drdiddlybadger,
@drdiddlybadger@pawb.social avatar

So key tip here is don’t set a fuckin non friendly service as a recovery email on protonmail lmao

asdfasdfasdf,

Well the key tip is that recovery emails are not encrypted.

NeatNit,

Depending on what its purpose it, it likely needs to be unencrypted (or at least decryptable by the operator without the user’s key) in order to function. A recovery email likely needs to be used precisely when you don’t have your password, so it can’t work if it’s encrypted with your private key.

I suppose this isn’t necessarily obvious to a user but it’s not a flaw or fault of Proton, it’s unavoidable if a recovery email is used. Note that it’s optional to add one (see article update).

Amaterasu,

Honest question, what we should be using as of recovery email? Another Proton Mail?

drdiddlybadger,
@drdiddlybadger@pawb.social avatar

Nothing that is tied to you directly at all if you genuinely care about that. Or better yet no recovery email at all that you can use. If things get lost consider the account lost.

reagansrottencorpse,

The requests were made under the guise of anti-terrorism laws, despite the primary activities of the Democratic Tsunami involving protests and roadblocks, which raises questions about the proportionality and justification of such measures.

BrikoX,
@BrikoX@lemmy.zip avatar

Since Proton complied, it means there was enough there for Swiss courts to agree. All requests are subject to Switzerland laws.

hellfire103,

sigh

Maybe I’d better start self-hosting…

BrikoX,
@BrikoX@lemmy.zip avatar

If you do, make sure you are savvy enough to lock down access and your network is secure. Misconfigured networks are one of the biggest vectors for data breaches.

hellfire103,

I’ll probably stick OpenBSD on an old laptop. The FSF have some recommended software I can try.

If I can get a few friends and family onto Gemini, I could also use Misfin.

fluckx,

Self hosting email is a rabbit hole I’d rather not go down. :(

BrikoX,
@BrikoX@lemmy.zip avatar

They always complied with legal court orders, as all companies do. It just highlights the fundamental issue with email as a protocol.

lemmy_in,

This has nothing to do with email as a protocol. The court order discussed in the article asked for the recovery email address of an account. No actual email data was transferred.

meldrik,
@meldrik@lemmy.wtf avatar

I wonder what the authorities could use the recovery email for? Did they gain access to the Protonmail through the recovery email?

voracitude,

If they could get into the recovery email, yeah, they could get into his Proton account. Also useful just for confirming the ID of the person in question.

WhatAmLemmy,

It’s in the article ffs. The recovery email was managed by Apple, so they made a request to Apple and obtained the users real identitiy. Once they arrest the user they can gain access to all the users accounts — unless the user had specifically guarded themselves against that possibility.

BrikoX,
@BrikoX@lemmy.zip avatar

Recovery email was tied to Apple, so they asked Apple to private the data they needed. No email content was shared at any point from Proton.

Beaver,
@Beaver@lemmy.ca avatar

Man. Apple is really terrible here.

BrikoX,
@BrikoX@lemmy.zip avatar

I’m aware. But some user data and metadata required for email protocol to function that can’t be encrypted is the fundamental issue. No provider can solve this issue, no matter how private and secure they are.

In this specific case, the user was a dumbass and linked another email that was tied to Apple. My point was more about email being flawed by design and a need for an alternative protocol if we want true privacy.

Grangle1,

It’s just a general rule of thumb: privacy and security companies can work well against outside attacks but can only do so much against a government/court order, so don’t expect any of them, not even Mullvad, to go to jail for you. Encryption, anonymization and no logging are the most anyone can expect/hope for from a company, which still puts companies like Proton or even Tutanota leagues ahead of the spyware that is Gmail, Yahoo or Microsoft when it comes to email. The end user needs to do the rest themselves.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • protonprivacy@lemmy.world
  • cisconetworking
  • DreamBathrooms
  • tacticalgear
  • magazineikmin
  • ngwrru68w68
  • InstantRegret
  • Youngstown
  • khanakhh
  • slotface
  • rosin
  • thenastyranch
  • kavyap
  • everett
  • GTA5RPClips
  • JUstTest
  • osvaldo12
  • modclub
  • mdbf
  • ethstaker
  • cubers
  • Durango
  • tester
  • provamag3
  • Leos
  • anitta
  • normalnudes
  • megavids
  • lostlight
  • All magazines