News: 1743512413

  ARM Give a man a fire and he's warm for a day, but set fire to him and he's warm for the rest of his life (Terry Pratchett, Jingo)

Google makes end-to-end encrypted Gmail easy for all – even Outlook users

(2025/04/01)


Google will soon offer end-to-end encrypted (E2EE) email for all users, even those who do not use Google Workspace, and says it'll do so without imposing any undue stress on IT admins.

It's pitched as an alternative to the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol often used by well-resourced, regulated organizations for encrypted comms.

The protocol hinges on the exchange of certificates, which Google claims is a hassle few other types of organizations have the impetus to implement, despite having a legitimate need for secure emails.

[1]

The way it works is that E2EE emails, powered by client-side encryption, can be sent by enterprise Gmail users to anyone. If sending to another Gmail user, either enterprise or personal, the encrypted mail feature functions without additional configuration. The compose window's UI changes slightly to show a bold blue banner at the top, saying: "New encrypted message."

[2]

[3]

If a Gmail user sends one of these emails to someone using, say, [4]Outlook , they will be sent an email asking them if they want to see an encrypted message. Clicking a link will prompt recipients to re-authenticate their email account, granting temporary access via a restricted Gmail account to view and reply to the encrypted email.

The initial "would you like to see this?" email in this case looks similar to a Docs/Sheets/Pages collaboration link, which may raise phishing concerns. It's also something Google has considered, which is why a warning box above the link urges recipients to only click through if they fully trust the sender.

[5]

In fact, by Google's own admission, the whole process is comparable to sharing a Workspace document with someone from outside your organization. Because IT admins can require recipients to use restricted Gmail to view encrypted messages, it essentially allows admins to control recipients' access using policies and ensure data is not stored on third-party servers.

In cases where E2EE emails are sent to recipients who already have [6]S/MIME configured, there's no real change. Gmail will send an encrypted email to its destination as normal, as it did before today's announcement.

"This capability, requiring minimal efforts for both IT teams and end users, abstracts away the traditional IT complexity and substandard user experiences of existing solutions, while preserving enhanced data sovereignty, privacy, and security controls," says Google's Johney Burke and Julien Duplant in a blog shared with The Register ahead of publication.

[7]Apple's alleged UK encryption battle sparks political and privacy backlash

[8]Apple drags UK government to court over 'backdoor' order

[9]Governments can't seem to stop asking for secret backdoors

[10]Signal will withdraw from Sweden if encryption-busting laws take effect

"We're rolling this out in a phased approach, starting today, in beta, with the ability to send E2EE emails to Gmail users in your own organization. In the coming weeks, users will be able to send E2EE emails to any Gmail inbox, and, later this year, to any email inbox."

The extent to which Gmail users could safeguard their emails before today, beyond Google's TLS encryption in transit, was to enable Confidential Mode, which prohibits recipients from forwarding, copying, printing, or downloading emails, but does not have E2EE. There are also options for emails to expire after a set time frame and to require an SMS passcode to open the message.

[11]

This also works with other email platforms but the actual message content is replaced with a "would you like to see this?" type of email, prompting users to enter a passcode to view it in their browser.

Using Confidential Mode doesn't necessarily mean message contents won't be visible to enterprise admins, however, unlike [12]E2EE , which is kept strictly between sender and receiver.

If Google's announcement sounds familiar, that might be because you have a Microsoft 365 account. E5 customers have had a very similar option available to them and their end users since January in the form of Microsoft Purview Message Encryption.

It functions in the exact same way. Outlook-to-Outlook mail works as normal, just with E2EE, and Outlook to Gmail, Yahoo, or other platforms generally involves sending a link to view an encrypted message.

Before these features were released, security-savvy users could have opted for an encrypted email platform like [13]Proton , Tuda, or one of the others out there, but using it alongside an enterprise account for their everyday work could be tedious.

In addition to E2EE emails, which IT admins can make the default for all end users should they wish, Google launched a number of other features for Gmail, including classification labels that will inform users of each email's sensitivity and how they should be dealt with.

These classification labels will also inform new data loss prevention rules IT admins can set to automatically handle emails based on what labels they have assigned.

