You are viewing a single thread.
View all comments View context
-27 points

I’ll tell you what. If you can prove to me by pointing to the specific source code that would prevent Proton from capturing your private key password when you login or decrypt using their standard clients then I’ll join the Proton cult.

permalink
report
parent
reply
16 points

prove to me by pointing to the specific source code that would prevent Proton from your private key password

You want them to point to code (that’s not publicly available) that prevents Proton from capturing credentials?

What a dumb hoop to tell someone to jump through. Do you expect someone to actually post a block of code? Would you even be able to read it?

permalink
report
parent
reply
-14 points
Removed by mod
permalink
report
parent
reply
10 points
*

Yes I can read it. You think I’m an f’ing idiot?

I mean, you’re certainly not providing much proof that you have any measurable software skills that enables you to do the proper evaluation even if you received the code from proton. Why should anyone believe this unsubstantiated claim from you?

Edit: for the record, I’m don’t give a shit and I’m just yanking your chain here.

permalink
report
parent
reply
16 points

This simply isn’t really possible.

Even if they published open-source code for their backend, it wouldn’t prove that it’s actually what their systems are running.

And when you are storing your data on their servers, and decrypting it by sending over your password, there’s no way you can actually truly prevent them from accessing your data, if they were to modify how their systems function overall. (this is true for every company)

Even if they were using zero-knowledge proofs to verify and prove to you the computation done on the server matched what would be expected from published open-source code, then either their very own systems (and by extension, their administrators), or a different company’s proprietary TPM module, would be the root of trust for those ZK proofs, and would still have the same underlying trust assumptions of at least 1 company having the ability to potentially steal your information.

If you want to rail against Proton for this, you have to be against every single cloud-based instance of code that hosts encrypted data, by any company, for any user.

Saying Proton acts just like Microsoft is a laughable comparison to make in order to justify claiming a lack of privacy or security on Proton’s part.

Why? Is it because they’re both companies that offer online services? Guess what, loads of companies do that. But you know what Proton doesn’t do? Give away the contents of people’s files, like Microsoft states they do in their own transparency reports, that they conveniently stopped publishing in 2022. Microsoft handed over the content (not just IP, email, etc, but actual docs, communications, stored files, etc) of thousands of people’s accounts to law enforcement. Proton hasn’t given out content once.

And this doesn’t even consider the fact that Proton’s business model is privacy. For Microsoft, their users will keep using their services regardless of their privacy, but for Proton, if it comes out that their services are no longer private, nobody will use them anymore, because nobody who got them for privacy would need them at that point.

permalink
report
parent
reply
6 points
*

Such source code isn’t possible with the general audience service they offer, even if being open source were a requirement for credibility in any way.

You’re comparing them to a company with a long history of actively hostile behavior despite the fact that there’s never been a single hint of anything resembling hostile behavior from them, they operate from a country with meaningful privacy protections and only surrender data when compelled by their own courts (who only do so in circumstances that actually warrant it), and haven’t actually given up information that’s useful when required to because they don’t have it.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 12K

    Posts

  • 543K

    Comments