The false impression of safety can have devastating consequences. Whether you are an activist or not, dedicated mail services and privacy measures are good practices, not shields to make war.
Permalink to heading The Protonmail scandal The Protonmail scandal
Last year, I’ve read about Protonmail, a secure email company based in Switzerland, that gave the IP address of a French activist to Swiss authorities after a request from Europol. While Protonmail does not log its users’ IP addresses, authorities can ask them to cooperate at any time.
Any company must comply with the law.
Even if the ProtonMail user notification policy “requires a user to be notified if a third party makes a request for their private data and such data is to be used in a criminal proceeding”, they delayed the notification by several months in this case.
In other words, the end ultimately justifies all means, and companies may change their conditions at any time.
You don’t create a Protonmail account to communicate stealthily and outrun authorities. The company provides an interesting end-to-end encryption, not undercover mailboxes for criminal activities. They have great products!
The problem is not Protonmail but mass surveillance and the sacrifice of individual freedom in western democracies. I’m not even talking about Snowden revelations and the supposed secret backdoors, but just current laws.
There are very dangerous people out there and authorities won’t stop hunting them. “Who decides who’s dangerous or not? Which activities are criminal? What can make you a person of interest?” are more relevant questions, to me. While there are certainly objective criteria such as whether or not you put other people’s life in danger, or if you are stealing money or confidential information, it’s ultimately their decision.
Permalink to heading What are NSL? What are NSL?
National Security Letters (NSL) are requests by US three-letter agencies such as the FBI that do not require prior approval from a judge. These requests forbid the recipient of an NSL from disclosing the FBI had requested the information.
That’s why some users check that point before choosing a mail provider, but as we saw, if that’s necessary, a federal or an international organization can send a request to the local authorities to bypass any restrictions.
Again, the end justifies the means, like this UE Draft Law on the collection and storage of identification that suggested operators of end-to-end encrypted systems undermine encryption to provide access to user communications.
Fortunately, many organizations and cybersecurity experts protested and managed to halt legislation, but some politicians seriously put it forward as a measure against terrorism and cyber threats while it would only aggravate the threat.
Permalink to heading Email companies also have their threat model Email companies also have their threat model
Email companies are constantly under attack by various threat actors. Their threat model may look like that:
|phishing, viruses||digital signatures, CIA triad|
|compromised accounts - leaked passwords||2FA, MFA, secret phrases|
|mass surveillance - advanced attackers||encryption 4096 bits - E2EE|
|compromised devices - zombie computers||0|
|lost secret phrases or 2FA/MFA devices||0 or 1FA*|
|Man In The Middle||0 or not much|
|DDoS, malicious payloads||0|
0 when the provider cannot guarantee a 100% protection but only mitigate the damage. If you care about privacy, it’s best if you can think about your own threat model too.
* 1FA is classic login/password
Permalink to heading Privacy measures can look suspicious Privacy measures can look suspicious
You may raise the curiosity by taking pretty basic measures to protect your privacy. For many people and organizations, having a Protonmail account is sufficient to look suspicious.
The same people might approve the “nothing to hide” argument. Depending on your goals, such privacy measure might not be the best move.