• ByteOnBikes@discuss.online
    link
    fedilink
    arrow-up
    10
    ·
    10 hours ago

    In a response to the backlash, Proton’s official account stated that the company did not intentionally block journalists’ accounts and suggested that the situation had been “blown out of proportion.” However, the lack of clarity surrounding the decision-making process has left many, including the affected journalists, seeking answers. Proton’s founder, Andy Yen, later announced that the accounts had been reinstated but did not clarify the reasons behind the initial suspensions or the subsequent reinstatement.

    https://thegistnotes.com/proton-mails-controversial-account-suspensions-raise-concerns-for-journalists/

    So did Proton mail act on their own, or did they get a gun to their head to disable? Because Proton continues to act holier than thou about privacy and only caving if there’s a lot of evidence. But here is ANOTHER example of hypocrisy.

  • Noa Himesaka@lemmy.funami.tech
    link
    fedilink
    arrow-up
    4
    ·
    11 hours ago

    Ah, of course it’s South Korean cybersecurity agency. They suck at everything and only thing they do is trying to hide this country’s system’s vulnerabilities.

    • teawrecks@sopuli.xyz
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      10 hours ago

      For the record, if your security is based on “trust”, you’re going to have a bad time. The whole point of a cryptographically secure line of communication is that you don’t need to trust anyone except the recipient. Protonmail users choose it specifically because they don’t trust anyone, including Protonmail.

      • DasSkelett@discuss.tchncs.de
        link
        fedilink
        arrow-up
        2
        ·
        1 hour ago

        Except you’re still trusting a lot of people and systems there. Those that programmed, compiled and/or packaged your software in use (be it e.g. the cryptographic libraries themselves, the OS, random user space applications you are running that might be able to access your mail some way or another…), the hardware you use, the software, hardware and OpSec of the recipient…

        The amount of people who have actually the resources, time and knowledge to eliminate all these points (i.e. reviewing the entire source code of all the software you use, and all the diffs of every new release you use, somehow check all the firmware blobs for your hardware or manage to get a fully de-blobbed system running and connected to the internet, and otherwise making sure your keyboard doesn’t sent a copy of every keystroke to “the enemy”, …) is very low. And the amount of people who actually do it might be zero? Not even a person in the NSA will have done all of this themself. They’re trusting some coworkers for some of these parts…

      • GenderNeutralBro@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 hours ago

        Unfortunately, you still need a level of trust with Proton. Even aside from trusting that they will not bend to pressure to terminate your service, you’re also trusting them with your network of contacts, because metadata (including the sender, recipient, and subject line) are not end-to-end encrypted in Proton.

        • teawrecks@sopuli.xyz
          link
          fedilink
          arrow-up
          2
          ·
          3 hours ago

          That’s fair, though that’s more of a flaw with the email protocol. There’s no way around leaking that to the receiver’s email provider as well.

  • Midnitte@beehaw.org
    link
    fedilink
    English
    arrow-up
    18
    ·
    19 hours ago

    Perhaps not the most related, but it is sort of funny for The Intercept to cover this when they led to Reality Winner going to jail because they didn’t follow basic journalistic protection of sources.

    That’s not what happened. Instead, in the process of fact-checking the document, the reporters assigned to the story sent the document to the FBI, which sent it to the NSA. The security agency easily identified Winner, a crypto linguist, as the source of the leak.

    Not a great look for Proton though, this is entirely the antithesis of their entire identity and branding.

    • P03 Locke@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      3 hours ago

      Perhaps not the most related, but it is sort of funny for The Intercept to cover this when they led to Reality Winner going to jail because they didn’t follow basic journalistic protection of sources.

      It’s absolutely related. I will never trust that name again because of what they did to Reality Winner. And Snowden. And many others. They have a shit track record, and should get out of the business of security reporting.

    • Powderhorn@beehaw.org
      link
      fedilink
      English
      arrow-up
      9
      ·
      19 hours ago

      Even if you pay, you’re still the product. Newspapers made their money off ads, not circulation. Cable made money off ads, not outrageous fees. Proton is just enshittifying.