This is non-news, like all tech companies, they are bound by law to do this. It happens more than 6000 times per year for Proton. However, this user just had bad opsec. Proton emails are all encrypted and cannot be read unless law enforcement gets your password, which Proton does not have access to. Even if Proton hands over all data.
Proton's mails are encrypted... between proton accounts. Send an email to a hotmail account and bye-bye encryption. Proton does rely on PGP so you can use that if the recipient supports it.
A Password-protected Email is an email that requires a password to open it. It’s a way you can send a secure, end-to-end encrypted email to anyone who isn’t on Proton Mail.
Upon receiving the recovery email from Proton Mail, Spanish authorities further requested Apple to provide additional details linked to that email, leading to the identification of the individual.
I like how no ones talking about how Apple (the one its fanboys say is most privacy centric company) was the one that helped identity the individual.
About that. I'm still making the transition from gmail and currently most of my mail still goes to gmail first and gets forwarded to Proton through their easy switch process. Surely this is just as up for grabs as a recovery email, right?
FWIW I'm not likely to be investigated any time soon so I'm not worried either way.
“Privacy” means two different things depending on the audience. For me privacy means that my information is not being used to advance some organizations commercial interest. For others it means that my information will never be shared with a government.
Don’t advertise to me
Or
Don’t narc on me
I guess I don’t really expect a company to resist pressure from government agencies on my behalf. Especially if I have been using their service to commit crimes in my country. If you are doing things your government would prefer you didn’t, hire a good lawyer and consult with them about what should be sent via email (spoiler, it’s nothing). The mafia doesn’t send emails, or put anything in writing, if you do crimes, you shouldn’t either.
I guess I don’t really expect a company to resist pressure from government agencies on my behalf.
Personally, I expect them to resist to the extent possible by law. The cops need to follow a lot of rules to make legally binding requests for data. I understand that if they do, there's not much a company can do other than hand out the info, but if there's a legal way to deny such a request, I expect the company to pursue it.
Pretty much. I’m not expecting a company to spend millions of dollars in court costs and lawyer fees on my behalf. But if it’s clear that the government is overreaching, the company should at least go “hey uhh judge, wtf?”
Not to mention the fact that any new place your data is stored is a honeypot for criminals to try to hack. The more sensitive the data the better. Not every organization has the same protections and they will get your data stolen at some point.
Upon receiving the recovery email from Proton Mail, Spanish authorities further requested Apple to provide additional details linked to that email, leading to the identification of the individual.
Just in case anyone thinks they decrypted mails and handed them over, nope. I hadn't thought about that "settings" are not encrypted. Guess if you want to stay anonymous you shouldn't add your private mail address in there as a backup.
I don’t know much about the case beyond some very lazy peripheral searching, but it strikes me that Proton’s compliance isn’t an issue, but the requests themselves are totally unjustifiable and based on malicious prosecutions to nab some separatists on ridiculous terrorism charges for their nonviolent action and protests.
This individual is suspected of being a member of the Mossos d’Esquadra (Catalonia’s police force) and of using their internal knowledge to assist the Democratic Tsunami movement.
The requests were made under the guise of anti-terrorism laws, despite the primary activities of the Democratic Tsunami involving protests and roadblocks, which raises questions about the proportionality and justification of such measures.
Probably the request to Proton arrived from a Swiss judge, who received a request from Spanish judge, and he evaluated the request and decided that it has merit.
However, if presented with a valid order from a Swiss court involving a case of criminal activity that is against Swiss law, Proton Mail can be compelled to share account metadata (but not message contents or attachments) with law enforcement.
The only ever claim to encrypt message contents and attachments. And explicitly call out account meta data here as something they can hand over if requested by law enforcement. They also mention they are not good vs targeted and governmental level attacks:
There are, however, some risks for users facing a strong adversary, such as a government focusing all its resources on a very specific target.
And explicitly mention they might be compelled to log and give up information like ip adresses:
if you are breaking Swiss law, a law-abiding company such as Proton Mail can be legally compelled to log your IP address.
