- cross-posted to:
- news@lemmy.world
- cross-posted to:
- news@lemmy.world
I saw this over on reddit and people complaining that they “betrayed” their user base. It’s amazing how many people think just because they’re privacy based that means they won’t respond to a lawful court order.
My take after reading the response as well: I think it’s good that 404 reported this. Also, I think Proton acted responsibly. If you don’t read the 404 headline with a “Proton is a snitch!!!” mindset but more as “This is a thing that happened”, then there is some value in this story. Proton had to cooperate, they explain why and what users can do to minimize risks. Be aware.
Thanks for posting this!
Thank you for acknowledging!
wait who was telling me that the swiss government is still a black hole of anonymity even after KYC because i want to laugh in their face
Want privacy? Want private email?
Host it yourself
The term “lawful” and “court” is meaningless in this context.
Edit: It’s like saying “Mafia Don’s Capo decided…”
I see what youre saying, but the longer I live under us rule, the more all laws seem this way.
There are no absolutes, and no one is perfect, but the US is among the most egregious and corrupt examples in the world.
This US didn’t order them to do this. The Swiss court did.
Did I stutter?
No, you just seem confused.
Read one post above mine that triggered dude and get back to me.
Proton has recently partnered with proxystore, so you can pay for proton services with monero to avoid this risk
yes i am sure that will do it
Paying with monero is just one important part of a healthy and balanced
breakfastopsec
Just pay no attention to the security services that fund crypto, they definetly do it for your privacy.
I think you don’t know anything about monero but okay
I didn’t know that. Cool!
I don’t really see how proton is the bad guy here. If they gave VPN logs, sure, they claim to not keep those. They make no claims that their email service is completely anonymous, though. If you’re going to do something that riles up the feds, use a disposable email or pay for email using a method that isn’t easily traceable. If this person had done that, proton wouldn’t have had any info to respond to the subpoena with.
Honestly it’s my take. I have proton. I know i’m paying with a credit card so if they were served a warrant for my information, they’d get it. BUT they wouldn’t get anything from my email because 1) It’s encrypted and 2) it’s encrypted with my own key and not the one generated by Proton when you create an account. I casually wonder if someone didn’t fully understand the nuance of things like this in the modern surveilance state.
- It’s encrypted and 2) it’s encrypted with my own key
None of this is of any use if the mailbox of the sender or recipient of the email is not also encrypted.
Yeah, I’m also using proton and knew about this type of situation happening before. If I was going to do something illegal/disruptive enough to attract the attention of police, I simply would not attach my personal email to it. I just don’t see why anyone would think that the police won’t have a way of tracing a service that you paid for with banking details in your name back to you. It’s just shitty opsec.
Proton is in the bad, or at least in the wrong, for keeping PII about a client to identify via payment option (and did extra wrong by not securing it enough). Honestly, this could all have been avoided if Proton offered a one-time payment service, like SDF does, so that once the payment is received the connecting information can be deleted or expired (or even better: never collected). But a rent-seeking grift model such as subscriptions likely precludes this capability.




