Security? I guess less attack surface. Usability? Well, users will have to learn how to use Thunderbird without Enigmail and imaged learn the new said functionalities. As for the other questions I think they are answered in the blog post you provided. Except the last one.
These new keys probably needs a separate backup since Thunderbird introduces its own keystore. Perhaps for users of gpg command line it would be best to create the key outside of Thunderbird and then import into Thunderbird. That way one does not have two keys - gpg and Thunderbird. In theory.
Thunderbird will probably stop being compatible with Qubes Split GPG at least until/if someone fixes that, if possible.
Thunderbird is unable to bundle GnuPG software, because of incompatible licenses (MPL version 2.0 vs. GPL version 3+).
Great, licensing is responsible for this mess.
Instead of relying on users to obtain and install external software like GnuPG or GPG4Win, we intend to identify and use an alternative, compatible library and distribute it as part of Thunderbird on all supported platforms.
Well, the issue wasn’t Linux distributions where GnuPG is usually installed by default.
Will require updated documentation.
If it wasn’t for the updated torbirdy implementation which we rely on for Whonix (torbirdy deprecated - replacement required), I’d consider swapping e-mail clients. In theory, for Kicksecure an e-mail client with functional gpg integration that can use system gpg could be considered.
Attack surface? Perhaps similar. I don’t see how locally installed gpg would cause any more attack surface than Thunderbird integrated gpg. Not even a theoretic argument can be made until someone compares the code bases.
Might be better for those who only use Thunderbird and don’t mind to have the keys on the same machine (VM) as the signing keys. (No qubes-split-gpg.) But I am sure this will also add confusion as it uses a keystore separate from gpg command line.
Either new, separate keys. That I suppose will always be easy.
And also they mention many times the ability to import existing keys.
As for locally installed, command line gpg. Not much. Key import from gpg format to Thunderbird own format. That’s the most. No other interaction with command line gpg.
It might be wise to wait and see any bugs being ironed out?
That is a good question. I doubt there is much choice for distributions. Unless someone forks Thunderbird, restores the old functionality, which is probably unlikely, I guess everyone has to switch client or go with these changes. A small hope is that support for locally installed gpg is added.
Let’s hope that this change at least doesn’t happen before the upgrade from Debian buster to Debian bullseye. Usually Debian stable doesn’t do major version upgrades in the stable release of Debian. But is firefox-esr package in Debian an exception? By extension, is the thunderbird package also an exception? I didn’t monitor firefox version from firefox-esr closely enough but I think there might be an exception. Which would then mean this change could hit us already during the Debian buster based Whonix 15 release series.
For the record (because I’ve not seen this mentioned before–apologies if this has been posted elsewhere):
I just updated from Thunderbird 68.12.0 to 78.2.2 on a test system (stand-alone installation) since the latter version is made available through Mozilla’s own “release” update channel starting today. Somewhat unexpectedly, I found that it’s impossible to use (i.e. (re-)import) so-called “laptop keys” (aka disposable subkeys with an offline master key).
This effectively rules out production use for me–unless a GPG-compatible backend will be provided soon/by when the old 68.x version of Thunderbird will not receive security fixes anymore addressing newly discovered flaws, it’s time to switch to another application on the desktop, I guess…
Personally, I started to look at lists like https://www.openpgp.org/software/ yesterday to get some ideas. I always kept Mutt around, but as it’s text-based (even though you can bind a key to open a graphical browser to display HTML emails), it might be a hard sell for many users.
Thanks for keeping onto this. I tested 4 different clients in Debian repos today and they all fell short for different reasons.
Sylpheed - Sends messages fine but cannot pull them from server (imap broken)
Claws - wouldn’t encrypt messages - wants a security system selected, but doesn’t show GPG as an option despite installing the required plugin.
Geary - UI too sparse and it turns out GPG support isn’t done yet.
Evolution - very heavy, but the closest TB alternative. Cannot use a key with an email ID different than the one that is signed in. This is a problem for people who migrated email addresses. (Tested that you cannot encrypt an email to yourself using an old key).
Reposted your link as it doesn’t click for some reason:
Great(?) news – it looks like so-called “laptop keys” / offline master keys can still be used, so regarding this isolated issue, it might not be necessary to shop for another email client!
Short summary: After my original bug report #1666124  – which I attributed, but couldn’t assign an “S2” severity (“no existing workaround”) – has been closed as a duplicate of bug report #1654893  (classified as “enhancement” because “[Mozilla’s] bugzilla isn’t deciding based on previous Enigmail features.” ), some kind soul pointed out to me  that there indeed is a workaround which follows exactly the same steps as proposed for smartcards . (Let’s hope that this remains an option in the future!)
On one hand, I’m at odds with the above comment  which basically must mean that supporting the full previous functionality of the old Enigmail add-on for Thunderbird v68 is not a current objective – I commented accordingly because at least I missed this position from previous announcements and would really have liked a longer warning time. On the other hand, I’m not sad that I don’t have to import private keys into the Thunderbird keyring at all (you still need to import the public keys, but that’s an inconvenience at most).
The wiki topic  also mentions the Qubes Split GPG configuration, but I currently have no working test environment at hand to verify this myself.