• @Alk
    link
    English
    24012 days ago

    This is non-news, like all tech companies, they are bound by law to do this. It happens more than 6000 times per year for Proton. However, this user just had bad opsec. Proton emails are all encrypted and cannot be read unless law enforcement gets your password, which Proton does not have access to. Even if Proton hands over all data.

    • @[email protected]
      link
      fedilink
      English
      3412 days ago

      Proton doesn’t get a free ride here.

      They are bound Swiss law and should not be retaining any identifying information.

      If they are going to give up everything they have on you when the feds come knocking, they shouldn’t keep anything or they shouldn’t market themselves as private and secure .

      • @QuaternionsRock
        link
        English
        6512 days ago

        Upon receiving the recovery email from Proton Mail, Spanish authorities further requested Apple to provide additional details linked to that email, leading to the identification of the individual.

        The user specifically requested that Proton retain this PII for account recovery.

        Speaking of which, how do they implement recovery emails? Do they save your private keys only if account recovery is enabled?

      • @asdfasdfasdf
        link
        English
        4312 days ago

        No, Proton does get a free ride here. The information they provided was the recovery email address, which they were required to do by law.

        The only data they don’t encrypt (can see) is that which they absolutely need to store unencrypted. If they encrypt your recovery email address, then… they can’t send you any recovery emails to it since they can’t see it.

        This is 100% the fault of the user.

        All any service can do is give you the best tools available to maintain your privacy, but they can’t stop you from shooting yourself in the foot.

        Firefox is also great for privacy, but if I use it to fill out some info on some phishing sites then that’s not a them problem.

        • @NightAuthor
          link
          English
          111 days ago

          Don’t forget that most of your email arrives at their servers unencrypted, supposedly they immediately encrypt it, but you have to take their word on that. And there’s always the possibility that they are forced or just decide to make a copy of emails as they’re encrypting for your inbox.

      • Encrypt-Keeper
        link
        English
        2312 days ago

        They are bound by Swiss Law, so they have to comply with lawful orders. They are very up front about this even within their marketing that pertains to protection from other government authorities. They are also very good at explaining exactly what is protected and what inherently isn’t. A recovery email isn’t. In order for a recovery email to work by its very nature, Proton has to have a record of it. But at the same time they don’t require you to set one. Proton hasn’t done anything that they’ve promised not to. There comes a point where you need to put a little effort into understanding the product you’re using.

        • @[email protected]
          link
          fedilink
          English
          -812 days ago

          Don’t tell me, tell the guy they gave up . ?

          They market to activists and people concerned with the business of protest, not Swiss law experts - and are very much are not up front about what could happen if they are contact by LE. Of course They don’t hide it, but you won’t find it on the front page, where they trumpet about Swiss privacy… You and I know the detail, many users may not.

          At the end of the day, they attract a lot of activists and protesters to their service, with the offer of “safe and secure email. “ .

          They hold a database of all them, in a jurisdiction that requires them to comply with legal requests for information.

          They service some 6000 such requests from their database of every year, or around 30 per day.

          You can decide for yourself who this efficient and eminently accessible single source of protesters information helps the most.

          • Encrypt-Keeper
            link
            English
            13
            edit-2
            12 days ago

            This information was just as clearly and easily accessible by the guy who was caught, as it is to you, and to me. If you’re going to commit crimes using a cloud service, the onus is really on you to put in a minimal amount of effort to familiarize yourself with what is protected and what isn’t. Proton is extremely up front about this, and give you all the information you need to be safe.

            Proton never advertised to a single user that all your data is safe from the Swiss government. On the contrary, their main selling point is that the Swiss government is the primary driver of their secure offering. They encrypt what they can using zero trust encryption, and that is left over is secured by the Swiss Governments laws regarding businesses sharing information with foreign governments.

            Proton promised to not comply with direct requests from foreign governments and they haven’t.

            Proton promised to encrypt all the data they feasibly can so it was safe from Proton being able to hand it over to even Swiss authorities and they have.

            Proton is not responsible for user error, nor the willful ignorance of its users.

