - especially when it comes to security software - is torn apart by security researchers looking for holes and vulnerabilities.
This is getting towards the "crypto community oversight access to Hushs source and implementation of PGP" --
BUT..... to play skeptic and Devils advocate: - >
1) is the source included for the "DLL wrapper on the java applet" - if not, this binary would be a safe haven possibility for a backdoor or a sidedoor
2) same as #1 for the downloadable " Java libraries for communicating with the Hush Key Servers " source included?
3) if ALL source is included, then reviewed, and deemed clean by peer review or Audit Letter, and then the resulting executables compiled from that source code are compared and identical to the executables deployed in the applets downloaded each time you access Hush, then its all good (and the keylogger was the likely failure point)
-> as far as users compiling all the components from all the source and using that instead of what Hush downloads to you, even if technically do'able (not sure) because of all the languages involved and the tech expertice neccessary, this would be practical for about 0.00000001% of the Hushmail users.
I suppose a safe setup would be having a trusted independent crypto organization do the review and compile and then you'd download the executable from their site. sort of an escrow for the trustworthy executables.
But all in all, Occam would say this likely leaves Keylogger as the likely failure point IF the conditions above are met
It all boils down to independent review and then being sure you are using what was independently reviewed.