I haven’t noticed any overt slowdowns.how are the speeds on Sync.com? I hear those cloud storage services have attractive prices but they limit speeds
I haven’t noticed any overt slowdowns.how are the speeds on Sync.com? I hear those cloud storage services have attractive prices but they limit speeds
You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?Nope, you have to run some kind of system where it forwards the emails to a program on your computer and then that program sends the emails to your desired email app.
![]()
Proton Mail Bridge Apple Mail setup guide | Proton
How to configure Apple Mail for macOS to use Proton Mail Bridgeproton.me
What's the problem? The bridge runs in the background. Once installed you don't even notice it's there. It's essentially a protocol translator between a standard email client and Proton's server API. It is necessary because IMAP and SMTP aren't really designed for end-to-end encrypted email and key management. Other encrypted providers such as Tutanota or Skiff have no option at all to use a client.
Why do I have to pay them a monthly subscription for the privilege of having to run a server on my own hardware?You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?
Proton is all about securing all possible links of the chain. IMAP isn't secure, so if the user wanted to use a heavy desktop client (outlook, mail, thunderbird...) they could either have built a new secure mail protocol from scratch and then waited about a millenia for it to become and RFC and desktop clients to catch up maybe implementing it, or the smarter way, secure the link between the local machine and their servers, and have a local IMAP server running locally to enable compatibility with mail clients. Thus: proton bridge. And to do so, they actually recreated from the ground an ultra optimised IMAP implementation (and opensourced it ifaik)
Read and learn: https://proton.me/blog/bridge-security-model
man come on...Why do I have to pay them a monthly subscription for the privilege of having to run a server on my own hardware?
Email, contacts and calendar are exactly the iCloud services that are not end-to-end encrypted with "advanced data protection", so if you value that Proton is actually a good complement. If not, iCloud is a better deal for Apple users.I like Proton a lot. But, the prices keep moving higher and higher. I’m already paying for iCloud + and Proton seems to duplicate most of what I get from iCloud and Mullvad VPN. If my main concern is privacy, is Proton offering any advantage over moving my custom domain to iCloud?
Yes, any code can be broken if you have enough time. Strong keys take a LONG time to break like billions of years. OK in a few decades, computers will be faster and it will only take millions of years. But then they simply make even longer keys.Prediction: In 10 years or less, probably much less, advances in artificial intelligence and supercomputing will bring to state-sponsored hacker's computer a means to break every encryption method in use today. There is no secret code that can't be broken.
Running your own email server is a big pain in the a**, since you have to deal with things like your mail server reputation. You also have to spend significant time to stay on top of security updates etc. if you don't want your server to be breached or abused by spammers.My most important files usually are emails, text files and Excel files. Those add up to less than 100 MB. I do not need a paid service for that. And uploading photos to a cloud is just to expensive. You need terabytes of storage for photos and even more for videos. That will costs you hundreds or even thousands of dollars per year.
Apple is not the primary threat (altho I don't trust them much more than Google). The U.S. government is the threat.
You imply that there is no way to preempt or back-door encryption schemes. U.S.-based storage is not only susceptible to after-the-fact warrants, but preemptive FISA orders that could require active surveillance measures. The Swiss are immune to FISA orders (or any other external state entity).
Apple is not the threat - it's the U.S. government.
NO, Proton does not have to comply with U.S. warrants or any other U.S. requests - they're in Switzerland. Do you understand how national sovereignty works?
Somehow the link isn't working for me. It takes me to this page which says secure connection failed.You're really overdoing the dumbness here. You do (I really hope so) understand why there's a bridge app, don't you?
Proton is all about securing all possible links of the chain. IMAP isn't secure, so if the user wanted to use a heavy desktop client (outlook, mail, thunderbird...) they could either have built a new secure mail protocol from scratch and then waited about a millenia for it to become and RFC and desktop clients to catch up maybe implementing it, or the smarter way, secure the link between the local machine and their servers, and have a local IMAP server running locally to enable compatibility with mail clients. Thus: proton bridge. And to do so, they actually recreated from the ground an ultra optimised IMAP implementation (and opensourced it ifaik)
Read and learn: https://proton.me/blog/bridge-security-model
You've made a good point. Looks like a doomsday scenario where these supercomputers battle each other to create and break each other's encryption algorithms. Probably billions of times per second. You'll have to keep secret data in air-gapped Faraday cages, powered only by onsite batteries. And only view it onsite.While computers will get stronger, so will encryption. It will still be a cat and mouse game.
