Proton will no longer post on Mastodon
-
"Privacy is important, so you can follow our latest updates exclusively on the platforms that don't give a shit about privacy"
-
Tuta is great, I will start from that. But they encrypt the subject line, in addition to the body afaik. It is technically impossible to encrypt "every part of the email" because that would break delivery (e.g., metadata such as recipient or timestamps).
This also has the cost of a nonstandard protocol (not plain PGP), with all that implies in terms of compatibility, maintenance needs etc.
-
Was it ever? I ditched them years ago when they tried to gaslight people that e2ee in javascript in browser is secure.
-
due to limited resources
Either:
- We have lost our password
- Our C and V keys are broken and we can not copy paste our social media messages anymore
-
Funny that the crypto wallet also upset people in the space who like crypto. Because crypto, IF USED CORRECTLY, can be a privacy tool (because it is the main way to pay online that can be utilized without KYC). However, such people got upset not just with Proton broadening their product scope for no reason, but also the fact that Monero was not even considered, despite it having built-in privacy protections unlike Bitcoin, and overall being agreed on as today's "digital cash".
-
TBF, they push the same content via their email newsletter.
-
Sender and recipient can't be encrypted e2e. How would the server know to whom deliver the email if those are encrypted and not visible to it?
AFAIK tuta encryption extends to the subject line only.
Still a nice addition, don't get me wrong, but I believe you misunderstood something.
From their own doc:
The only unencrypted data are mail addresses of users as well as senders and recipients of emails.
Contacts and everything else is encrypted similarly in all "secure email" providers, including Proton.
-
That's a fair point about the portability of their protocol. And yeah, you're right that they don't encrypt everything. I'd meant to say "they encrypt everything you can encrypt without making the email undeliverable" but my fingers decided to type something else.
-
Will be missed /s
-
Privacy isn’t particularly good in the fediverse. Any federated instance can track you as much as they want without you ever knowing or consenting.
Self hosting Lemmy is straightforward. Then subscribe to all communities and now you have a treasure trove of data to mine. If you modify the code a bit you can do more like keep deleted posts around or surveil user activities in real time.
-
Security is hardly a binary property.
Given you mention the specific technical setup, I would say yes - that is secure against most risks relevant for most people.
At least, it's totally fine according to my own threat model, where I looked specifically at broswer-based encryption vs "manual" encryption (I.e. using PGP tools locally).
-
Especially since reddit is quite ban happy about political narratives right now, gearing the site like with Facebook, who only pushes right wing.
-
Reddit allows more control and is much aggressive in banning people sitewide as of recently. If you attempt to report a comment on reddit, you can get banned instead by the mod
-
They will leave Blue sky for twitter once , people find out as well
-
And reddit has been extra aggressive in allowing mods ban users more easier too, as of this month. Now some mods are "cahoots with admins"
-
I predict they will mostly be on X and Meta platform
-
On a platform, that will ban you if you look at it wierd
-
They wrote that they don't want to "write and forget" but engage with people (as they do on Reddit, for better or worse).
I think it's opinable, but it sounds reasonable to me. What is the value of having an official account which just reposts one-way communication already published on the blog and on the newsletter? Anybody can build such a bot, but it's not "presence" the way I interpret it. -
It is nuanced, but having the ability to selectively serve malicious javascript stealing keys to specific people only on one access is considerable issue in practice, compared to distributing binary where you would generally have the same binary for everyone and you are able to archive and analyse it.
-
Well, yes-ish.
An organization with resources to coerce or compromise Proton or similar wouldn't have trouble identifying individual users "well enough" (trivially, IP address). At that point there is absolutely nothing stopping a package distributor to serve different content by IP. Not even signatures help in this context, as the signature still comes from the same party coerced or compromised.
Also most people won't (or are unable to) analyze every code change after every update, which means in practice detection is even more unlikely for OS packages than it is for web pages (much easier to debug code and see network flows). The OS attack surface is also much broader.
In general anyway, this is such a sophisticated attack (especially the targeted nature of it) that it's not relevant for the vast, vast majority of people.
If you deal with super sensitive data you can build your proton client directly, or simply use the bridge (which ultimately is exactly like other client-side tooling), so for those very rare corner cases where this threat is relevant, a solution exists. Actually, in those cases you probably don't want to use mail in general.
So my question is, who is the threat actor you are concerned about?All in all I think that labeling "insecure" the setup for this I think is not accurate and can paint a wrong picture to people less technically competent.