I saw this over on reddit and people complaining that they “betrayed” their user base. It’s amazing how many people think just because they’re privacy based that means they won’t respond to a lawful court order.

    • jeffep@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      2 hours ago

      My take after reading the response as well: I think it’s good that 404 reported this. Also, I think Proton acted responsibly. If you don’t read the 404 headline with a “Proton is a snitch!!!” mindset but more as “This is a thing that happened”, then there is some value in this story. Proton had to cooperate, they explain why and what users can do to minimize risks. Be aware.

  • MinnesotaGoddam@lemmy.world
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    1
    ·
    9 hours ago

    wait who was telling me that the swiss government is still a black hole of anonymity even after KYC because i want to laugh in their face

  • StinkyFingerItchyBum@lemmy.ca
    link
    fedilink
    English
    arrow-up
    88
    arrow-down
    14
    ·
    edit-2
    1 day ago

    The term “lawful” and “court” is meaningless in this context.

    Edit: It’s like saying “Mafia Don’s Capo decided…”

  • Assassassin@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    68
    arrow-down
    8
    ·
    1 day ago

    I don’t really see how proton is the bad guy here. If they gave VPN logs, sure, they claim to not keep those. They make no claims that their email service is completely anonymous, though. If you’re going to do something that riles up the feds, use a disposable email or pay for email using a method that isn’t easily traceable. If this person had done that, proton wouldn’t have had any info to respond to the subpoena with.

    • ItWasntMe@discuss.onlineOP
      link
      fedilink
      English
      arrow-up
      43
      arrow-down
      3
      ·
      1 day ago

      Honestly it’s my take. I have proton. I know i’m paying with a credit card so if they were served a warrant for my information, they’d get it. BUT they wouldn’t get anything from my email because 1) It’s encrypted and 2) it’s encrypted with my own key and not the one generated by Proton when you create an account. I casually wonder if someone didn’t fully understand the nuance of things like this in the modern surveilance state.

      • Atherel@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        15
        arrow-down
        1
        ·
        1 day ago
        1. It’s encrypted and 2) it’s encrypted with my own key

        None of this is of any use if the mailbox of the sender or recipient of the email is not also encrypted.

      • Assassassin@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        14
        arrow-down
        2
        ·
        1 day ago

        Yeah, I’m also using proton and knew about this type of situation happening before. If I was going to do something illegal/disruptive enough to attract the attention of police, I simply would not attach my personal email to it. I just don’t see why anyone would think that the police won’t have a way of tracing a service that you paid for with banking details in your name back to you. It’s just shitty opsec.

    • lambalicious@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      2
      ·
      1 day ago

      Proton is in the bad, or at least in the wrong, for keeping PII about a client to identify via payment option (and did extra wrong by not securing it enough). Honestly, this could all have been avoided if Proton offered a one-time payment service, like SDF does, so that once the payment is received the connecting information can be deleted or expired (or even better: never collected). But a rent-seeking grift model such as subscriptions likely precludes this capability.