            • @[email protected]
              link
              fedilink
              English
              -412 days ago

              I’ve never sought to absolve the user of responsibility, but nor am I ready to label him a criminal, which you seem to be able to do.

              At the same time, my words were quite specifically a mild criticism of Proton who are, for reasons I have explain, not entirely the privacy haven it is perceived to be, because of design decisions, where it choose to host its servers and the fact that it has perhaps unknowingly created a highly functional database for law enforcement to query in demand.

              • Encrypt-Keeper
                link
                English
                7
                edit-2
                12 days ago

                I don’t label him anything. He clearly did something that guided his decision to use a more privacy-centric service to avoid the prying eyes of his own government. That could be crimes, civil disobedience, it doesn’t matter.

                Proton deserves no criticism here. It has not created any functional database of any group of people to be queried by anybody, much less law enforcement. Thats complete nonsense with no evidence to back it up.

                It is exactly the privacy haven it appears to be because to this date there has been no reason to believe otherwise. Proton has and continues to offer the protections it’s promised to, without deviation. You just seem to have some kind of personal bone to pick with Proton and are using this story to distort the truth in order to create some kind of anti-proton narrative. I’m no corporate fanboy, but right now we have very few privacy-focused cloud services and for the duration they remain so, I’m not going to tear them down for no reason.

                • @[email protected]
                  link
                  fedilink
                  English
                  -712 days ago

                  Quite the opposite.

                  You’ve been triggered by very mild criticism of Proton and the small but nonetheless important risks associated with using that service.

                  You have accused the user in question of doing crimes - it’s there in your comment for everyone to see. You are unable to accept that a firm that according to their own data, services 6000 requests for information under the Law, is a useful source of information for Law Enforcement.

                  There’s no where for this conversation to go from here.

      • RBG
        link
        fedilink
        English
        2012 days ago

        But if you use their service for free, you do not have to provide any identifying info. As far as I am aware there is no check what you enter is legit and there is no requirement to supply a backup address. So the whole solution for a user to stay anonymous as much as they can with Protonmail is simply to not enter any identifying info.

      • @[email protected]
        link
        fedilink
        English
        1112 days ago

        How do you imagine a recovery email to work, if the provider doesn’t store it, and you lost access to your email by definition in the moment you need it? Recovery email is not needed, you can totally use your account without and proton doesn’t ask for it. It’s a feature where you obviously are disclosing that piece of information and link two accounts. It’s either that or not using that feature.

        • @barsquid
          link
          English
          212 days ago

          It would be cool if they stored a hash of the recovery email, then you type it out during the recovery process and they can send if the hash matches what they got.

          • @[email protected]
            link
            fedilink
            English
            412 days ago

            Sure, but that’s essentially a weaker recovery password (which also is an option in Proton).

            Also that poses quite some challenges for email verification (say, you make a typo when you first write your address), let alone the fact that you won’t see what emails you have configured essentially, which is also bad UX.

            I think it’s much simpler to have recovery email as it is and -if one doesn’t want to associate proton account with any other account- offer other recovery methods, which are available (phrase and phone number).

            • @barsquid
              link
              English
              212 days ago

              I disagree it would be the same as a password. They do use only the hash to validate the entry, that is the same. But then they send recovery to the email instead of proceeding in place. An attacker would have to both know the email and be able to access its inbox. (Or, less likely, generate a hash collision with an address they do control.)

              I think they could do verification if they kept the plaintext address just long enough to send something out.

              The UX of only being able to show hashes would be pretty unfortunate, sure. Maybe that’s a potential compromise if they kept just a first letter, likex***@example.com? Same number of stars in the interface regardless of the real length of email, to attempt to leak less info.

              • @[email protected]
                link
                fedilink
                English
                212 days ago

                But the question is “why”? Email addresses are personal but not secrets, there is no reason to add complexity and worsen the UX for such a feature imo. If anybody is not comfortable with this particular piece of data being associated with their account, they can just use a recovery phrase. It is by no means a necessary feature. What would be the advantage of having a recovery email “obscured”? The advantage of the functionality as-is is that it’s trivial to see what you have configured, it’s trivial to change address etc.

