Become a MacRumors Supporter for $50/year with no ads, ability to filter front page stories, and private forums.
Nope, you have to run some kind of system where it forwards the emails to a program on your computer and then that program sends the emails to your desired email app.
You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?
Proton is all about securing all possible links of the chain. IMAP isn't secure, so if the user wanted to use a heavy desktop client (outlook, mail, thunderbird...) they could either have built a new secure mail protocol from scratch and then waited about a millenia for it to become and RFC and desktop clients to catch up maybe implementing it, or the smarter way, secure the link between the local machine and their servers, and have a local IMAP server running locally to enable compatibility with mail clients. Thus: proton bridge. And to do so, they actually recreated from the ground an ultra optimised IMAP implementation (and opensourced it ifaik)

Read and learn: https://proton.me/blog/bridge-security-model
 
  • Like
Reactions: Mr. Heckles
What's the problem? The bridge runs in the background. Once installed you don't even notice it's there. It's essentially a protocol translator between a standard email client and Proton's server API. It is necessary because IMAP and SMTP aren't really designed for end-to-end encrypted email and key management. Other encrypted providers such as Tutanota or Skiff have no option at all to use a client.
You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?
Proton is all about securing all possible links of the chain. IMAP isn't secure, so if the user wanted to use a heavy desktop client (outlook, mail, thunderbird...) they could either have built a new secure mail protocol from scratch and then waited about a millenia for it to become and RFC and desktop clients to catch up maybe implementing it, or the smarter way, secure the link between the local machine and their servers, and have a local IMAP server running locally to enable compatibility with mail clients. Thus: proton bridge. And to do so, they actually recreated from the ground an ultra optimised IMAP implementation (and opensourced it ifaik)

Read and learn: https://proton.me/blog/bridge-security-model
Why do I have to pay them a monthly subscription for the privilege of having to run a server on my own hardware?
 
I like Proton a lot. But, the prices keep moving higher and higher. I’m already paying for iCloud + and Proton seems to duplicate most of what I get from iCloud and Mullvad VPN. If my main concern is privacy, is Proton offering any advantage over moving my custom domain to iCloud?
 
I like Proton a lot. But, the prices keep moving higher and higher. I’m already paying for iCloud + and Proton seems to duplicate most of what I get from iCloud and Mullvad VPN. If my main concern is privacy, is Proton offering any advantage over moving my custom domain to iCloud?
Email, contacts and calendar are exactly the iCloud services that are not end-to-end encrypted with "advanced data protection", so if you value that Proton is actually a good complement. If not, iCloud is a better deal for Apple users.

Protonmail is arguably also a more capable email service (e.g. iCloud email allows only 3 addresses under your custom domain while Proton Plus allows up to 10). OTOH, with iCloud+ you can share a custom domain with other iCloud+ subscribers or via family sharing, and iCloud contacts and calendar are far superior to Proton's equivalents at this stage.
 
Last edited:
Think of how much external storage you could buy over the years for the price of a cloud service subscription.

And I do not like the idea that the end-to-end encryption is done by the same company that manages the servers. Couldn't they build in a back door if they wanted? So I use a third party encryption software that encrypts my most important files and then those files get uploaded to Sync regularly.

My most important files usually are emails, text files and Excel files. Those add up to less than 100 MB. I do not need a paid service for that. And uploading photos to a cloud is just to expensive. You need terabytes of storage for photos and even more for videos. That will costs you hundreds or even thousands of dollars per year.

If you are afraid that your house will burn down, there is a solution: Put a network storage in a friends house and your friend put one in your house. So those files will be safe unless both houses will burn down. And let's be honest: If your house burns down, your photos are your smallest problem.
 
Prediction: In 10 years or less, probably much less, advances in artificial intelligence and supercomputing will bring to state-sponsored hacker's computer a means to break every encryption method in use today. There is no secret code that can't be broken.
Yes, any code can be broken if you have enough time. Strong keys take a LONG time to break like billions of years. OK in a few decades, computers will be faster and it will only take millions of years. But then they simply make even longer keys.

Don't think that technology will advance at a constant rate. Technolgy is always limited by physics. we will never invent technology that does physically impossible things. All we can do is approach the limits of what is possible.

Also, if yu are willing to give up the convenience of public key cryptography then we can have absolutely unbreakable codes. (But then we'd all need to become experts is operational security and physical key distribution.)
 
