• Upstream7564@discuss.tchncs.de
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    1 month ago

    I think it’s not the services fault that people aren’t aware of the limits of encrypted services. They are not going to shut everythin’ down just for a few people, if you need smth anonymous Proton is not for you.

    Also, it’s your task to have good opsec. If you give your iCloud email to Proton which has personal information sticked to it, your fault.

    • helenslunch@feddit.nl
      link
      fedilink
      arrow-up
      1
      ·
      2 months ago

      if you need smth anonymous Proton is not for you.

      I mean, there are better options, but you can also use Proton anonymously. Just have to use it appropriately. If you use it to send your name to the FBI, there ain’t nothin Proton can do about that. Same if you link a recovery email linked to a personal account.

  • SecurityPro@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    2 months ago

    “helped” is very misleading. Companies can’t refuse to provide information they have when served a search warrant / court order. These companies DID NOT choose to provide the info on their own.

    • Otter@lemmy.ca
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      2 months ago

      Yep, which I think is why it’s more important to see what data is being collected and stored, rather than giving up data based on how trustworthy an entity seems

      If the tool doesn’t collect or log the data to begin with, then there’s nothing that can be stolen/taken/demanded

      The solution in this case might be for Proton (and the other companies) to list out risks and data collection information along the way.

      We need X in order to do Y. Read more on how Y works. Now here are some risks, and how to avoid them: