• SecurityPro
    link
    fedilink
    721 year ago

    “helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

    • Otter
      link
      fedilink
      English
      17
      edit-2
      1 year ago

      Yep, which I think is why it’s more important to see what data is being collected and stored, rather than giving up data based on how trustworthy an entity seems

      If the tool doesn’t collect or log the data to begin with, then there’s nothing that can be stolen/taken/demanded

      The solution in this case might be for Proton (and the other companies) to list out risks and data collection information along the way.

      We need X in order to do Y. Read more on how Y works. Now here are some risks, and how to avoid them:

    • lemmyreaderOP
      link
      fedilink
      English
      -171 year ago

      “helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

      You are suggesting all these companies are completely helpless against legal requests. That is not correct. A company should first make clear that the legal request is actually completely legitimate and correct. After that they can look at whether they should provide the information or not.

      See the data here :

      • SecurityPro
        link
        fedilink
        371 year ago

        As someone who has worked fraud and online investigations, and both written and served search warrants; it is not an option. A probable cause affidavit is presented to a judge and if the judge agrees there is sufficient probable cause, a search warrant is issued. This is an order by the judge and not optional. The judge can hold the company in contempt if they refuse to obey his/her order.

      • @refalo@programming.dev
        link
        fedilink
        10
        edit-2
        1 year ago

        Are you suggesting they didn’t do those things? Good info either way.

        Also there IS another alternative, the lavabit way… just go out of business /s

  • Lettuce eat lettuce
    link
    fedilink
    331 year ago

    Obligatory reminder:

    Email is not a secure medium! If you need truly secure and/or anonymous communications, DON’T USE EMAIL!

    Use a platform/protocol designed from the ground up for those things!

  • Why has proton written somewhere exactly what data can be handed over to police? if there is, they need to be promoting this information more

  • @AnAnonymous@lemm.ee
    link
    fedilink
    31 year ago

    OpSec fail, never ever use any personal info when you are dealing with something you don’t want to be indentified for, it include obviously recovery emails, usernames and passwords.

  • Optional
    link
    fedilink
    51 year ago

    If you sign up for a service using real information that can be traced to you (as in this case: home address, personal email) and then do illegal* things with the account, don’t.

    The * here is that what the alleged protester allegedly did or said is irrelevant. And the article is pretty clickbaity, unless the author was unaware of how online accounts work.

  • Schwim Dandy
    link
    fedilink
    71 year ago

    “Proton does not require a recovery address, but in this case the terror suspect added one on their own. We cannot encrypt this data as we need to be able to send an email to that address if the terror suspect wishes to initiate the recovery process,…"

    I love that proton kept referring to the user as the “terror suspect” repeatedly so we would know they’re really the good guy here.

    • lemmyreaderOP
      link
      fedilink
      English
      41 year ago

      Exactly. What makes this a bit complicated and maybe interesting from a historical point of view is that this is about Spain. A country which has been very slow with removing some of the “relics” from the fascist Franco era (Franco died in 1975) and at the same time having regions that long for independence like Basque country and Catalunya (and the post topic is related to that, Catalunya aiming for independence). Since the Twin Towers attacks in 2001 the words “terror suspect” and “terrorists” have been used much more often (also by ordinary “normies” people that I knew) and maybe not always rightly so.

    • @Squeak@lemmy.world
      link
      fedilink
      131 year ago

      Yes. They never gave away content of emails, because they couldn’t even if they wanted to. It’s encrypted.

      They gave the recovery email for the account to the authorities, which was an iCloud account tied to the user’s real name.