0 points
*

Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.

permalink
report
reply
3 points

Well not exactly. They might be reading the metadata of your lower level packages.

Unless you’re not using encryption, then wth are you even doing?

permalink
report
parent
reply
-1 points
*

You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai

permalink
report
parent
reply
5 points

I mean yeah, maybe? Are you one of the people that believes aes or ecc has a backdoor? I think we’d know by now, and I’m certain they don’t have the compute to break aes256.

permalink
report
parent
reply
-9 points

proton is untrustable

permalink
report
reply
50 points
*

As much as some of us may dislike it when a company does these kinds of things. You can’t really blame them for following the laws of the country that they are headquartered in.

You can blame them for operating there to begin with in cases like Apple in China, but you could hardly blame them for following the laws of the US where they are headquartered for example.

If the law of the land where the headquarters is requires them to give up the data they do have to partner nations then they don’t really have much choice in the long run if they want to continue to exist.

permalink
report
reply
17 points

“Nobody’s going to jail for you” is pretty much the way to think about any cloud privacy service. They may not keep logs unless they’re required to, but in the end, they will comply to stay in business.

permalink
report
parent
reply
25 points
*

Plus there isn’t many jurisdictions with stronger privacy law than the swiss. It is unlike they made a bad choice for choosing a headquarters.

I guess they can operate on the public sea or the arctic, but I imagine the commute will be terrible.

permalink
report
parent
reply
36 points

If you use ANYTHING other than face to face meetings when discussing something illegal, you get what you deserve.

permalink
report
reply
-2 points

Or use WhatsApp like most of criminals

permalink
report
parent
reply
7 points
*

it’s compromised (explicitly part of PRISM). nice try FBI shill

permalink
report
parent
reply
36 points

Although I like the idea of a drug smuggler typing “as per my previous email…”

permalink
report
parent
reply
-6 points

This is why you sign and encrypt the contents of email. If the recipient doesn’t have the public key, they can’t read the content.

Allowing a service provider to “handle your keys” is tantamount to letting the fox watch the henhouse.

Proton doesn’t provide IMAP/SMTP access for free accounts, so you won’t be able to encrypt emails locally.

This ultimately is the tech version of “trust me bro”. This means you are as secure on Proton as you are on GMail, depending upon how you use the service.

permalink
report
reply
8 points
*

If the recipient doesn’t have the public key, they can’t read the content.

Sir, if your recipients don’t have a public key, you cannot even encrypt the message… That is how asymmetric-key crypto works.

permalink
report
parent
reply
2 points

FYI email contents were not decrypted or turned over to police, as far as I know Proton’s E2EE is still as good as whatever system you’re using. Proton doesn’t have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don’t know what the recovery process entails and whether it can restore encrypted emails).

permalink
report
parent
reply
5 points

Proton doesn’t provide IMAP/SMTP access for free accounts, so you won’t be able to encrypt emails locally

Umm, you absolutely can. Use gpg, encrypt the txt, copy the encrypted text into the email. EZPZ.

permalink
report
parent
reply
-3 points

…yes, that’s what I said. But sign them locally. Do not put your private key on Protons service. Sign and distribute pub keys locally.

Probably should have clarified.

Also, paid IMAP/SMTP makes Proton a freemium service. Thought I should just underline that.

permalink
report
parent
reply
3 points
*

Just encrypt with pgp and send encrypted text

permalink
report
parent
reply
1 point

That’s how a good portion of the Dark web works, and I find it amazing

permalink
report
parent
reply
8 points

This comment is completely off the mark. The information that they disclosed is the recovery email -the same exact thing which happened previously- not any content of any email.

Also, proton does encryption with PGP, but you can’t encrypt if the other side doesn’t use PGP (which is the case for 99.98% of humans on the planet). If they do, proton supports this including with arbitrary clients using their bridge.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 17K

    Monthly active users

  • 12K

    Posts

  • 543K

    Comments