145
submitted 1 year ago by eddie_of_ny@lemmy.ml to c/privacy@lemmy.ml

I've been using Proton Mail and VPN for a while now, and I'm just wondering how everyone else feels about them. I have this kind of inherent alight distrust of them just because they seem like they offer a lot for free and kind of have a Big Tech vibe about them, but there's nothing for me to really substantiate that distrust with, its mostly just a feeling. That being said, I do use their services as mentioned and they work pretty well, even on the free teir. So aside from that one instance where they gave that guy's info to the feds, is there any reason not to trust them with my data?

top 50 comments
sorted by: hot top controversial new old
[-] Darorad@lemmy.world 122 points 1 year ago* (last edited 1 year ago)

No, but I trust audits

https://www.cnet.com/news/privacy/protonvpn-clears-its-latest-no-logs-audit/

I do agree they have a big tech feel that I don't like, but everything I've seen indicates they're trustworthy.

[-] anarchrist@lemmy.dbzer0.com 50 points 1 year ago
[-] TrickDacy@lemmy.world 40 points 1 year ago
[-] Darorad@lemmy.world 22 points 1 year ago

Huh, didn't even realize Reagan was associated with the phrase

[-] tristar@lemmyfly.org 10 points 1 year ago

Yeah, he learned it from the Russians

[-] scytale@lemm.ee 15 points 1 year ago

I now go with “Never trust, always verify”, which is the tagline for zero trust in infosec.

load more comments (6 replies)
[-] Cheradenine@sh.itjust.works 69 points 1 year ago

'So aside from that one instance where they gave that guy's info to the feds, is there any reason not to trust them with my data?'

They were under a court order. They still have to follow their country's laws.

That is not to say you shouldn't question them, but that particular example should not be used.

If that person had better opsec it never would have been a thing.

[-] sudneo@lemmy.world 33 points 1 year ago

Plus, the data they gave was minimal, basically just the recovery email address, if I remember. That person got caught because they used the same address on Twitter (or something) and then they could get more data, if I recall correctly.

[-] ultratiem@lemmy.ca 19 points 1 year ago* (last edited 1 year ago)

This is the key bit. So long as whatever they hand over still meets their services guidelines, the fact they cooperate with law enforcement is not in the least a knock to the promises they made.

It would be another matter altogether if they were providing law enforcement with logs or information they said they don’t collect.

People’s deductive reasoning is weak sauce.

[-] ultratiem@lemmy.ca 15 points 1 year ago* (last edited 1 year ago)

Yeah I think most people confuse privacy with criminal behaviour. Proton has your back when it comes to the former, but they aren’t there to enable you to pirate or cause trouble, hiding behind their service.

I don’t see how making sure criminals are brought to justice is the same as protecting your anonymity on the net.

And even if mandated under law, it’s not like they actually log your travels and are handing that to law enforcement. Whatever they hand over still falls under their services guidelines.

[-] hemko@lemmy.dbzer0.com 12 points 1 year ago
[-] AnEilifintChorcra@sopuli.xyz 18 points 1 year ago

The service could not appeal because a Swiss law had actually been broken and because "legal tools for serious crimes" were used.

Yep under Swiss law he was a criminal, we may not agree with the law but unfortunately that's the case here

[-] hemko@lemmy.dbzer0.com 7 points 1 year ago

Yes. It's not really Proton's fault, but definitely unattractive to a user/customer

[-] bloubz@lemmygrad.ml 4 points 1 year ago

That's the thing. Anonymity on the internet should enable people to protect themselves against unethical laws. Law is not correct, it's just law

[-] FIST_FILLET@lemmy.ml 52 points 1 year ago

seem like they offer a lot for free

i gladly pay for proton knowing that i’m helping fund a critical tool for activists under oppressive regimes :)

[-] backhdlp@lemmy.blahaj.zone 41 points 1 year ago
[-] winterayars@sh.itjust.works 19 points 1 year ago

Yeah i trust them more than the alternatives.