Of course, it would not be 2025 without an AI flavor to all these new features. A threat protection model is added to Gmail's existing AI/ML-based spam and [14]phishing detectors so fewer malicious emails slip through the net. ®

Get our [15]Tech Resources



[1] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2Z-wNneBUKLnCSPut5T85ewAAAYc&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0

[2] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z-wNneBUKLnCSPut5T85ewAAAYc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[3] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z-wNneBUKLnCSPut5T85ewAAAYc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[4] https://www.theregister.com/2025/03/25/too_many_outlooks/

[5] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44Z-wNneBUKLnCSPut5T85ewAAAYc&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0

[6] https://www.theregister.com/2018/05/14/smime_pgp_encryption_flaw_emails_vulnerable_to_snooping/

[7] https://www.theregister.com/2025/03/14/apple_uk_encryption_hearing/

[8] https://www.theregister.com/2025/03/05/apple_reportedly_ipt_complaint/

[9] https://www.theregister.com/2025/03/03/opinion_e2ee/

[10] https://www.theregister.com/2025/02/26/signal_will_withdraw_from_sweden/

[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/front&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=3&c=33Z-wNneBUKLnCSPut5T85ewAAAYc&t=ct%3Dns%26unitnum%3D3%26raptor%3Deagle%26pos%3Dmid%26test%3D0

[12] https://www.theregister.com/2025/02/24/apple_adp_replacements_e2ee/

[13] https://www.theregister.com/2024/05/13/infosec_in_brief/

[14] https://forums.theregister.com/forum/all/2024/05/23/google_phishing_tests/

[15] https://whitepapers.theregister.com/



A warning box above the link...

abend0c4

... which will be conspicuously absent from the otherwise identical messages sent by scammers?

If there isn't a TLA backdoor (disclosed or otherwise)

Anonymous Coward

then it'll probably illegal in many jurisdictions.

Hegseth Warning!!

Anonymous Coward

If your end point is compromised (see NSO/Pegasus)......then when you read the message, then so can anyone who dropped Pegasus on your end point!!!

E2EE is only secure while the message is IN TRANSIT.

Applies to Signal and Gmail!!!!

See: https://www.nbcnews.com/tech/security/signal-app-used-hegseth-can-leave-door-open-hackers-rcna197956

This Google "improvement" is simply misdirection aimed at the unwary.

Paul Crawford

But Google can still read all your emails, and by extension so can the US gov?

I'm struggling to see much point in this phishing-like approach.

another way to destroy email

zeigerpuppy

So Google is proposing to require creating a 'tempirary' Gmail email to read an email sent encrypted from Gmail.

So this basically breaks the federated model of email, which of course is the whole aim (as well as hoovering up as much email conyent as possible - they will have the certs afterall).

The proper way to do this is GPG/PGP, which is independent of provider/server architecture.

Sure GPG has it's problems, but at least it has broad cross-compatibility and is not locked into a single vendor's root-of-trust!

I get it that most people don't care, but it really matters for orgs like mine that run independent standards-compliant SMTP/IMAP. Google already makes it hard for such services (for example by categorising 3rd party email servers as spam by default to new destinations on gmail - even when server meets all SPF/DMARC/DKIM requirements and has good reputation).

GMail has been playing these monopolistic games for decades, don't be fooled!

Clicking a link...

Apocalypso - a cheery end to the world

> Clicking a link will prompt recipients to re-authenticate their email account, granting temporary access via a restricted Gmail account to view and reply to the encrypted email.

That sounds like a scammer's charter - please click this link in this email and supply your credentials.

Snake oil

StrangerHereMyself

Encrypted webmail can never be secure or trustworthy. The only way to make it safe is to use it from an email client running on your own machine.

This amounts to snake-oil IMHO and shouldn't be used.

So it's not actually E2EE email then

Stu J

It's sending a notification by email for someone to go and view a website.

No doubt

The Man Who Fell To Earth

Mozilla will come up with something even more obtuse for Thunderbird.

sheesh

Anonymous Coward

Totally can't see any people with sending users emails asking them to authenticate on a spurious link to see an encrypted email at all, not at all going to get jumped on by scammers...

If this is timesharing, give me my share right now.