• SecurityPro
    arrow-up
    95
    arrow-down
    0
    ·
    5 months ago
    link
    fedilink

    “helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

    • OtterEnglish
      arrow-up
      23
      arrow-down
      0
      ·
      5 months ago
      edit-2
      5 months ago
      link
      fedilink

      Yep, which I think is why it’s more important to see what data is being collected and stored, rather than giving up data based on how trustworthy an entity seems

      If the tool doesn’t collect or log the data to begin with, then there’s nothing that can be stolen/taken/demanded

      The solution in this case might be for Proton (and the other companies) to list out risks and data collection information along the way.

      We need X in order to do Y. Read more on how Y works. Now here are some risks, and how to avoid them:

    • helenslunch
      arrow-up
      6
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Yep, also using “requests” when they were not at all, they were demands.

    • lemmyreaderOPEnglish
      arrow-up
      8
      arrow-down
      27
      ·
      5 months ago
      link
      fedilink

      “helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

      You are suggesting all these companies are completely helpless against legal requests. That is not correct. A company should first make clear that the legal request is actually completely legitimate and correct. After that they can look at whether they should provide the information or not.

      See the data here :

      • SecurityPro
        arrow-up
        47
        arrow-down
        2
        ·
        5 months ago
        link
        fedilink

        As someone who has worked fraud and online investigations, and both written and served search warrants; it is not an option. A probable cause affidavit is presented to a judge and if the judge agrees there is sufficient probable cause, a search warrant is issued. This is an order by the judge and not optional. The judge can hold the company in contempt if they refuse to obey his/her order.

        • Deckweiss
          arrow-up
          3
          arrow-down
          1
          ·
          5 months ago
          edit-2
          5 months ago
          link
          fedilink

          Read the blog by the guy behind cock.li , he refused multiple illegitimate warrants so far.

          What matters is the jurisdiction of the service, not the one of the warrant author, otherwise china would have already warranted all data of all other world citizens lol

          • Railcar8095
            arrow-up
            2
            arrow-down
            0
            ·
            5 months ago
            link
            fedilink

            Proton complies with Swiss law, and has to be channeled through Swiss official channels who rely the request.

            So there’s jurisdiction.

            • Deckweiss
              arrow-up
              2
              arrow-down
              1
              ·
              5 months ago
              edit-2
              5 months ago
              link
              fedilink

              That is true. But I wasn’t debating about this specific case, but rather the generalized statement.

              The comment I replied to implies “If there is a warrant, it is always legitimate and you have to follow it, because a lawyer said so”. That is not true and if it were the world would quickly go to shit, which I pointed out.

              • Railcar8095
                arrow-up
                3
                arrow-down
                0
                ·
                5 months ago
                link
                fedilink

                I would say your interpretation was a bit extreme. Nobody implied a warrant from anywhere in the world.

                • Deckweiss
                  arrow-up
                  2
                  arrow-down
                  0
                  ·
                  5 months ago
                  edit-2
                  5 months ago
                  link
                  fedilink

                  Again, it doesn’t matter where the warrant fomes from. What matters is where it goes to.

                  And that detail is pretty important, while being completely left out. They say:

                  it is not an option.

                  But yes it is, depending on the jurisdiction.

      • brunchyvirus
        arrow-up
        14
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        There is a great talk from the Lavabit CEO who discusses what happened to him and his company when they found out Snowden had an email at his company. I won’t link it since it’s YouTube but it’s an hour long but he talks about his experience with the FBI and the courts. You can search for M3AAWG 2014 Keynote, I highly recommend it.

      • refalo
        arrow-up
        13
        arrow-down
        0
        ·
        5 months ago
        edit-2
        5 months ago
        link
        fedilink

        Are you suggesting they didn’t do those things? Good info either way.

        Also there IS another alternative, the lavabit way just go out of business /s

      • helenslunch
        arrow-up
        9
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        A company should first make clear that the legal request is actually completely legitimate and correct.

        What makes you think they didn’t do that?

  • Lettuce eat lettuce
    arrow-up
    44
    arrow-down
    0
    ·
    5 months ago
    link
    fedilink

    Obligatory reminder:

    Email is not a secure medium! If you need truly secure and/or anonymous communications, DON’T USE EMAIL!

    Use a platform/protocol designed from the ground up for those things!

  • Upstream7564
    arrow-up
    31
    arrow-down
    2
    ·
    5 months ago
    edit-2
    5 months ago
    link
    fedilink

    I think it’s not the services fault that people aren’t aware of the limits of encrypted services. They are not going to shut everythin’ down just for a few people, if you need smth anonymous Proton is not for you.