[-] archchan@lemmy.ml 34 points 1 year ago

Based on my own privacy/security criteria, I chose and payed for protonmail when that was the only thing Proton had. I've been very happy with them and it's nice to see how much they've since popped off.

[-] Papanca@lemmy.world 24 points 1 year ago

I trust them, but always remain vigilant, because things can change over time. But the founders initially were scientists who met at CERN, not a company that launched a product. That tells me quite a lot. Yes, over time they are becoming more professional, maybe more like a regular company, but i feel that privacy is still the main priority for them. They also organize a yearly event and the money they raise goes to certain projects that are related to privacy and freedom (if i remember correctly for instance to help journalists remain free press and things like that). Yes, it's one of the few companies that i really trust.

Also, yes, they sometimes are forced to give info to authorities (and they are quite open about that and explain what happened if people ask about that), but don't forget that they don't have much info on their clients, because everything is encrypted and they just cannot see what's inside a mail, for instance. So, they can't share that.

load more comments (5 replies)
[-] DumbAceDragon@sh.itjust.works 19 points 1 year ago

I don't completely trust any "privacy-focused" company, but I trust proton a lot more than most others.

[-] Scolding7300@lemmy.world 18 points 1 year ago

In my view it's either my ISP seeing everything or someone else. I don't trust my ISP, I route my traffic to a different country where I don't live in and them viewing my activity is potentially less of a problem, in my view (just in case they do manage to de-anonymize me)

[-] AssPennies@lemmy.world 7 points 1 year ago

route my traffic to a different country where I don’t live in and them viewing my activity is potentially less of a problem

Depending on where you live, and where your service resides, this could be tricky.

In the US, for instance, if you've chosen a provider in Australia, then a FVEY agreement could be in place to share that data. This gets around the technicality that intel gathering is not occurring on US soil and is not being done by the gov.

And again with the US, if you've chosen a country that's not amiable to sharing user data, the US could very well be justifying that country as a target for pilfering data anyway.

So, that would leave choosing a service provider within the US, which should need to go through the FISA courts for any access to citizen data, but who knows after the Snowden revelations.

I guess that's the state of privacy if you've got a nation state that's targeted you for surveillance. Only way around it I can think of is data to be encrypted in transit and at rest, and only you control the keys. But that's not something that's going to happen with something like mainstream email anyway, too inconvenient for most folks (and you also don't know if your recipients are security conscious either).

load more comments (1 replies)
load more comments (4 replies)
[-] drwho@beehaw.org 14 points 1 year ago

For my threat model and use case, I trust them.

[-] IzzyData@lemmy.ml 13 points 1 year ago

I don't trust them implicitly, but I do believe they are less likely to do certain things than Google which is enough to use them instead of Google for Email.

[-] mo_ztt@lemmy.world 12 points 1 year ago

Proton Mail + Tor Browser + diligent OPSEC

Bingo bango, you don't even have to trust them.

[-] hperrin@lemmy.world 6 points 1 year ago* (last edited 1 year ago)

You very much do have to trust them. They make the client you’re using.

If someone injects malicious code into their client, it can transmit your mail unencrypted, or even just transmit your private key. Will they inject malicious code into their own client? Almost definitely not. The chances are basically zero. But if they get hacked and someone else does, then it’s the same result.

Also, unless all email you receive is encrypted with OpenPGP, you’re still trusting ProtonMail to encrypt it for you before they put it in their database.

So yes, you still have to trust them.

[-] mo_ztt@lemmy.world 6 points 1 year ago

Wait... okay, I think we're talking about two different things.

Emails you send or receive are not private. End of story. That's nothing to do with the provider; they're just not. SMTP is from the stone age of internet when nothing was private, and the attempts to graft a layer of encryption on top of it are from the bronze age, when encryption wasn't very standardized or well-tested against real threats, and all of that shows. Even if you put a significant amount of work into grafting full end-to-end PGP encryption on top of the best your provider can do to keep your emails private, it doesn't work. Emails are not private.

