cross-posted from : https://lemmy.zip/post/60387297

Proton Mail provided Swiss authorities with payment data for defendtheatlantaforest@protonmail.com — the account linked to Stop Cop City protests in Atlanta. The FBI obtained this information through a Mutual Legal Assistance Treaty request on January 25, 2024, identifying the activist behind the anonymous account through their credit card identifier.

  • hector@lemmy.today
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    5 hours ago

    I signed up for a proton account and they immediately suspended it for “suspicious activity.”

    My IP is on some foreign blacklist I found out. No option to appeal or anything, no explanation, I would have to verify my account with personal information which defeats the purpose.

    Garbage company, 100% handing information to the cia and israel I bet.

  • Venia Silente@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    4
    ·
    6 hours ago

    And that’s why I only use Proton’s free tiers. If they are going to openly support Dementia Don and openly hand out their users to fascist governments like Spain or the US, then I can at least do my part by being a financial burden to them.

  • Fizz@lemmy.nz
    link
    fedilink
    English
    arrow-up
    27
    ·
    18 hours ago

    Proton is clear that they complie with legsl government requests and post stats about how many they fight and handover. They offer private ways to use the service and if you dont take them thats on you.

    • hector@lemmy.today
      link
      fedilink
      English
      arrow-up
      1
      ·
      5 hours ago

      Europe bullied them out of their tax haven status a decade or so back. Germany and others made them hand over tax scofflaw account details. It was in the papers don’t remember the year.

  • Kairos@lemmy.today
    link
    fedilink
    English
    arrow-up
    49
    arrow-down
    6
    ·
    22 hours ago

    No, they responded to a legal request by the swiss government to provide banking details.

    • earthworm@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      24
      arrow-down
      4
      ·
      22 hours ago

      Sounds just like Proton in the article:

      Proton AG clarified they shared no data directly with the FBI — technically accurate but missing the point.

        • earthworm@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          19
          arrow-down
          3
          ·
          21 hours ago

          The point is that the headline is true. Proton helped the FBI uncover that person’s identity, by revealing their banking information.

          Yes, it was legal for the Swiss government to request that information and for Proton to release it when asked.

          Those facts aren’t mutually exclusive.

          I don’t understand why you’re responding so aggressively.

          • Ibisalt@lemmy.world
            link
            fedilink
            English
            arrow-up
            5
            ·
            12 hours ago

            not directly related but on top of this, wasnt it the massive campaining and political pressure from us and eu that forced swiss banks to lift the swiss bank secrecy? maybe people start to understand this law exist(ed) for other reasons than tax evasion.

          • Kairos@lemmy.today
            link
            fedilink
            English
            arrow-up
            10
            arrow-down
            4
            ·
            edit-2
            21 hours ago

            Because people are like “OMG proton is such a snitch time to switch to <other service that will do the exact same thing>”

  • floquant@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    111
    arrow-down
    3
    ·
    1 day ago

    Again, they did not “aid” nor “give” that information. They were legally obliged to do so. There was never a choice. This could’ve happened with literally any company, E2EE stops them from being forced to turn over the emails themselves, but basic account metadata (creation date, payment methods, contact details, potentially IP access logs) will always be available. What you can do is limit the amount of information a provider requires/saves (for which Proton is a good choice) or don’t rely on a company at all and roll your own email server.

    • tb_@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      7 hours ago

      Furthermore, you can pay with bitcoin or even cash (sent to their HQ by mail). That way they’d have even less on you.

      • Venia Silente@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        5 hours ago

        Furthermore, you can pay with bitcoin or even cash (sent to their HQ by mail). That way they’d have even less on you.

        With the caveat that in some of their procedures they (seem to?) require to append account information in the mail, so if the postage can be traced back to you that’s an issue.

        • tb_@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          5 hours ago

          Yeah, not sure how it’d work with return addresses and whatnot. But if the letter itself is intercepted there’s probably more that can be used to trace back to you, unless you only handled the money and paper in a clean room.

    • Venator@lemmy.nz
      link
      fedilink
      English
      arrow-up
      10
      ·
      16 hours ago

      In this case, wouldn’t rolling your own email server make it even easier to find you, since they’ll just have to look up who registered the domain you used for your email address?

      • floquant@lemmy.dbzer0.com
        link
        fedilink
        English
        arrow-up
        4
        ·
        10 hours ago

        Depending on how you register the domain, there are some registrars that require no info at all. One of those paid with Monero creates no links to your identity.

        But yes, self-hosting does not shield you from court orders. If they find you they can still access your shit, depending on how much your country’s infosec police gives a shit and/or how closely they cooperate with US agencies.

    • idlesheep@piefed.blahaj.zone
      link
      fedilink
      English
      arrow-up
      42
      arrow-down
      2
      ·
      edit-2
      1 day ago

      In fact, knowing that the only thing Proton was able to hand over was the credit card identifier is pretty solid proof that they in fact cannot access (and thus provide access to) your email account and its contents.

      If full anonimity is the goal then stick to crypto or cash payments, because credit card always leaves a trail and not a single email provider is above the law in that regard.

      This case is entirely the fault of the user’s bad opsec.