My most important files usually are emails, text files and Excel files. Those add up to less than 100 MB. I do not need a paid service for that. And uploading photos to a cloud is just to expensive. You need terabytes of storage for photos and even more for videos. That will costs you hundreds or even thousands of dollars per year.
Running your own email server is a big pain in the a**, since you have to deal with things like your mail server reputation. You also have to spend significant time to stay on top of security updates etc. if you don't want your server to be breached or abused by spammers.
 
Apple is not the primary threat (altho I don't trust them much more than Google). The U.S. government is the threat.

You imply that there is no way to preempt or back-door encryption schemes. U.S.-based storage is not only susceptible to after-the-fact warrants, but preemptive FISA orders that could require active surveillance measures. The Swiss are immune to FISA orders (or any other external state entity).

Apple is not the threat - it's the U.S. government.

NO, Proton does not have to comply with U.S. warrants or any other U.S. requests - they're in Switzerland. Do you understand how national sovereignty works?

So, if a US government agency got hold of your data, what could they do with it to harm you?
How likely is this scenario?
 
You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?
Proton is all about securing all possible links of the chain. IMAP isn't secure, so if the user wanted to use a heavy desktop client (outlook, mail, thunderbird...) they could either have built a new secure mail protocol from scratch and then waited about a millenia for it to become and RFC and desktop clients to catch up maybe implementing it, or the smarter way, secure the link between the local machine and their servers, and have a local IMAP server running locally to enable compatibility with mail clients. Thus: proton bridge. And to do so, they actually recreated from the ground an ultra optimised IMAP implementation (and opensourced it ifaik)

Read and learn: https://proton.me/blog/bridge-security-model
Somehow the link isn't working for me. It takes me to this page which says secure connection failed.

Edit, same with the read and learn more link. it takes first takes me to this address: https://go.skimresources.com/?id=73...94a9b2ea&cci=5f7fc780f5712be54e6e7bcb7fe3bc84 and then https://go.getproton.me/aff_c?offer...=https://proton.me/blog/bridge-security-model which takes me to a secure connection failed page.

Same thing happens with the first link in the article with the link to drive, I'm unable to view the announcement and get a secure connection failed page.
 

Attachments

  • Screenshot 2023-11-23 at 5.18.55 PM.png
    Screenshot 2023-11-23 at 5.18.55 PM.png
    171.4 KB · Views: 65
While computers will get stronger, so will encryption. It will still be a cat and mouse game.
You've made a good point. Looks like a doomsday scenario where these supercomputers battle each other to create and break each other's encryption algorithms. Probably billions of times per second. You'll have to keep secret data in air-gapped Faraday cages, powered only by onsite batteries. And only view it onsite.
 
Last edited:
  • Like
Reactions: Sully
Different priorities. For example, Mailbox.org doesn't support hardware keys for 2FA, generally has a very weird and less secure 2FA scheme, has a much less capable filtering system (Proton even lets you write your own Sieve filters), and has a pretty crappy web interface. OTOH, I have no use for "unlimited custom domains"; I just need one.

Well, given that none of the major email protocols (SMTP, POP, IMAP) supports 2FA that sort of makes sense. Like I said, they're trying to turn an insecure protocol into a secure one which means all sorts of band-aids and duct tape to make it work.

But. you are correct, different strokes for different folks because I just do filtering on my email client and I own/manage 20+ domains and usually just need a hello@ or admin@ address for each domain. In Proton that would be prohibitively expensive.

I don't entirely disagree with you here. It actually used to be possible to add more custom domains for a small fee, rather than upgrading to the twice as expensive "unlimited" plan. Their new pricing scheme is obviously designed to increase the ARPU by selling you things that you don't necessarily need, such as their VPN service. Nonetheless, I find their "plus" plan not really more expensive than other ad-free providers.

Probably 60% of my complains about Proton boil down to this. They're such skeazy business people.

What cracks me up is that prior to their big rebranding, people used to complain how difficult it was to purchase ala carte upgrades.

So Proton made it it even worse and created bundles. LOL.

Proton strikes me as a company that realizes they were never going to make it long-term as an email provider and has since turned their focus on to how to squeeze every last penny out of their customers.

Most of the industries where bundling products happen, like cable TV, only do so because they know you won't ever choose to pay for those services. But they can launch a password manager and give it to you for free and then claim you're getting a $100 a year value for free.

But if I don't want the password manager and would never pay for their password manager (a very happy Bitwarden customer of many years) it's $0 in value.

