Encrypted services Apple, Proton and Wire helped Spanish police identify activist | TechCrunch ( techcrunch.com )

By the way, the earlier posted article https://restoreprivacy.com/protonmail-discloses-user-data-leading-to-arrest-in-spain had an update starting at the paragraph with title Update: Statement from Proton and additional commentary

Scolding0513 ,

Why has proton written somewhere exactly what data can be handed over to police? if there is, they need to be promoting this information more

Railcar8095 ,

https://proton.me/legal/law-enforcement

They never said they will fight law enforcement, this is the 1000th time this happens.

AnAnonymous ,

OpSec fail, never ever use any personal info when you are dealing with something you don't want to be indentified for, it include obviously recovery emails, usernames and passwords.

SolarPunker ,

Do not trust companies.

Lettuceeatlettuce ,
@Lettuceeatlettuce@lemmy.ml avatar

Obligatory reminder:

Email is not a secure medium! If you need truly secure and/or anonymous communications, DON'T USE EMAIL!

Use a platform/protocol designed from the ground up for those things!

schwim ,
@schwim@lemm.ee avatar

“Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,..."

I love that proton kept referring to the user as the "terror suspect" repeatedly so we would know they're really the good guy here.

ryannathans ,

Well it was anti terror laws that were invoked..

lemmyreader OP ,

Exactly. What makes this a bit complicated and maybe interesting from a historical point of view is that this is about Spain. A country which has been very slow with removing some of the "relics" from the fascist Franco era (Franco died in 1975) and at the same time having regions that long for independence like Basque country and Catalunya (and the post topic is related to that, Catalunya aiming for independence). Since the Twin Towers attacks in 2001 the words "terror suspect" and "terrorists" have been used much more often (also by ordinary "normies" people that I knew) and maybe not always rightly so.

schwim ,
@schwim@lemm.ee avatar

Thanks very much for the clarification to the context, I really appreciate it as someone who had no idea.

lemmyreader OP ,

You're welcome.

homesweethomeMrL ,

If you sign up for a service using real information that can be traced to you (as in this case: home address, personal email) and then do illegal* things with the account, don’t.

The * here is that what the alleged protester allegedly did or said is irrelevant. And the article is pretty clickbaity, unless the author was unaware of how online accounts work.

SecurityPro ,
@SecurityPro@lemmy.ml avatar

"helped" is very misleading. Companies can't refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

lemmyreader OP ,

“helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

You are suggesting all these companies are completely helpless against legal requests. That is not correct. A company should first make clear that the legal request is actually completely legitimate and correct. After that they can look at whether they should provide the information or not.

See the data here :

SecurityPro ,
@SecurityPro@lemmy.ml avatar

As someone who has worked fraud and online investigations, and both written and served search warrants; it is not an option. A probable cause affidavit is presented to a judge and if the judge agrees there is sufficient probable cause, a search warrant is issued. This is an order by the judge and not optional. The judge can hold the company in contempt if they refuse to obey his/her order.

Deckweiss , (edited )

Read the blog by the guy behind cock.li , he refused multiple illegitimate warrants so far.

What matters is the jurisdiction of the service, not the one of the warrant author, otherwise china would have already warranted all data of all other world citizens lol

Railcar8095 ,

Proton complies with Swiss law, and has to be channeled through Swiss official channels who rely the request.

So there's jurisdiction.

Deckweiss , (edited )

That is true. But I wasn't debating about this specific case, but rather the generalized statement.

The comment I replied to implies "If there is a warrant, it is always legitimate and you have to follow it, because a lawyer said so". That is not true and if it were the world would quickly go to shit, which I pointed out.

Railcar8095 ,

I would say your interpretation was a bit extreme. Nobody implied a warrant from anywhere in the world.

Deckweiss , (edited )

Again, it doesn't matter where the warrant fomes from. What matters is where it goes to.

And that detail is pretty important, while being completely left out. They say:

it is not an option.