                All of this to add an ineffective amount of privacy. If someone is under investigation, having the hash of the recovery email is in many case sufficient. Asking Apple/Gmail/Microsoft if the hash matches any of their customers covers probably 98% of the population. Billions of emails are also available through breaches, so there is very very high chance that if someone used their personal email, it’s either with one of the big providers, or it has been leaked before. If it’s not, and you used a private provider with no data, then there is no problem even if the address is obtained, as that cannot be further used to de-anonymize you.

                • @barsquid
                  link
                  English
                  012 days ago

                  You’re incorrect. If they salt the hash and use bcrypt it is computationally infeasible for Microsoft to match it against a customer. Or at least expensive enough that Microsoft would insist on warrants and subpoenas.

    • @[email protected]
      link
      fedilink
      English
      2212 days ago

      Proton’s mails are encrypted… between proton accounts. Send an email to a hotmail account and bye-bye encryption. Proton does rely on PGP so you can use that if the recipient supports it.

      • Encrypt-Keeper
        link
        English
        32
        edit-2
        12 days ago

        They mean encrypted at rest. As in, Proton cannot hand over a copy of all your emails to a law enforcement agency, they don’t have access.

        This means law enforcement would have to capture an unencrypted email in transit, or obtains your emails from either recipient individually.

      • @Evotech
        link
        English
        2012 days ago

        Mail stored in proton is encrypted

  • @[email protected]
    link
    fedilink
    English
    15712 days ago

    Upon receiving the recovery email from Proton Mail, Spanish authorities further requested Apple to provide additional details linked to that email, leading to the identification of the individual.

    I like how no ones talking about how Apple (the one its fanboys say is most privacy centric company) was the one that helped identity the individual.

    • @[email protected]
      link
      fedilink
      English
      4912 days ago

      Proton leaked the recovery email. Apple has never given any guarantee about their mail service, which isn’t the case of Proton

      Don’t put any recovery info on Proton

      • Encrypt-Keeper
        link
        English
        2212 days ago

        Proton has never given any guarantee about hiding all account metadata from the Swiss government either.

        • @[email protected]
          link
          fedilink
          English
          -1
          edit-2
          11 days ago

          They’re all like “privacy and freedom”, “take control of your data”…

          They’re saying they’re the best for privacy literally on their website. You might argue that Apple does it too, which is fair, even though everyone knows it’s a lie

          But yea anyways that’s a big flaw, they shouldn’t push customers to enable a feature that effectively deanonymizes them

          • Encrypt-Keeper
            link
            English
            511 days ago

            They’re all like “privacy and freedom”, “take control of your data”…

            That’s correct. And the fella used that freedom and control over his data to deanonymize himself. It isn’t proton’s job to be completely idiot-proof. They tell you what it is they do, and they do it. There are no false claims made.

      • @[email protected]
        link
        fedilink
        English
        1312 days ago

        Don’t put any recovery info on Proton

        About that. I’m still making the transition from gmail and currently most of my mail still goes to gmail first and gets forwarded to Proton through their easy switch process. Surely this is just as up for grabs as a recovery email, right?

        FWIW I’m not likely to be investigated any time soon so I’m not worried either way.

        • @Spedwell
          link
          English
          2012 days ago

          That’s significantly worse privacy-wise, since Google gets a copy of everything.

          A recovery email in this case was used to uncover the identity of the account-holder. Unless you’re using proton mail anonymously (if you’re replacing your personal gmail, then probably not) then you don’t need to consider the recover email as a weakness.

          • @[email protected]
            link
            fedilink
            English
            812 days ago

            That’s significantly worse privacy-wise, since Google gets a copy of everything.

            Obviously, but I still haven’t gone through all the things I’ve ever signed up to and changed my email to the proton one. When I sign up to new stuff I use Proton, this is a necessary step for transition… And one that is likely to stay in place for a very long time since I’m going to keep procrastinating it.

            Unless you’re using proton mail anonymously then you don’t need to consider the recover email as a weakness.

            Excellent point.

  • @Pohl
    link
    English
    14712 days ago

    “Privacy” means two different things depending on the audience. For me privacy means that my information is not being used to advance some organizations commercial interest. For others it means that my information will never be shared with a government.

