ProtonMail Complied with 5,957 Data Requests in 2022 - Still Secure and Private? - eviltoast
  • mtchristo@lemm.ee
    link
    fedilink
    arrow-up
    16
    arrow-down
    1
    ·
    1 year ago

    Never forget every email that leaves Protonmail to other email providors are not anymore secure or encrypted as using gmail or others.

    Second no one can certify that incoming emails and meta-data can’t be read and recorded to a ghost mailbox before getting encrypted. you have no control on what happens on their servers

    privacy shouldn’t rely on trust

    • The Hobbyist@lemmy.zip
      link
      fedilink
      arrow-up
      3
      ·
      1 year ago

      It’s really difficult if not impossible to be private with services you can’t trust… suppose you were to not trust Tor. How can you prove it to be private if you can’t trust anything they say or share? I think it’s almost impossible, isn’t it?

      You’re going to have to put trust somewhere if you want to be private, whether it’s your device’s hardware, software, ISP or other…

      • mtchristo@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        I don’t think that Tor relies entirely on trust. it rather relies on the probability that there needs to be at least half of entry and exit nodes compromised for a attacker to be able to deanonymize users trying to access the clearnet. the hidden network is even harder to deanonymize as there are more than 6 hops in the path. and all nodes participating in the network are visible.

        proton on the other hand can do what ever they please on their servers and can never get caught with it.

        • The Hobbyist@lemmy.zip
          link
          fedilink
          arrow-up
          3
          ·
          1 year ago

          I don’t disagree with you. But if you start with the assumption that a service cannot be trusted, it’s really difficult, maybe even impossible that despite it, privacy is safe. That’s a different claim. Especially as this claim would have to hold across the whole end to end. I can’t see how one can imagine having any privacy in such a scenario.