What I assumed you were interested in was in separating your non-private collection of emails from your real world identity. Proton + Tor will do that, bang on. If you're trying to send and receive messages which are genuinely private, use one of the fairly good options which can do that (Signal or Matrix maybe). If you're trying to send and receive your non-private emails without it being linked to your real world identity, use Proton + Tor. If you're trying to send and receive SMTP emails without people being able to read them, you need to rethink what you want, because you're not going to be able to get that.

load more comments (6 replies)
[-] Jonsk@lemmy.ml 5 points 1 year ago

...Tor Browser?

Also by "injecting malicious code" do you mean XSS? Yeah, that can happen, and it's usually not Protons fault. The emails are end-to-end encrypted and encrypted while in your inbox with public and private keys.

load more comments (1 replies)
load more comments (3 replies)
[-] hottari@lemmy.ml 11 points 1 year ago

Depends. Are you on a wanted list?

load more comments (1 replies)
[-] dauerstaender@feddit.de 11 points 1 year ago* (last edited 1 year ago)

No.

I trust no single hosted service, but you can use them with caution.

[-] hperrin@lemmy.world 10 points 1 year ago* (last edited 1 year ago)

For that one instance, not doing so would have been illegal and probably gotten them hit with a major penalty.

Any email sent to Proton in clear text is 100% accessible to them at the point of entry. They basically promise you that they won’t look at it before encrypting it for storage. So if you trust their promise, it’s all good.

Any email that comes in already end to end encrypted with OpenPGP is not accessible to them ever, kind of. If their client gets hacked and starts sending unencrypted messages to them or someone else, then they have access.

The only way to have a zero trust environment is always having people (or businesses) send you messages encrypted with OpenPGP, and never using Proton’s clients (webmail, mobile app, and desktop bridge). That’s fairly unreasonable, and you might as well use any other email service at that point.

So, you can trust them as much as any other company, because unless you write and run your own email server (which, trust me, is a huge pain in the ass*), that’s your only option.

* I wrote and run an email service called Port87, which launched recently, and there are so many obstacles to doing this, even if you’re only running one user on one domain on one server.

[-] sir_reginald@lemmy.world 10 points 1 year ago* (last edited 1 year ago)

Not at all. It woul be trivial for them to steal your private keys from their web client. And yes, we have the code. But it's impossible to verify that the code that is on Github and the one they send to your browser every time you log in is exactly the same.

Also, they make it quite hard to make an anonymous registration. And they've been cooperating with governments. Don't get me wrong, I don't support criminal activity. But I don't trust any government with citizen's data, Snowden proved that.

Edit: Oh and they have bribed various privacy related sites with their affiliate program to recommend their services, which I consider a shady tactic.

load more comments (3 replies)
[-] TylerDurdenJunior@lemmy.ml 10 points 1 year ago

Proton used to have a deal with the Israeli company Radware, for DDoS protection. They have written a few disclaimers about how Radware only handled incoming traffic still with two encryption layers intact (SSL & OpenPGPjs), as if that was some sort of real protection if a company has access to raw incoming traffic.

Honestly, a company aimed at privacy, boasting of Swiss privacy, should know better than to route anything through Israeli companies.

[-] Lolors17@feddit.de 5 points 1 year ago

I do not trust any company, even if it is "privacy-friendly" or "anonymous". There is no way to proofe this, sure I could view the code but there might just be a slight possibility that the company is saving and stealing your data.Self-Hostinmg is for me the way to go.

[-] java@beehaw.org 4 points 1 year ago

Let's say that I trust Swiss laws more than other alternatives.

load more comments (1 replies)
load more comments
view more: next ›
this post was submitted on 11 Oct 2023
145 points (94.5% liked)

Privacy

31809 readers
350 users here now

A place to discuss privacy and freedom in the digital world.

Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.

In this community everyone is welcome to post links and discuss topics related to privacy.

Some Rules

Related communities

Chat rooms

much thanks to @gary_host_laptop for the logo design :)

founded 5 years ago
MODERATORS