    Don’t advertise to me

    Or

    Don’t narc on me

    I guess I don’t really expect a company to resist pressure from government agencies on my behalf. Especially if I have been using their service to commit crimes in my country. If you are doing things your government would prefer you didn’t, hire a good lawyer and consult with them about what should be sent via email (spoiler, it’s nothing). The mafia doesn’t send emails, or put anything in writing, if you do crimes, you shouldn’t either.

    • @efstajas
      link
      English
      5012 days ago

      I guess I don’t really expect a company to resist pressure from government agencies on my behalf.

      Personally, I expect them to resist to the extent possible by law. The cops need to follow a lot of rules to make legally binding requests for data. I understand that if they do, there’s not much a company can do other than hand out the info, but if there’s a legal way to deny such a request, I expect the company to pursue it.

      • @PM_Your_Nudes_Please
        link
        English
        1512 days ago

        Pretty much. I’m not expecting a company to spend millions of dollars in court costs and lawyer fees on my behalf. But if it’s clear that the government is overreaching, the company should at least go “hey uhh judge, wtf?”

    • @xenoclast
      link
      English
      8
      edit-2
      12 days ago

      Companies selling data don’t tend to be picky who they sell to. Governments and police buy data all the time.

      The best part is a government can buy data and and can change the rules on what is illegal.

      So, if they decide tomorrow that your innocent behavior is a threat, you’re now a criminal.

      • @[email protected]
        link
        fedilink
        English
        211 days ago

        Not to mention the fact that any new place your data is stored is a honeypot for criminals to try to hack. The more sensitive the data the better. Not every organization has the same protections and they will get your data stolen at some point.

    • @[email protected]
      link
      fedilink
      English
      111 days ago

      Isn’t the old bit about organized crime how they always have a second set of books? After all they do want to be able to track their finances.

  • RBG
    link
    fedilink
    English
    12712 days ago

    They provided the backup e-mail address

    Upon receiving the recovery email from Proton Mail, Spanish authorities further requested Apple to provide additional details linked to that email, leading to the identification of the individual.

    Just in case anyone thinks they decrypted mails and handed them over, nope. I hadn’t thought about that “settings” are not encrypted. Guess if you want to stay anonymous you shouldn’t add your private mail address in there as a backup.

    • @Alk
      link
      English
      5212 days ago

      Yeah. Even if they couldn’t hand over recovery emails, having a personal email as a backup to a “private and sensitive” email account is bad practice.

      • @[email protected]
        link
        fedilink
        English
        712 days ago

        But what do you do if that field is needed? A throwaway address won’t work as it’s easy to recreate. Buy your own domain and run a server?

        • @Alk
          link
          English
          10
          edit-2
          12 days ago

          I don’t believe you need that field with Proton, correct me if I’m wrong. If you do need that field with an email provider, and you need complete opsec, use a different provider.

          • @[email protected]
            link
            fedilink
            English
            512 days ago

            It wasn’t a requirement when I signed up several years ago, and to my knowledge, it’s still not required now. Just as long as you keep your email and password in something like a password manager and don’t fuck it up, you’re fine.

        • /home/pineapplelover
          link
          fedilink
          English
          1012 days ago

          I put the Simplelogin email alias as my backup mail. Which forwards mail to my proton, so I guess it isn’t really a backup. Even more so if you realize I need to sign into simplelogin with my protonmail account and protonmail owns Simplelogin.

        • @[email protected]
          link
          fedilink
          English
          712 days ago

          No, domain names are tied to a person and, even if that person register the domain with fake person details, there will be a digital payment associated with the purchase.

            • @asdfasdfasdf
              link
              English
              612 days ago

              Which also isn’t private. In fact, it’s the opposite of private since it’s a public blockchain.

              • @[email protected]
                link
                fedilink
                English
                1
                edit-2
                12 days ago

                Yes, I am aware. But nonetheless it is far easier to use anonymously/pseudonymously than “traditional” payment. Like, exchanging BTC/LTC from Monero, and buying said Monero via a non-kyc method as well. And whatever protections you want to layer, depending on how much effort you think “they” would spend on you.