    Also, it’s your task to have good opsec. If you give your iCloud email to Proton which has personal information sticked to it, your fault.

    • ReversalHatcheryEnglish
      arrow-up
      9
      arrow-down
      1
      ·
      5 months ago
      link
      fedilink

      if you need smth anonymous Proton is not for you.

      Oh it is for you, but you have to be careful. Proton won’t try to find out info you didn’t give them, but they can’t pretend that they don’t have info that they actually have. They run an onion service, and account recovery is made possible without a recovery contact.

    • N0x0n
      arrow-up
      7
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Imagine talking about opsec and iCloud in the same sentence 🫣🤭

    • helenslunch
      arrow-up
      4
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      if you need smth anonymous Proton is not for you.

      I mean, there are better options, but you can also use Proton anonymously. Just have to use it appropriately. If you use it to send your name to the FBI, there ain’t nothin Proton can do about that. Same if you link a recovery email linked to a personal account.

    • refalo
      arrow-up
      4
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      They are not going to shut everythin’ down just for a few people

      Although lavabit did

      • Upstream7564
        arrow-up
        6
        arrow-down
        2
        ·
        5 months ago
        link
        fedilink

        You can’t compare Lavabit to Proton.

        And you can’t compare urself to Edward Snowden.

    • EngineerGaming
      arrow-up
      8
      arrow-down
      4
      ·
      5 months ago
      link
      fedilink

      I do not blame Proton for complying with a request - it is a completely expected action from a company. However, I would blame them for advertising that makes them seem safer than they are for people who don’t know better.

      • helenslunch
        arrow-up
        2
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        I would blame them for advertising that makes them seem safer than they are

        What kind of advertising are you referring to exactly?

  • Schwim Dandy
    arrow-up
    18
    arrow-down
    8
    ·
    5 months ago
    link
    fedilink

    “Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,"

    I love that proton kept referring to the user as the “terror suspect” repeatedly so we would know they’re really the good guy here.

    • lemmyreaderOPEnglish
      arrow-up
      6
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Exactly. What makes this a bit complicated and maybe interesting from a historical point of view is that this is about Spain. A country which has been very slow with removing some of the “relics” from the fascist Franco era (Franco died in 1975) and at the same time having regions that long for independence like Basque country and Catalunya (and the post topic is related to that, Catalunya aiming for independence). Since the Twin Towers attacks in 2001 the words “terror suspect” and “terrorists” have been used much more often (also by ordinary “normies” people that I knew) and maybe not always rightly so.

      • Schwim Dandy
        arrow-up
        3
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        Thanks very much for the clarification to the context, I really appreciate it as someone who had no idea.

    • ryannathans
      arrow-up
      5
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Well it was anti terror laws that were invoked

  • Optional
    arrow-up
    6
    arrow-down
    0
    ·
    5 months ago
    link
    fedilink

    If you sign up for a service using real information that can be traced to you (as in this case: home address, personal email) and then do illegal* things with the account, don’t.

    The * here is that what the alleged protester allegedly did or said is irrelevant. And the article is pretty clickbaity, unless the author was unaware of how online accounts work.

  • Scolding0513
    arrow-up
    6
    arrow-down
    0
    ·
    5 months ago
    link
    fedilink

    Why has proton written somewhere exactly what data can be handed over to police? if there is, they need to be promoting this information more

  • AnAnonymous
    arrow-up
    3
    arrow-down
    0
    ·
    5 months ago
    link
    fedilink

    OpSec fail, never ever use any personal info when you are dealing with something you don’t want to be indentified for, it include obviously recovery emails, usernames and passwords.

    • Simon Müller
      arrow-up
      25
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Proton and Wire didn’t share any decrypted ciphertexts, Wire shared a ProtonMail address and Proton an iCloud Address that they had set as a recovery method.

      Personal info like where they live came from Apple.

      • Vendetta9076
        arrow-up
        1
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        I know wire and proton are encrypted. Apple services certainly aren’t though.

        • Railcar8095
          arrow-up
          3
          arrow-down
          0
          ·
          5 months ago
          link
          fedilink

          They didn’t require any encrypted data. Apple has your name and payment details unencrypted, as they need them to charge you.

    • Squeak
      arrow-up
      15
      arrow-down
      0
      ·
      5 months ago
      link
      fedilink

      Yes. They never gave away content of emails, because they couldn’t even if they wanted to. It’s encrypted.

      They gave the recovery email for the account to the authorities, which was an iCloud account tied to the user’s real name.

      • Vendetta9076
        arrow-up
        1
        arrow-down
        0
        ·
        5 months ago
        link
        fedilink

        I know you’re correct about proton. Didn’t realize they were all like that.