But yes it is, depending on the jurisdiction.

refalo ,

Are you suggesting they didn't do those things? Good info either way.

Also there IS another alternative, the lavabit way... just go out of business /s

brunchyvirus ,

There is a great talk from the Lavabit CEO who discusses what happened to him and his company when they found out Snowden had an email at his company. I won't link it since it's YouTube but it's an hour long but he talks about his experience with the FBI and the courts. You can search for M3AAWG 2014 Keynote, I highly recommend it.

lemmyreader OP ,
helenslunch ,

A company should first make clear that the legal request is actually completely legitimate and correct.

What makes you think they didn't do that?

helenslunch ,

Yep, also using "requests" when they were not at all, they were demands.

otter ,
@otter@lemmy.ca avatar

Yep, which I think is why it's more important to see what data is being collected and stored, rather than giving up data based on how trustworthy an entity seems

If the tool doesn't collect or log the data to begin with, then there's nothing that can be stolen/taken/demanded

The solution in this case might be for Proton (and the other companies) to list out risks and data collection information along the way.

We need X in order to do Y. Read more on how Y works. Now here are some risks, and how to avoid them:

Upstream7564 ,

I think it's not the services fault that people aren't aware of the limits of encrypted services. They are not going to shut everythin' down just for a few people, if you need smth anonymous Proton is not for you.

Also, it's your task to have good opsec. If you give your iCloud email to Proton which has personal information sticked to it, you fault.

mumblerfish ,

Lavabit did, back in the day.

Upstream7564 ,
Fetus ,

Back in the day.

This makes me feel old.

EngineerGaming ,
@EngineerGaming@feddit.nl avatar

I do not blame Proton for complying with a request - it is a completely expected action from a company. However, I would blame them for advertising that makes them seem safer than they are for people who don't know better.

helenslunch ,

I would blame them for advertising that makes them seem safer than they are

What kind of advertising are you referring to exactly?

refalo ,

They are not going to shut everythin’ down just for a few people

Although lavabit did...

Upstream7564 ,

You can't compare Lavabit to Proton.

And you can't compare urself to Edward Snowden.

ReversalHatchery ,

if you need smth anonymous Proton is not for you.

Oh it is for you, but you have to be careful. Proton won't try to find out info you didn't give them, but they can't pretend that they don't have info that they actually have. They run an onion service, and account recovery is made possible without a recovery contact.

N0x0n ,

Imagine talking about opsec and iCloud in the same sentence 🫣🤭

helenslunch ,

if you need smth anonymous Proton is not for you.

I mean, there are better options, but you can also use Proton anonymously. Just have to use it appropriately. If you use it to send your name to the FBI, there ain't nothin Proton can do about that. Same if you link a recovery email linked to a personal account.

Vendetta9076 ,
@Vendetta9076@sh.itjust.works avatar

"Encrypted"

Squeak ,

Yes. They never gave away content of emails, because they couldn’t even if they wanted to. It’s encrypted.

They gave the recovery email for the account to the authorities, which was an iCloud account tied to the user’s real name.

Vendetta9076 ,
@Vendetta9076@sh.itjust.works avatar

I know you're correct about proton. Didn't realize they were all like that.

cyrus ,
@cyrus@sopuli.xyz avatar

Proton and Wire didn't share any decrypted ciphertexts, Wire shared a ProtonMail address and Proton an iCloud Address that they had set as a recovery method.

Personal info like where they live came from Apple.

Vendetta9076 ,
@Vendetta9076@sh.itjust.works avatar

I know wire and proton are encrypted. Apple services certainly aren't though.

panicnow ,

Most Apple services can be encrypted including iCloud. Basically email and calendaring are not covered.

https://support.apple.com/en-us/102651#advanced

If you set it up as “advanced” then only you hold the recovery keys.

helenslunch ,

A lot of them are, actually

Railcar8095 ,

They didn't require any encrypted data. Apple has your name and payment details unencrypted, as they need them to charge you.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • privacy@lemmy.ml
  • random
  • All magazines