        • WaliBoi
          link
          English
          111 days ago

          Proton doesn’t require recovery. But if you want recovery without email addresses, there’re multiple different ways from recovery phases to recovery phone number to even an encrypted recovery file you download onto a local device.

  • @BertramDitore
    link
    English
    5812 days ago

    I don’t know much about the case beyond some very lazy peripheral searching, but it strikes me that Proton’s compliance isn’t an issue, but the requests themselves are totally unjustifiable and based on malicious prosecutions to nab some separatists on ridiculous terrorism charges for their nonviolent action and protests.

    This individual is suspected of being a member of the Mossos d’Esquadra (Catalonia’s police force) and of using their internal knowledge to assist the Democratic Tsunami movement.

    The requests were made under the guise of anti-terrorism laws, despite the primary activities of the Democratic Tsunami involving protests and roadblocks, which raises questions about the proportionality and justification of such measures.

    • @[email protected]
      link
      fedilink
      English
      812 days ago

      The same thing which happened in the past. Antiterrorism laws used for -if I remember correctly - and environmental activist.

    • gian
      link
      fedilink
      English
      212 days ago

      Probably the request to Proton arrived from a Swiss judge, who received a request from Spanish judge, and he evaluated the request and decided that it has merit.

      • @[email protected]
        link
        fedilink
        English
        612 days ago

        It was Interpol that made the request on behalf of the Spanish police according to the article.

  • @TheTimeKnife
    link
    English
    5212 days ago

    Doesn’t look like Proton did anything wrong, they can’t fight these requests and he was caught by identifying information he linked to his account.

      • @[email protected]
        link
        fedilink
        English
        15
        edit-2
        12 days ago

        They do mention it on that page:

        However, if presented with a valid order from a Swiss court involving a case of criminal activity that is against Swiss law, Proton Mail can be compelled to share account metadata (but not message contents or attachments) with law enforcement.

        The only ever claim to encrypt message contents and attachments. And explicitly call out account meta data here as something they can hand over if requested by law enforcement. They also mention they are not good vs targeted and governmental level attacks:

        There are, however, some risks for users facing a strong adversary, such as a government focusing all its resources on a very specific target.

        And explicitly mention they might be compelled to log and give up information like ip adresses:

        if you are breaking Swiss law, a law-abiding company such as Proton Mail can be legally compelled to log your IP address.

      • @[email protected]
        link
        fedilink
        English
        712 days ago

        https://proton.me/legal/law-enforcement

        Here the mention clearly the data mentioned in the privacy policy which in turns clearly states that you MAY provide a recovery account which will be associated with your account. I also think that anybody that should be concerned for this should understand that law enforcement can get ALL the data the company has on you.

      • SaltySalamander
        link
        fedilink
        212 days ago

        It’s basic common sense. I understand that some people simply don’t have any.

  • @flop_leash_973
    link
    English
    50
    edit-2
    12 days ago

    As much as some of us may dislike it when a company does these kinds of things. You can’t really blame them for following the laws of the country that they are headquartered in.

    You can blame them for operating there to begin with in cases like Apple in China, but you could hardly blame them for following the laws of the US where they are headquartered for example.

    If the law of the land where the headquarters is requires them to give up the data they do have to partner nations then they don’t really have much choice in the long run if they want to continue to exist.

    • @[email protected]
      link
      fedilink
      English
      25
      edit-2
      12 days ago

      Plus there isn’t many jurisdictions with stronger privacy law than the swiss. It is unlike they made a bad choice for choosing a headquarters.

      I guess they can operate on the public sea or the arctic, but I imagine the commute will be terrible.

    • @ikidd
      link
      English
      1711 days ago

      “Nobody’s going to jail for you” is pretty much the way to think about any cloud privacy service. They may not keep logs unless they’re required to, but in the end, they will comply to stay in business.

  • @Alpha71
    link
    English
    3612 days ago

    If you use ANYTHING other than face to face meetings when discussing something illegal, you get what you deserve.