The IMAP Bridge actually causes increased load on their API due to the constant syncing.

I think it is quite generous of them to offer a free plan at all, given that those accounts cost money to maintain and create zero revenue. Essentially they are subsidized by paying users. Mailbox.org or Fastmail don't offer free accounts at all.

For most free accounts, I doubt this would be significant.

Plus their free accounts are actually destabilizing the platform but it's the only way they know how to get privacy nerds into the sales funnel.

By that I mean that Proton giving out free email accounts means Proton is a spammer favorite. That means Proton's domains and servers end up on spam block lists from time to time which disrupts delivery.

Likewise, if you watch the Proton subs/forums, more and more websites/companies are beginning to refuse Proton domains as valid email addresses which forces people to use custom domains.

Your mailbox is literally stored in in the cloud.

I know where it's stored, I mean that the storage limits include cloud drive storage. Most people have no use for 20GB of email storage. I have an old Gmail account that I was using back since the mid-2000s and I think I'm at 3GB of used storage.

I would much rather not pay for their cloud storage, be offered 5GB of email storage, and if I want more than 5GB I want the option to buy in 1GB - 10GB chunks depending on my needs.

Again, this how they bundle things to make you think you're receiving value when you're actually not getting anything. The vast, vast majority of their users will not hit their limits, even the limits they had pre-Proton Drive, only with email.

What's your alternative? Email is still indispensable due to it's ubiquitous availability and asynchronous nature. Banks and other online services won't let you sign up via ephemeral chat anytime soon.

They same thing we do with every other technology that no longer serves its intended purpose, replace it.

Email was one of the first internet protocols developed and at the time nobody was thinking about security, spamming, etc.

I agree, it's not an easy problem but you could build an entirely new messaging backbone that allows some backward compatibility to the current email protocols.

There are tons of proposals out there by people who are on the front lines of dealing with running large email infrastructures. We just need to bite the bullet and decide on one.

That said, until then, here's what I do:

I use Signal, WhatsApp, SMS, or LINE for most 1-on-1 communications. I know LINE and WhatsApp are crap but I live overseas and that's what everyone uses.

I rarely correspond with anyone via email anymore. The only purpose email serves for at the moment is it's required to create an account on many websites and people like to broadcast messages to my email accounts.

It's funny you mention banks since most banks don't actually send you messages, they send you a message to tell you they sent you a secure message that you have to login to their website/app to go read.

That's what email is for me nowadays.

Also, I would add, as someone that lives overseas, nobody where I live (Thailand) uses email. It's all messaging apps. Hell, even when I go to immigration to renew my visa, the IO (immigration officer) will usually ask me for my LINE account and they'll send me updates to my LINE account.

Sure, email exists here but if you look at most businesses or government agencies here, you would have difficulty finding an email address for most of them. And forget about asking someone for their email, they would just stare at you.

You email is mostly only used to create an account. Even then, many businesses and government agencies just ask you for your LINE account.

In fact, I own a business and all of our loyalty programs and marketing is done via LINE or SMS. I've never sent an email to a customer.

It's possible to break one's dependence on email as a primary communication platform. In many ways, the US is way behind the rest of the world.

Insider threats and breaches, for example. It also makes it impossible for the provider to monetize your data.

Actually, that's not entirely true.

Emails pass through Proton's servers unencrypted and can be read in transit. It's only when they reach your inbox that they become unreadable. Again, this is why email is an inherently insecure communications protocol.

But messages that pass between two Proton users would be encrypted so Proton is really only secure when it uses its own backend on both sides, which is sort of like Signal and other messaging platforms that don't have to ever deal with processing email protocols. So why not just use Signal in the first place?

Here's an interesting case where Proton competitor Tutanota was forced to turn over unencrypted customer communications.

I don't use a secure email provider to hide from law enforcement. I'm far more concerned about data breaches and surveillance capitalism. But I also think that for less fortunate people living under authoritarian governments a service like Proton can be crucial.

You've sort of comingled a bunch of issues.

Proton does little to protect you from a data breach as most data breaches are a third-party being compromised and they dump all of the user data to the world.

Unfortunately, many people use the same password on all sites and then the info from the data breach is used to escalate to access to your email account.

So, any email provider that offers 2FA provides the same protection to gaining access to your emails because if an attacker has your proton email address and you used the same password on Proton, someone can log into your Proton account.

Surveillance capitalism is an umbrella term for a lot of things, some of which Proton offers zero protection from. Likewise, many people eventually discover that protecting yourself from surveillance capitalism is a lot of work and costs a lot of money and they usually get lax which is the most likely attack vector.

Almost every major issue you see in the privacy groups starts off with, "I know I should know better but . . . "

This is why I said that privacy and security are not products you buy. They're mindsets.

And if you have the privacy/security mindset, you tend to make much better decisions about what's worth your time protecting and what isn't.

Letting people think they can purchase privacy is worse than than what Gmail does, IMHO. At least with Gmail, I know the game we're playing. With Proton, you think your email is secure while between being readable in transit and the fact that an unencrypted copy of every email exists on the other party's server/computers, it's not secure.

Actually, that's one of the other things that cracks me up with all of the privacy geeks, most of them won't touch Gmail or Facebook or ?? because those companies are evil and try to collect data. But they don't even understand what is collected, how it's collected, and what can be done with it.

I use a Gmail account as a catchall for accounts I don't care about like when I have to create an account to read a news article. I just use my Gmail and I could care less if Google knows I subscribed to a news site that 10 million ohter people are subscribed to. Because, what can they do with that data? Show me more ads? Oh no. They're gonna serve me ads anyway. And I have an ad blocker. I take enough other precautions that Google getting this info is of little concern to me.

In fact, I think I gain security/privacy via this setup.

First off, the news site has no idea I have a Proton (or other secure) account. Any data breach would only expose my Gmail address which I don't care about anyway.

In fact, I keep separate email addresses even on my custom domains specifically to compartmentalize the amount of damage that can be done if I was subjected to a data breach.

For instance, I keep all the crap on Gmail, personal correspondance is on a domain name that is my name (ie me@bobjones.com) so people know they're dealing with me, and for financial institutions I use a completely different domain.

If my bank experiences a data breach, it's compartmentalized to just that email address but even if the entire domain was somehow comprimized, I have options. The nuclear option being that I burn that domain entirely, buy a new one, and switch all of my financial emails over to the new domain and update my account settings on all my financial accounts. I even keep a watch list of vetted domains that I can buy and switch to immediately.

I generally ditch services every few years anyway. For instance, I'll just abandon the Gmail account. I'll create a new one, re-sign up with my new email on the sites I still use, and let the old Gmail just collect dust.

I do the same with a lot of social media accounts. I'll just quit using the platform with one account, create a new one, and now it's that much more difficult to ever tie those two accounts together.

We leak so much data that we are the biggest threat to our own privacy.

Most people gain very little from services like Proton because they're too busy spewing identifiable data on social media.
 
  • Disagree
Reactions: PommeFruits
What's the problem? The bridge runs in the background. Once installed you don't even notice it's there. It's essentially a protocol translator between a standard email client and Proton's server API. It is necessary because IMAP and SMTP aren't really designed for end-to-end encrypted email and key management. Other encrypted providers such as Tutanota or Skiff have no option at all to use a client.

Do a search for "Proton bridge problems"

It's hardly seamless. It is meant to be, but it's buggy and problematic. But that's to be expected given that IMAP and SMTP were never meant to do the job they're being asked to do.
 
You've made a good point. Looks like a doomsday scenario where these supercomputers battle each other to create and break each other's encryption algorithms. Probably billions of times per second. You'll have to keep secrect data in air-gapped Faraday cages, powered only by onsite batteries. And only view it onsite.

Wait, you're not doing that now? LOL
 
  • Haha
Reactions: victorvictoria
So, if a US government agency got hold of your data, what could they do with it to harm you?
How likely is this scenario?

That's the thing, most people will never be in this scenario.

I often tell people that privacy is a phase young people often go through as part of puberty.

They suddenly wake up one day and discover that Google or Facebook can access their data and they go ballistic and sign up for a bunch of privacy groups and start buying Proton and a ton of "privacy" services they think will make them private.

Eventually, they grow up, need to apply for loans, pass a background check for a job, etc and realize that total privacy isn't attainable by most people without going completely off the grid and living in the mountains.

Almost all privacy (and security) involves inconvenience. Proton would be laughable as a competitor to Gmail if it wasn't for the encrypted inbox. They provide a much worse user experience than Gmail, they're less reliable, you have to use their app (on mobile) which is crap, etc.

Eventually, most people just get to a point in their lives where they're like, "I don't want to take care of my technology like I have a child. I just want it to work" and then they go with iCloud Mail or some other service that is somewhere between not caring about privacy at all (ie Gmail) and ultra-paranoid conspiracy theorist that thinks the government wants to read their emails to their Nana asking for $100 to pay rent this month.

If you are targeted by law enforcement or a nation-state level actor, you would need to become an expert on privacy and security to prevent them from getting your data. They just have too many resources compared to what you can buy to thwart them.

I mean, the Saudis "reportedly" were able to plant spyware on Jeff Bezos' phone. He surely has security experts who monitor his devices to prevent exactly this kind of thing from happening. If they can compromise Bezos' phone, do you really think a Proton Plus subscription is going to keep you safe? LOL
 
Somehow the link isn't working for me. It takes me to this page which says secure connection failed.

Edit, same with the read and learn more link. it takes first takes me to this address: https://go.skimresources.com/?id=73726X1523008&isjs=1&jv=15.4.2-stackpath&sref=https://forums.macrumors.com/threads/proton-drive-encrypted-cloud-storage-app-now-available-for-mac.2411789/page-3?post=32747653&url=https://proton.me/blog/bridge-security-model&xs=1&xtz=360&xuuid=e5d2ec1b745424fdf613d15e94a9b2ea&cci=5f7fc780f5712be54e6e7bcb7fe3bc84 and then https://go.getproton.me/aff_c?offer_id=26&aff_id=2355&aff_click_id=102fe9dacd145fa9eb1db1f95a25a8&aff_sub=73726X1523008X0aa34fef16f142923959b7dd96a40b50&url=https://proton.me/blog/bridge-security-model which takes me to a secure connection failed page.

Same thing happens with the first link in the article with the link to drive, I'm unable to view the announcement and get a secure connection failed page.
No idea what this skimresources thing is. Just open a blank browser tab, go and either type in the url to the proton blog article, or go to the proton site and browser until you find it. How spoonfed do you need to be ffs.
 
Good to know what you’re getting into:


so a 1 time mistake 9 years ago, and a vulnerability acknoledged and corrected quickly. Now let's see all the list of Apple, Google and Microsoft vulnerabilities and their level in transparency and reactivity when it comes to dealing with them... (as in: deflect, ignore, attack the messenger, wait another 6 months to correct at best, and maybe now and then aknowledge).
 
  • Like
Reactions: Rigby
First off, if it's encrypted, why does it matter if it's in Switzerland? If they have no access and no ability to access your data, why does it matter where the company stores the data?

I mean, ultimately they have complied with law enforcement warrants in the past so it's not like Switzerland is this magic place where laws don't apply. Their privacy laws are more strict than many other countries but if your security/privacy model relies on the location of your servers, how is that any different than security through obfuscation? In both cases you're hiding behind something that isn't guaranteed to protect you but you're hoping it provides some sort of defense.

They've way, way oversold the advantages of being located in Switzerland. You're about 90% of the privacy locating in Germany and the labor, hosting, bandwidth, etc costs and everything else would be much lower.

In other words, it's more a marketing thing than a real world use case thing.



Uhm, given that they didn't invent a lot of the tech behind their products, that's clearly untrue. Looks like they got you with their BS.



I store my files on all sorts of cloud data platforms like iCloud and Google Cloud. I also encrypt everything locally via Cryptomator. Please explain how this is less secure than paying Proton Cloud.

Plus, I didn't have to wait over a year for this supposedly privacy-focused company to finally put out a Mac version of their sync client.

I would strongly suggest reading up on the benefits of being/hosting in Switzerland rather just guessing top of your mind.
 
I'm not sure you're doing Proton any favors.

Proton Plus limits you to 10 aliases and one custom domain.

Mailbox.org limits you to 25 aliases on their domain, 50 aliases on each custom domain, and unlimited custom domains

And Mailbox.org is still cheaper.

This was a sticking point for a lot of users who wanted to follow best privacy practices and not disclose their proton email address and only give out their custom domain email address.

The only way to add more custom domains was to upgrade plans.

Ironically, Proton setting these silly limits gave rise to services like SimpleLogin and AnonAddy and Proton ended up having to buy SimpleLogin.

That's sort of my beef with Proton's pricing. They place a lot of artificial limits on the accounts that cost the company nothing. It's all designed to make people upgrade.

For instance, what does it cost for them to offer you more custom domains. Literally nothing. Why put an arbitrary limit on the number of custom domains?

