- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
cross-posted from: https://programming.dev/post/14053776
- Proton Mail assisted Spanish authorities in identifying and arresting a member of the Catalan independence organization Democratic Tsunami.
- The company’s end-to-end encrypted email platform aims to protect user data, but recent events suggest potential vulnerabilities.
- Proton Mail was also required to provide user data to Swiss authorities for a separate case involving a French climate activist, emphasizing the importance of proper Operational Security measures.
Also obligatory video: https://www.youtube.com/watch?v=iH626CXyNtE
The original post is 2 months old.
What’s the point of reposting it? Better to post something like:
Don’t use a non-private email, or an email linked to your real identity as your recovery email, because, like other things that Proton needs to have access to (such as recipients and email subjects), it can be shared with law enforcement.
This is old drama at this point. I’ll repeat what’s been said the previous times this was posted.
Proton did what they were legally required to do in the jurisdiction where they operate as a legitimate business. As an encrypted email provider they offer privacy but not necessarily anonymity, and they’re open about that. They even have multiple blogposts about how to use their service more anonymously. If you thought that by using ProtonMail you were getting full anonymity that’s your mistake.
In both the cases mentioned the users made OpSec mistakes: not using a VPN in one and linking their personal Apple email as a recovery email in the other. In the first case Proton wasn’t even logging the user’s IP until the police forced them to.