    • joe@lemmy.world
      link
      fedilink
      English
      arrow-up
      26
      arrow-down
      1
      ·
      1 day ago

      Yeah, it’s the distinction between “anonymous” and “private”.

    • Rioting Pacifist@lemmy.world
      link
      fedilink
      English
      arrow-up
      6
      arrow-down
      1
      ·
      edit-2
      22 hours ago

      They litterally gave information they were legally required to

      E2EE stops them from being forced to turn over the emails themselves

      Except it doesn’t, E2EE in browser is pointless, they send your browser the code that does the dycription, they can just as easily send your browser code that does decyption & uploads the contents to themselves.

      Yes doing actual E2EE emails is harder because both ends need to use an email client and configure it to do encryption, but for amost all scenarios protonmail is no more technically secure than any other webmail provider.

      Scenario Gmail protonmail
      Legally required to hand over your emails can comply can comply the next time you use the account
      Datacenter breach emails encrypted at rest emails encrypted at rest
      Persistent threat within supplier can read your emails requires code injection capability

      I think offering per-user encryption that makes it harder for the company to data mine your emails is good, I just wish people would stop believing companies selling you “secure solutions”.

      In this case defendtheatlantaforest would have been more secure if they used any free email provider and GPG, yet there’s a cult-of-produce around protonmail as if it’s offering you a level of security that it can’t.

  • coalie@piefed.zip
    link
    fedilink
    English
    arrow-up
    55
    arrow-down
    2
    ·
    1 day ago

    They complied with Swiss law. Only the name on the credit card was given.

  • Ulrich@feddit.org
    link
    fedilink
    English
    arrow-up
    36
    arrow-down
    4
    ·
    1 day ago

    Sad to see the Swiss are still complying with demands from a fascist regime.

    If you’re going to be doing illegal shit in your activism, you should consider using anonymous communication methods like SimpleX.

    • GreatWhiteBuffalo41@slrpnk.net
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      19 hours ago

      I’m pretty sure proton offers a crypto payment of some form. Which would mean if this person had used that instead of a credit card, theoretically there wouldn’t be anything to subpoena.

      Either way, email isn’t exactly safe.

    • potatoguy@mbin.potato-guy.space
      link
      fedilink
      arrow-up
      8
      ·
      23 hours ago

      If I remember correctly, payment data is required to be logged for 10 years.

      Edit: This varies from jurisdiction to jurisdiction, but it’s normally 5-10 years.

  • yeehaw@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    arrow-down
    3
    ·
    1 day ago

    More and more I consider just self hosting. Does have obvious drawbacks though 😅

    • Log in | Sign up@lemmy.world
      link
      fedilink
      English
      arrow-up
      7
      ·
      22 hours ago

      Even some commercial less well known mail providers are sometimes blocked by big players like gmail and outlook for anti-spam reasons.

      • yeehaw@lemmy.ca
        link
        fedilink
        English
        arrow-up
        3
        ·
        21 hours ago

        Just set up dkim, SPF, and dmarc properly and you should be good.

        • Axum@lemmy.blahaj.zone
          link
          fedilink
          English
          arrow-up
          5
          ·
          12 hours ago

          Nope. Take for example Gmx.

          Due to the heuristics some of the providers have, such as Microsoft, they will start classifying mail sent from gmx as spam and auto move it to people’s spam folder. They have developed their own internal trust metrics and these periodically just spambin low trust servers

          • yeehaw@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            12 hours ago

            I can’t say either way, I manage dozens of M365 tenants myself and usually what trips it is lack of SPF/dkim/dmarc or bulk senders. But again, not common to have independent mail providers these days but even Microsoft still makes Microsoft exchange server…

      • Rioting Pacifist@lemmy.world
        link
        fedilink
        English
        arrow-up
        2
        ·
        22 hours ago

        Self hosted my mail for decades, the only issue i’ve had is Hotmail/outlook, who have blacklisted my IP with no way to unblock it.

        Gmail is pretty good

        • Log in | Sign up@lemmy.world
          link
          fedilink
          English
          arrow-up
          1
          ·
          19 hours ago

          My mail provider isn’t that big. We got blocked by both outlook and gmail, but I duckduckwent a workaround which worked. Something about editing some mail record somewhere. Can’t remember what, I’m afraid.

    • earthworm@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      arrow-down
      1
      ·
      edit-2
      22 hours ago

      Proton has a history of breaking the spirit of its promise to users. Does Tuta?

      This marks Proton’s third known disclosure to authorities. They previously handed over a recovery email for a Catalan Democratic Tsunami activist and were forced to log a French climate activist’s IP address via Europol — despite claiming they don’t log IPs by default.

      Each case followed the same script: foreign law enforcement pressure, Swiss legal compliance, user anonymity compromised. Like watching the same Netflix thriller where the plot twist stops being surprising.

      • Rioting Pacifist@lemmy.world
        link
        fedilink
        English
        arrow-up
        5
        arrow-down
        1
        ·
        22 hours ago

        The frustrating part is all the simps telling you that E2EE makes it safe, nah the same way they can log the IP of a user when asked, they can use the JavaScript they send you when you open protonmail to upload whatever emails they want access to, or your to key.

        If you want E2EE use GPG, otherwise you’re just pretending.