Or, why is the Proton Bridge only available to paid plans? Once you've developed the app, there's no reason it costs more to let more people use it. If it's support, just say that you only provide support to paid customers.

And again, I have a major issue with the way they handled that rebranding.

They FOMO'd people into buying 2 or 3 year plans to lock in a lower rate and then when the new pricing came out many people realized that they didn't need all of the new stuff bundled into their plan and wanted to downgrade.

Of course, Proton refunded them, right? LOL, no. They downgraded them and kept the money and said they would apply the difference to their contract length. Total cash grab.



That's also a bit of a potentially confusing statement.

There are different levels of encryption. There's zero encryption where everything is plaintext. There's encrypted at rest which means that anytime the drives are stopped they need be decrypted before they can be used again. And then there's Proton which encrypts every mailbox with PGP so even if the police seized the hard drive while the computer was still running they couldn't access the mailbox.

Many of Proton's competitors encrypt when the drive is powered down. So someone would have to access the drive while it was still running to get the data.

It's not like there's no encryption. It's just a different level of encryption.

Likewise it's also confusing that you mixed mailbox encryption and data encrypted on cloud storage. I'm quite happy using Cryptomator to encrypt all of my files and then putting them on any cloud service provider.

If someone wants to brute force my 35 charachter password, good luck on that.

Personally, I prefer to recognize that email is an inherently insecure messaging platform and if I have information that I really don't want compromised, I don' t use email.

This is another pet peeve of mine. Why can't we just acknowledge that nothing secure should be sent via email rather than putting all of this effort and inconvenience into trying to make something that isn't designed to be secure into being somewhat secure?

The vast, vast, vast, vast majority of security and privacy breaches don't come from some dude cracking your email encryption, they come from stuff like weak passwords, being tricked into giving up credentials, etc.

I mean, what is the point of encrypting the email on server hard drive and then allowing users to download the data to their own hard drive via Proton Bridge where it's unencrypted? If I was a law enforcement agent you just saved me a trip to Switzerland because all I need to do is gain access to your laptop while you're logged in.

While I'm not saying that Proton is useless, I am saying that the use cases where Proton makes sense for someone to use as their primary email are fairly limited if someone simply uses basic security/privacy best practices (ie like not sending sensitive data via email).

Privacy and security aren't things you can install or services you can buy. Those things are just tools. But if you don't understand the fundamental concepts behind the tools, the tools are essentially a false sense of security. And unfortunately, most of the people buying Proton products/services have no idea about the basics of privacy or security.

Personally, I don't care if my mailbox is PGP encrypted or not. Nowadays 99% of my emails are regarding accounts I hold on sites like this or my bank. That data could be easily retrieved without going to Proton via a warrant to any company I have an account with where I've used my email as my login credential.

I also cycle through accounts and email providers every few years so I never accumulate too much history on anyone's servers.

And in case you're wondering, I have worked in grey market industries where people take this stuff seriously.

The one thing I learned early on was that you should always understand your threat profile. What information am I protecting? How valuable is that information? What is the worst case scenario if someone else obtains this information? Who might try to get this information? What resources do they have at their disposal (ie are they a nation-state, some dude with a vendetta but only $47 in his bank account, a Russian hacker trying to extort me for a big payday, etc)?

That's why I say, most of it is overkill. Most people haven't even figured out what they're protecting or from who.

If all you want is for Google not to read your email, use Apple iCloud Mail. If you have reason to believe someone is actually targeting you, maybe choose an overseas email provider. If you are being targeted by a well funded adversary like law enforcement or a nation-state actor, whether or not Proton encrypts your mailbox is really the least of your worries.

That's the thing, most people will never be in this scenario.

I often tell people that privacy is a phase young people often go through as part of puberty.

They suddenly wake up one day and discover that Google or Facebook can access their data and they go ballistic and sign up for a bunch of privacy groups and start buying Proton and a ton of "privacy" services they think will make them private.

Eventually, they grow up, need to apply for loans, pass a background check for a job, etc and realize that total privacy isn't attainable by most people without going completely off the grid and living in the mountains.

Almost all privacy (and security) involves inconvenience. Proton would be laughable as a competitor to Gmail if it wasn't for the encrypted inbox. They provide a much worse user experience than Gmail, they're less reliable, you have to use their app (on mobile) which is crap, etc.

