182
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
this post was submitted on 18 Jan 2025
182 points (95.0% liked)
Privacy
76 readers
380 users here now
Stay Private, Stay Free
Topics We Cover
Privacy Advocacy, Encryption, Digital Sovereignty, Anti-Surveillance, Decentralization, and Open Internet.
Rules
- Users must comply with all instance rules.
- Engage in thoughtful, respectful, and considerate conversations.
- Try to provide sources to back up your points.
Privacy Commitment
Dedicated to opening your eyes to the extent of surveillance users are under, and fighting back, one post at a time. This community aims to help you escape data-harvesting companies and minimize your digital footprint.
founded 2 months ago
MODERATORS
If you complie your clients, Proton cannot decrypt your data.
But there's a lot more than Proton can do.
They could log your IP, the exact time you log in or use Proton services
They could keep a copy of every email you receive, most of them are probably unencrypted.
If you use VPN, they could log everything you do, they wont be able to decrypt the HTTPS data, but if they log all your traffic, it defeats the purpose of using a VPN.
They could potentially swap the web javascript, if you ever log in via browser.
When you send emails to another Protonmail user, Proton could potentially do a mitm and swap Proton's public key and make the other user's client think its your public key, and also give Proton's public key, and make your client think its that user's public key. Proton essentially act as a keyserver, so they could maliciously replace keys.
And most people don't compile their user clients, so if you just download the clients they compile, they could just not use the source code to compile it, sending you a malicious client.
There's just a lot of attack vectors if the company itself becomes hostile.