Different priorities. For example, Mailbox.org doesn't support hardware keys for 2FA, generally has a very weird and less secure 2FA scheme, has a much less capable filtering system (Proton even lets you write your own Sieve filters), and has a pretty crappy web interface. OTOH, I have no use for "unlimited custom domains"; I just need one.
I don't entirely disagree with you here. It actually used to be possible to add more custom domains for a small fee, rather than upgrading to the twice as expensive "unlimited" plan. Their new pricing scheme is obviously designed to increase the ARPU by selling you things that you don't necessarily need, such as their VPN service. Nonetheless, I find their "plus" plan not really more expensive than other ad-free providers.
The IMAP Bridge actually causes increased load on their API due to the constant syncing.
I think it is quite generous of them to offer a free plan at all, given that those accounts cost money to maintain and create zero revenue. Essentially they are subsidized by paying users. Mailbox.org or Fastmail don't offer free accounts at all.
Your mailbox is literally stored in in the cloud.
What's your alternative? Email is still indispensable due to it's ubiquitous availability and asynchronous nature. Banks and other online services won't let you sign up via ephemeral chat anytime soon.
Insider threats and breaches, for example. It also makes it impossible for the provider to monetize your data.
I don't use a secure email provider to hide from law enforcement. I'm far more concerned about data breaches and surveillance capitalism. But I also think that for less fortunate people living under authoritarian governments a service like Proton can be crucial.
What's the problem? The bridge runs in the background. Once installed you don't even notice it's there. It's essentially a protocol translator between a standard email client and Proton's server API. It is necessary because IMAP and SMTP aren't really designed for end-to-end encrypted email and key management. Other encrypted providers such as Tutanota or Skiff have no option at all to use a client.
You've made a good point. Looks like a doomsday scenario where these supercomputers battle each other to create and break each other's encryption algorithms. Probably billions of times per second. You'll have to keep secrect data in air-gapped Faraday cages, powered only by onsite batteries. And only view it onsite.
So, if a US government agency got hold of your data, what could they do with it to harm you?
How likely is this scenario?
No idea what this skimresources thing is. Just open a blank browser tab, go and either type in the url to the proton blog article, or go to the proton site and browser until you find it. How spoonfed do you need to be ffs.Somehow the link isn't working for me. It takes me to this page which says secure connection failed.
Edit, same with the read and learn more link. it takes first takes me to this address: https://go.skimresources.com/?id=73726X1523008&isjs=1&jv=15.4.2-stackpath&sref=https://forums.macrumors.com/threads/proton-drive-encrypted-cloud-storage-app-now-available-for-mac.2411789/page-3?post=32747653&url=https://proton.me/blog/bridge-security-model&xs=1&xtz=360&xuuid=e5d2ec1b745424fdf613d15e94a9b2ea&cci=5f7fc780f5712be54e6e7bcb7fe3bc84 and then https://go.getproton.me/aff_c?offer_id=26&aff_id=2355&aff_click_id=102fe9dacd145fa9eb1db1f95a25a8&aff_sub=73726X1523008X0aa34fef16f142923959b7dd96a40b50&url=https://proton.me/blog/bridge-security-model which takes me to a secure connection failed page.
Same thing happens with the first link in the article with the link to drive, I'm unable to view the announcement and get a secure connection failed page.
so a 1 time mistake 9 years ago, and a vulnerability acknoledged and corrected quickly. Now let's see all the list of Apple, Google and Microsoft vulnerabilities and their level in transparency and reactivity when it comes to dealing with them... (as in: deflect, ignore, attack the messenger, wait another 6 months to correct at best, and maybe now and then aknowledge).Good to know what you’re getting into:
![]()
Lesson Learned from ProtonMail Incident: Do Not Pay Cybercriminals - Wiadomości bezpieczeństwa | Trend Micro (PL)
End-to-end encryption email service ProtonMail learned a costly lesson about cyber ransom tactics: just because hackers demanded a ransom, it doesn’t mean the attacks are going to stop once you pay up.www.trendmicro.com
![]()
ProtonMail Code Vulnerabilities Leaked Emails
Twitter @Hackread - Facebook @ /Hackreadwww.hackread.com
First off, if it's encrypted, why does it matter if it's in Switzerland? If they have no access and no ability to access your data, why does it matter where the company stores the data?
I mean, ultimately they have complied with law enforcement warrants in the past so it's not like Switzerland is this magic place where laws don't apply. Their privacy laws are more strict than many other countries but if your security/privacy model relies on the location of your servers, how is that any different than security through obfuscation? In both cases you're hiding behind something that isn't guaranteed to protect you but you're hoping it provides some sort of defense.
They've way, way oversold the advantages of being located in Switzerland. You're about 90% of the privacy locating in Germany and the labor, hosting, bandwidth, etc costs and everything else would be much lower.
In other words, it's more a marketing thing than a real world use case thing.
Uhm, given that they didn't invent a lot of the tech behind their products, that's clearly untrue. Looks like they got you with their BS.
I store my files on all sorts of cloud data platforms like iCloud and Google Cloud. I also encrypt everything locally via Cryptomator. Please explain how this is less secure than paying Proton Cloud.
Plus, I didn't have to wait over a year for this supposedly privacy-focused company to finally put out a Mac version of their sync client.
Oh boo hooI thought publishers were required to disclose when they publish sponsored content. Why is Macrumors not doing so? This article reeks of an advertorial.
I'm not sure you're doing Proton any favors.
Proton Plus limits you to 10 aliases and one custom domain.
Mailbox.org limits you to 25 aliases on their domain, 50 aliases on each custom domain, and unlimited custom domains
And Mailbox.org is still cheaper.
This was a sticking point for a lot of users who wanted to follow best privacy practices and not disclose their proton email address and only give out their custom domain email address.
The only way to add more custom domains was to upgrade plans.
Ironically, Proton setting these silly limits gave rise to services like SimpleLogin and AnonAddy and Proton ended up having to buy SimpleLogin.
That's sort of my beef with Proton's pricing. They place a lot of artificial limits on the accounts that cost the company nothing. It's all designed to make people upgrade.
For instance, what does it cost for them to offer you more custom domains. Literally nothing. Why put an arbitrary limit on the number of custom domains?
Or, why is the Proton Bridge only available to paid plans? Once you've developed the app, there's no reason it costs more to let more people use it. If it's support, just say that you only provide support to paid customers.
And again, I have a major issue with the way they handled that rebranding.
They FOMO'd people into buying 2 or 3 year plans to lock in a lower rate and then when the new pricing came out many people realized that they didn't need all of the new stuff bundled into their plan and wanted to downgrade.
Of course, Proton refunded them, right? LOL, no. They downgraded them and kept the money and said they would apply the difference to their contract length. Total cash grab.
That's also a bit of a potentially confusing statement.
There are different levels of encryption. There's zero encryption where everything is plaintext. There's encrypted at rest which means that anytime the drives are stopped they need be decrypted before they can be used again. And then there's Proton which encrypts every mailbox with PGP so even if the police seized the hard drive while the computer was still running they couldn't access the mailbox.
Many of Proton's competitors encrypt when the drive is powered down. So someone would have to access the drive while it was still running to get the data.
It's not like there's no encryption. It's just a different level of encryption.
Likewise it's also confusing that you mixed mailbox encryption and data encrypted on cloud storage. I'm quite happy using Cryptomator to encrypt all of my files and then putting them on any cloud service provider.
If someone wants to brute force my 35 charachter password, good luck on that.
Personally, I prefer to recognize that email is an inherently insecure messaging platform and if I have information that I really don't want compromised, I don' t use email.
This is another pet peeve of mine. Why can't we just acknowledge that nothing secure should be sent via email rather than putting all of this effort and inconvenience into trying to make something that isn't designed to be secure into being somewhat secure?
The vast, vast, vast, vast majority of security and privacy breaches don't come from some dude cracking your email encryption, they come from stuff like weak passwords, being tricked into giving up credentials, etc.
I mean, what is the point of encrypting the email on server hard drive and then allowing users to download the data to their own hard drive via Proton Bridge where it's unencrypted? If I was a law enforcement agent you just saved me a trip to Switzerland because all I need to do is gain access to your laptop while you're logged in.
While I'm not saying that Proton is useless, I am saying that the use cases where Proton makes sense for someone to use as their primary email are fairly limited if someone simply uses basic security/privacy best practices (ie like not sending sensitive data via email).
Privacy and security aren't things you can install or services you can buy. Those things are just tools. But if you don't understand the fundamental concepts behind the tools, the tools are essentially a false sense of security. And unfortunately, most of the people buying Proton products/services have no idea about the basics of privacy or security.
Personally, I don't care if my mailbox is PGP encrypted or not. Nowadays 99% of my emails are regarding accounts I hold on sites like this or my bank. That data could be easily retrieved without going to Proton via a warrant to any company I have an account with where I've used my email as my login credential.