Here the mention clearly the data mentioned in the privacy policy which in turns clearly states that you MAY provide a recovery account which will be associated with your account. I also think that anybody that should be concerned for this should understand that law enforcement can get ALL the data the company has on you.
As much as some of us may dislike it when a company does these kinds of things. You can't really blame them for following the laws of the country that they are headquartered in.
You can blame them for operating there to begin with in cases like Apple in China, but you could hardly blame them for following the laws of the US where they are headquartered for example.
If the law of the land where the headquarters is requires them to give up the data they do have to partner nations then they don't really have much choice in the long run if they want to continue to exist.
"Nobody's going to jail for you" is pretty much the way to think about any cloud privacy service. They may not keep logs unless they're required to, but in the end, they will comply to stay in business.
Proton a few years ago disclosed the IP address of the user of a certain mailbox upon request by LEA. That was enough to get the person found and arrested (I don't remember what the case was about). They HAVE to comply with these requests, but they DON'T need to log/retain those info ETA: and I was wrong, thanks @Cheradenine@sh.itjust.works to set me straight. But I think the point still stands. I don't want to be ALWAYS be tied to a VPN, there are some scenarios where I can't use a VPN.
That was the moment I decided to selfhost my email server.
So couldn't a court compel the VPN to log all IPs and then use some FISA level shit to prevent the VPN from alerting users?
There's been a handful of VPN cases taken to court where they have proved, at that moment in time, that they had no logs to hand over. But why not take it that last step and compel the change then?
Posteo doesn't have to retain IPs and doesn't, it also doesn't retain payment info (though if you transfer by wire there's still a window where a payment can be traced AFAIU).
They will also absolutely forward any and all traffic for a particular account to law enforcement when given a court order. What's it with criminals thinking that they can outsource opsec to legitimate businesses. Defending against a state-level actor actively hunting you down, watching closely and pouncing on any and every mistake, is a vastly different beast than making sure google doesn't know about the butt plug you just bought.
What I am find curious about this is if a recovery email would have any weight in court. I can add whatever recovery email I want to an account. It doesn't have to be mine.
If your recovery email address is not yet verified, click the Verify now link and then the Send verification email button. You’ll be sent a link to confirm that the email address belongs to you.
I still find it fascinating that you can go to jail because there's an IP address in a log file somewhere or because of a screenshot of a messenger communication.
Yes its a good thing the result is what it is, but you watch, theyll try to use it as justification. And as a small(ish) fyi, try running a tracert on whatever site youre looking at. Unless you are directly connected to that site, there are likely multiple hops -domains- that your connection passes through to get from your machine to the target. Each one of those has the potential to read what youre doing and reporting on it.
You forget the nsa, interpol. I remember back in the 90s there was a blurb about hackers sniffing packets and using that data to hack those systems. Gotta remember back then everyone had more open ports than shanghai
This is why you sign and encrypt the contents of email. If the recipient doesn't have the public key, they can't read the content.
Allowing a service provider to "handle your keys" is tantamount to letting the fox watch the henhouse.
Proton doesn't provide IMAP/SMTP access for free accounts, so you won't be able to encrypt emails locally.
This ultimately is the tech version of "trust me bro". This means you are as secure on Proton as you are on GMail, depending upon how you use the service.
This comment is completely off the mark. The information that they disclosed is the recovery email -the same exact thing which happened previously- not any content of any email.
Also, proton does encryption with PGP, but you can't encrypt if the other side doesn't use PGP (which is the case for 99.98% of humans on the planet). If they do, proton supports this including with arbitrary clients using their bridge.
FYI email contents were not decrypted or turned over to police, as far as I know Proton's E2EE is still as good as whatever system you're using. Proton doesn't have the keys to decrypt your emails, it never did. What they have access to is metadata that is necessary to function when your private key is unavailable - e.g. your public encryption key used to encrypt incoming emails from non-Proton sources, or in this case, a recovery email address (I don't know what the recovery process entails and whether it can restore encrypted emails).