  • @Im_old
    link
    English
    30
    edit-2
    12 days ago

    Proton a few years ago disclosed the IP address of the user of a certain mailbox upon request by LEA. That was enough to get the person found and arrested (I don’t remember what the case was about). They HAVE to comply with these requests, but they DON’T need to log/retain those info ETA: and I was wrong, thanks @[email protected] to set me straight. But I think the point still stands. I don’t want to be ALWAYS be tied to a VPN, there are some scenarios where I can’t use a VPN.

    That was the moment I decided to selfhost my email server.

    • @[email protected]
      link
      fedilink
      English
      2812 days ago

      In that particular case they did need to log the ip because they were compelled to do so by a Swiss court.

      That was an opsec failure on the user, if they used a VPN or Tor they would not have been caught.

      • @[email protected]
        link
        fedilink
        English
        712 days ago

        A VPN would’ve only shifted the “blame” unless it was a decent one like IVPN.

        Tor would’ve been much better, especially considering Proton has an .onion address.

        • @[email protected]
          link
          fedilink
          English
          1312 days ago

          Yes, by VPN I meant something decent. Not whatever spyware is top on the Play Store for circumventing geoblocks.

          They were already using Proton Mail, they just were probably thinking that was enough. It would have been if the French had not been able to convince a Swiss court that their request was valid.

      • @NotMyOldRedditName
        link
        English
        212 days ago

        So couldn’t a court compel the VPN to log all IPs and then use some FISA level shit to prevent the VPN from alerting users?

        There’s been a handful of VPN cases taken to court where they have proved, at that moment in time, that they had no logs to hand over. But why not take it that last step and compel the change then?

        • @Alk
          link
          English
          312 days ago

          That’s a good question. I know good vpns like mullvad do not and can not log ips/traffic without changes to their backend, I wonder if they could claim “it’s impossible” or something (clearly bogus, but the argument could be “with our current infrastructure, I.e. We can’t afford to redo our systems to comply”)

          • @NotMyOldRedditName
            link
            English
            212 days ago

            US Gov: Here’s a blank cheque, make it happen.

            But really, the best I can come up with given this is clearly not impossible, is it would destroy the business, but I still think FISA could somehow bypass that given how broad and secret it is.

    • @[email protected]
      link
      fedilink
      English
      1612 days ago

      Posteo doesn’t have to retain IPs and doesn’t, it also doesn’t retain payment info (though if you transfer by wire there’s still a window where a payment can be traced AFAIU).

      They will also absolutely forward any and all traffic for a particular account to law enforcement when given a court order. What’s it with criminals thinking that they can outsource opsec to legitimate businesses. Defending against a state-level actor actively hunting you down, watching closely and pouncing on any and every mistake, is a vastly different beast than making sure google doesn’t know about the butt plug you just bought.

      • @Im_old
        link
        English
        312 days ago

        Agree with you, that’s why I buy my butt plugs (and similar toys) with my gmail account! 😁

        • @Alk
          link
          English
          312 days ago

          “If law enforcement is going to look at my data, I’ll give them something to look at” lmao

    • @pressanykeynow
      link
      English
      512 days ago

      That was the moment I decided to selfhost my email server.

      So now the hosting you use will share the same(or likely much more) data if some government requests it.

      • @Im_old
        link
        English
        111 days ago

        They can get my encrypted drive. My domain name is registered to me so that’s clear it’s my email. But no content.

  • @asdfasdfasdf
    link
    English
    2112 days ago

    What I am find curious about this is if a recovery email would have any weight in court. I can add whatever recovery email I want to an account. It doesn’t have to be mine.

    • @[email protected]
      link
      fedilink
      English
      912 days ago

      I still find it fascinating that you can go to jail because there’s an IP address in a log file somewhere or because of a screenshot of a messenger communication.

        • @[email protected]
          link
          fedilink
          English
          111 days ago

          Definitely. I can just write a log file myself, change the creation date in the filesystem if I have to. There are websites that generate images of DM conversations on a myriad of platforms online. Manipulation of these artifacts is beyond trivial

        • @GamingChairModel
          link
          English
          012 days ago

          Or, for that matter, surveillance video recordings stored on a server somewhere. It’s all just ones and zeros, but some combinations of ones and zeros are quite informative.

          • ferret
            link
            fedilink
            English
            212 days ago

            As technology progresses it is a fact of life that AI will get better at forgery. Perhaps these items will be less permissible in the future.

            • @GamingChairModel
              link
              English
              210 days ago

              Forgery is easy. Putting the forged document into the chain of custody is, and has always been, the hard part.

              If we’re talking about financial records, it’s been trivially easy to create fake bank statements, or fraudulently place an old date on a newly created document, or even forge wet signatures, since before computers were invented. But getting that forged document into the filing cabinet of a bank or an accounting firm is the hard part.

              I can make fake IP logs, sure. I can generate fake videos, I guess (under current tech, that takes a ton of effort and skill to be believable). But getting those logs onto Proton’s servers, without Proton knowing? I don’t know about that.

      • @asdfasdfasdf
        link
        English
        312 days ago

        Because they want to frame someone else.

  • @Sam_Bass
    link
    English
    0
    edit-2
    11 days ago

    Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

    • @[email protected]
      link
      fedilink
      English
      311 days ago

      Well not exactly. They might be reading the metadata of your lower level packages.

      Unless you’re not using encryption, then wth are you even doing?

      • @Sam_Bass
        link
        English
        -1
        edit-2
        11 days ago

        You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai

        • @[email protected]
          link
          fedilink
          English
          511 days ago

          I mean yeah, maybe? Are you one of the people that believes aes or ecc has a backdoor? I think we’d know by now, and I’m certain they don’t have the compute to break aes256.

          • @Sam_Bass
            link
            English
            -111 days ago

            Keep believing that. Just because all those ports are closed to you and me is no guaratee that theyre not being keyed for them

            • @[email protected]
              link
              fedilink
              English
              211 days ago

              Yeah sure. There is no perfect security, but your paranoia is not only impractical but conspiratory.

              • @Sam_Bass
                link
                English
                111 days ago

                Im not paranoid about anything. I merely read what gets published and sift out the trash

  • @taanegl
    link
    English
    -712 days ago

    This is why you sign and encrypt the contents of email. If the recipient doesn’t have the public key, they can’t read the content.

    Allowing a service provider to “handle your keys” is tantamount to letting the fox watch the henhouse.

    Proton doesn’t provide IMAP/SMTP access for free accounts, so you won’t be able to encrypt emails locally.

    This ultimately is the tech version of “trust me bro”. This means you are as secure on Proton as you are on GMail, depending upon how you use the service.

    • @[email protected]
      link
      fedilink
      English
      812 days ago

      This comment is completely off the mark. The information that they disclosed is the recovery email -the same exact thing which happened previously- not any content of any email.

      Also, proton does encryption with PGP, but you can’t encrypt if the other side doesn’t use PGP (which is the case for 99.98% of humans on the planet). If they do, proton supports this including with arbitrary clients using their bridge.

    • @[email protected]
      link
      fedilink
      English
      8
      edit-2
      12 days ago

      If the recipient doesn’t have the public key, they can’t read the content.

      Sir, if your recipients don’t have a public key, you cannot even encrypt the message… That is how asymmetric-key crypto works.

    • SaltySalamander
      link
      fedilink
      512 days ago

      Proton doesn’t provide IMAP/SMTP access for free accounts, so you won’t be able to encrypt emails locally

      Umm, you absolutely can. Use gpg, encrypt the txt, copy the encrypted text into the email. EZPZ.

      • @taanegl
        link
        English
        -312 days ago

        …yes, that’s what I said. But sign them locally. Do not put your private key on Protons service. Sign and distribute pub keys locally.

        Probably should have clarified.

        Also, paid IMAP/SMTP makes Proton a freemium service. Thought I should just underline that.

      • impure9435
        link
        fedilink
        112 days ago

        That’s how a good portion of the Dark web works, and I find it amazing

    • @[email protected]
      link
      fedilink
      English
      212 days ago

      FYI email contents were not decrypted or turned over to police, as far as I know Proton’s E2EE is still as good as whatever system you’re using. Proton doesn’t have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don’t know what the recovery process entails and whether it can restore encrypted emails).