Eventually, most people just get to a point in their lives where they're like, "I don't want to take care of my technology like I have a child. I just want it to work" and then they go with iCloud Mail or some other service that is somewhere between not caring about privacy at all (ie Gmail) and ultra-paranoid conspiracy theorist that thinks the government wants to read their emails to their Nana asking for $100 to pay rent this month.

If you are targeted by law enforcement or a nation-state level actor, you would need to become an expert on privacy and security to prevent them from getting your data. They just have too many resources compared to what you can buy to thwart them.

I mean, the Saudis "reportedly" were able to plant spyware on Jeff Bezos' phone. He surely has security experts who monitor his devices to prevent exactly this kind of thing from happening. If they can compromise Bezos' phone, do you really think a Proton Plus subscription is going to keep you safe? LOL
We get it. You don’t like proton. no need to rant the same rant over and over again.
 
I would strongly suggest reading up on the benefits of being/hosting in Switzerland rather just guessing top of your mind.
I have and since I actually understand data privacy and security, I find it of questionable value.

I'll even respond to Proton's own explanation:


Unless you host your servers on a boat in international waters, you must be under some legal jurisdiction. Choosing one is particularly important because, as the Lavabit example(new window) shows, local laws can have an existential impact on the service. Given that we serve users with highly sensitive privacy and security requirements from around the world, Switzerland, being outside of US and EU jurisdiction, has the advantage of being a neutral location.

So, for normal users, not relevant. If I have DOJ or the EU coming after me, the least of my worries is whether or not they can compel Proton to give them access to my email.

If you are involved in anything that would spark the interest of the US DOJ or any EU law enforcement, I would just assume that my email is compromised. If you don't think the NSA hasn't parked a data funnel in front of Proton's servers and is reading plain text emails going in and out of Proton, you're seriously not understanding the scale of data surveillance.

And, like I said several times before, don't use email for secure communications. It's not secure. No amount of band-aids can make it secure. If it ever travels across a public network unencrypted, it's not secure.

In fact, Proton grabs (and stores) the meta data and the sender and subject line from your emails in order to make them easier to search without heaving to download the entire message from their servers.

Here's a quote from their privacy policy


Account Activity: Due to limitations of the SMTP protocol, we have access to the following email metadata: sender and recipient email addresses, the IP address incoming messages originated from, attachment name, message subject, and message sent and received times. We do NOT have access to encrypted message content, but unencrypted messages sent from external providers to your Account, or from Proton Mail to external unencrypted email services, are scanned for spam and viruses to pursue the legitimate interest of protecting the integrity of our Services and users. Such inbound messages are scanned for spam in memory, and then encrypted and written to disk. We do not possess the technical ability to scan the content of the messages after they have been encrypted. We also have access to the following records of Account activity: number of messages sent, amount of storage space used, total number of messages, last login time. User data is never used for advertising purposes.

Glad they're in Switzerland. LOL.

And let's not forget the whole incident a few years back where they handed over data about a French climate activist.

They literally said that they didn't collect IP addresses and this incident forced them to admit that they did.

Being in Switzerland doesn't make you honest. :)

Here in a different blog post they respond to the backlash after having given over the data on the French climate activist (bolding is their bolding).

No matter what service you use, unless it is based 15 miles offshore in international waters, the company will have to comply with the law. The Swiss legal system, while not perfect, does provide a number of checks and balances, and it’s worth noting that even in this case, approval from 3 authorities in 2 countries was required, and that’s a fairly high bar which prevents most (but obviously not all) abuse of the system. Under Swiss law, it is also obligatory for the suspect to be notified that their data was requested, which is not the case in most countries. Finally, Switzerland generally will not assist prosecutions from countries without fair justice systems.

Here's more from the blog post about giving over data to the French gov.

In this case, Proton received a legally binding order from Swiss authorities which we are obligated to comply with. There was no possibility to appeal this particular request.

As detailed in our transparency report(new window), our published threat model(new window), and also our privacy policy(new window), under Swiss law, Proton can be forced to collect information on accounts belonging to users under Swiss criminal investigation. This is obviously not done by default, but only if Proton gets a legal order for a specific account.

Wait, didn't they say in the reasons they're located in Switzerland that the person has to be notified and can appeal? Oh, that's not true in all cases. Proton selectively quoted Swiss law as a marketing gimmick. Hmmm.
 
Register on MacRumors! This sidebar will go away, and you'll see fewer ads.