Proton Mail came under scrutiny for its role in a legal request by the Spanish authorities leading to the identification and arrest of a user.

  • BrikoXOP
    link
    fedilink
    English
    22
    edit-2
    8 months ago

    They always complied with legal court orders, as all companies do. It just highlights the fundamental issue with email as a protocol.

    • @lemmy_in@lemm.ee
      link
      fedilink
      English
      288 months ago

      This has nothing to do with email as a protocol. The court order discussed in the article asked for the recovery email address of an account. No actual email data was transferred.

      • BrikoXOP
        link
        fedilink
        English
        58 months ago

        I’m aware. But some user data and metadata required for email protocol to function that can’t be encrypted is the fundamental issue. No provider can solve this issue, no matter how private and secure they are.

        In this specific case, the user was a dumbass and linked another email that was tied to Apple. My point was more about email being flawed by design and a need for an alternative protocol if we want true privacy.

      • Meldrik
        link
        fedilink
        English
        -58 months ago

        I wonder what the authorities could use the recovery email for? Did they gain access to the Protonmail through the recovery email?

        • @WhatAmLemmy@lemmy.world
          link
          fedilink
          English
          178 months ago

          It’s in the article ffs. The recovery email was managed by Apple, so they made a request to Apple and obtained the users real identitiy. Once they arrest the user they can gain access to all the users accounts — unless the user had specifically guarded themselves against that possibility.

        • BrikoXOP
          link
          fedilink
          English
          78 months ago

          Recovery email was tied to Apple, so they asked Apple to private the data they needed. No email content was shared at any point from Proton.

        • @voracitude@lemmy.world
          link
          fedilink
          English
          4
          edit-2
          8 months ago

          If they could get into the recovery email, yeah, they could get into his Proton account. Also useful just for confirming the ID of the person in question.

    • @Grangle1@lemm.ee
      link
      fedilink
      English
      78 months ago

      It’s just a general rule of thumb: privacy and security companies can work well against outside attacks but can only do so much against a government/court order, so don’t expect any of them, not even Mullvad, to go to jail for you. Encryption, anonymization and no logging are the most anyone can expect/hope for from a company, which still puts companies like Proton or even Tutanota leagues ahead of the spyware that is Gmail, Yahoo or Microsoft when it comes to email. The end user needs to do the rest themselves.

      • @NeatNit@discuss.tchncs.de
        link
        fedilink
        English
        28 months ago

        Depending on what its purpose it, it likely needs to be unencrypted (or at least decryptable by the operator without the user’s key) in order to function. A recovery email likely needs to be used precisely when you don’t have your password, so it can’t work if it’s encrypted with your private key.

        I suppose this isn’t necessarily obvious to a user but it’s not a flaw or fault of Proton, it’s unavoidable if a recovery email is used. Note that it’s optional to add one (see article update).

    • typhoon
      link
      fedilink
      English
      18 months ago

      Honest question, what we should be using as of recovery email? Another Proton Mail?

      • @drdiddlybadger@pawb.social
        link
        fedilink
        English
        48 months ago

        Nothing that is tied to you directly at all if you genuinely care about that. Or better yet no recovery email at all that you can use. If things get lost consider the account lost.

  • @reagansrottencorpse@lemmy.ml
    link
    fedilink
    English
    88 months ago

    The requests were made under the guise of anti-terrorism laws, despite the primary activities of the Democratic Tsunami involving protests and roadblocks, which raises questions about the proportionality and justification of such measures.

    • BrikoXOP
      link
      fedilink
      English
      78 months ago

      Since Proton complied, it means there was enough there for Swiss courts to agree. All requests are subject to Switzerland laws.

    • BrikoXOP
      link
      fedilink
      English
      138 months ago

      If you do, make sure you are savvy enough to lock down access and your network is secure. Misconfigured networks are one of the biggest vectors for data breaches.

      • Hellfire103
        link
        fedilink
        English
        68 months ago

        I’ll probably stick OpenBSD on an old laptop. The FSF have some recommended software I can try.

        If I can get a few friends and family onto Gemini, I could also use Misfin.