• @[email protected]
    link
    fedilink
    1951 year ago

    Proton are very transparent about what data is and isn’t stored, how data is protected and what (very limited) data may be available in the event of a legal warrant - going through all the proper channels.

    Complying with legal warrants doesnt make the service insecure or not private. It makes it a legal and legitimate company.

    It shouldn’t really be a surprise to any of it’s users.

    • @[email protected]
      link
      fedilink
      English
      561 year ago

      Some people have the idea that a private business is going to break the law or defy their governments requests for them. That’s completely deluded, nobody would ever open willingly expose themself to that kind of risk. No organization is going to let themselves go on trial for $15/month. It seems we have a binary idea of privacy, when the reality is much more complex.

      • @[email protected]
        link
        fedilink
        181 year ago

        It’s the “if you’re not with us, then you’re against us” mentality.

        Huh, I guess these people haven’t been roaming the real world for a long time, they get their ideas from television shows and movies.

    • AnonymousLlama
      link
      fedilink
      101 year ago

      The best take on here. The reasonable one that still highlights how much better it is compared to other mainstream services

    • @[email protected]
      link
      fedilink
      51 year ago

      Remember that time I think it was Signal got a warrant for all data they had on a user and literally all the data they had was account name, creation date, and last login date? That was funny.

    • Treczoks
      link
      fedilink
      41 year ago

      Well, in the US, FISA warrants are technically legal, too.

  • @[email protected]
    link
    fedilink
    English
    39
    edit-2
    1 year ago

    What they can share, IP, Recovery Email, Payment information, for every email: From, To, Subject, Time, Size…

    Basically all of your metadata. If you’re concerned about people knowing your metadata, especially who you’re talking to and when you’re talking to them, don’t use proton. Better not to use email at all.

  • @[email protected]
    link
    fedilink
    131 year ago

    Never forget every email that leaves Protonmail to other email providors are not anymore secure or encrypted as using gmail or others.

    Second no one can certify that incoming emails and meta-data can’t be read and recorded to a ghost mailbox before getting encrypted. you have no control on what happens on their servers

    privacy shouldn’t rely on trust

    • The Hobbyist
      link
      fedilink
      21 year ago

      It’s really difficult if not impossible to be private with services you can’t trust… suppose you were to not trust Tor. How can you prove it to be private if you can’t trust anything they say or share? I think it’s almost impossible, isn’t it?

      You’re going to have to put trust somewhere if you want to be private, whether it’s your device’s hardware, software, ISP or other…

      • @[email protected]
        link
        fedilink
        31 year ago

        I don’t think that Tor relies entirely on trust. it rather relies on the probability that there needs to be at least half of entry and exit nodes compromised for a attacker to be able to deanonymize users trying to access the clearnet. the hidden network is even harder to deanonymize as there are more than 6 hops in the path. and all nodes participating in the network are visible.

        proton on the other hand can do what ever they please on their servers and can never get caught with it.

        • The Hobbyist
          link
          fedilink
          31 year ago

          I don’t disagree with you. But if you start with the assumption that a service cannot be trusted, it’s really difficult, maybe even impossible that despite it, privacy is safe. That’s a different claim. Especially as this claim would have to hold across the whole end to end. I can’t see how one can imagine having any privacy in such a scenario.

  • auth
    link
    fedilink
    51 year ago

    Only private if you use gpg… But you still leak metadata