I also cycle through accounts and email providers every few years so I never accumulate too much history on anyone's servers.
And in case you're wondering, I have worked in grey market industries where people take this stuff seriously.
The one thing I learned early on was that you should always understand your threat profile. What information am I protecting? How valuable is that information? What is the worst case scenario if someone else obtains this information? Who might try to get this information? What resources do they have at their disposal (ie are they a nation-state, some dude with a vendetta but only $47 in his bank account, a Russian hacker trying to extort me for a big payday, etc)?
That's why I say, most of it is overkill. Most people haven't even figured out what they're protecting or from who.
If all you want is for Google not to read your email, use Apple iCloud Mail. If you have reason to believe someone is actually targeting you, maybe choose an overseas email provider. If you are being targeted by a well funded adversary like law enforcement or a nation-state actor, whether or not Proton encrypts your mailbox is really the least of your worries.
We get it. You don’t like proton. no need to rant the same rant over and over again.That's the thing, most people will never be in this scenario.
I often tell people that privacy is a phase young people often go through as part of puberty.
They suddenly wake up one day and discover that Google or Facebook can access their data and they go ballistic and sign up for a bunch of privacy groups and start buying Proton and a ton of "privacy" services they think will make them private.
Eventually, they grow up, need to apply for loans, pass a background check for a job, etc and realize that total privacy isn't attainable by most people without going completely off the grid and living in the mountains.
Almost all privacy (and security) involves inconvenience. Proton would be laughable as a competitor to Gmail if it wasn't for the encrypted inbox. They provide a much worse user experience than Gmail, they're less reliable, you have to use their app (on mobile) which is crap, etc.
Eventually, most people just get to a point in their lives where they're like, "I don't want to take care of my technology like I have a child. I just want it to work" and then they go with iCloud Mail or some other service that is somewhere between not caring about privacy at all (ie Gmail) and ultra-paranoid conspiracy theorist that thinks the government wants to read their emails to their Nana asking for $100 to pay rent this month.
If you are targeted by law enforcement or a nation-state level actor, you would need to become an expert on privacy and security to prevent them from getting your data. They just have too many resources compared to what you can buy to thwart them.
I mean, the Saudis "reportedly" were able to plant spyware on Jeff Bezos' phone. He surely has security experts who monitor his devices to prevent exactly this kind of thing from happening. If they can compromise Bezos' phone, do you really think a Proton Plus subscription is going to keep you safe? LOL
I have and since I actually understand data privacy and security, I find it of questionable value.I would strongly suggest reading up on the benefits of being/hosting in Switzerland rather just guessing top of your mind.
Unless you host your servers on a boat in international waters, you must be under some legal jurisdiction. Choosing one is particularly important because, as the Lavabit example(new window) shows, local laws can have an existential impact on the service. Given that we serve users with highly sensitive privacy and security requirements from around the world, Switzerland, being outside of US and EU jurisdiction, has the advantage of being a neutral location.
Account Activity: Due to limitations of the SMTP protocol, we have access to the following email metadata: sender and recipient email addresses, the IP address incoming messages originated from, attachment name, message subject, and message sent and received times. We do NOT have access to encrypted message content, but unencrypted messages sent from external providers to your Account, or from Proton Mail to external unencrypted email services, are scanned for spam and viruses to pursue the legitimate interest of protecting the integrity of our Services and users. Such inbound messages are scanned for spam in memory, and then encrypted and written to disk. We do not possess the technical ability to scan the content of the messages after they have been encrypted. We also have access to the following records of Account activity: number of messages sent, amount of storage space used, total number of messages, last login time. User data is never used for advertising purposes.
No matter what service you use, unless it is based 15 miles offshore in international waters, the company will have to comply with the law. The Swiss legal system, while not perfect, does provide a number of checks and balances, and it’s worth noting that even in this case, approval from 3 authorities in 2 countries was required, and that’s a fairly high bar which prevents most (but obviously not all) abuse of the system. Under Swiss law, it is also obligatory for the suspect to be notified that their data was requested, which is not the case in most countries. Finally, Switzerland generally will not assist prosecutions from countries without fair justice systems.
In this case, Proton received a legally binding order from Swiss authorities which we are obligated to comply with. There was no possibility to appeal this particular request.
As detailed in our transparency report(new window), our published threat model(new window), and also our privacy policy(new window), under Swiss law, Proton can be forced to collect information on accounts belonging to users under Swiss criminal investigation. This is obviously not done by default, but only if Proton gets a legal order for a specific account.