this post was submitted on 28 Jan 2025
983 points (95.4% liked)

News

24240 readers
4191 users here now

Welcome to the News community!

Rules:

1. Be civil


Attack the argument, not the person. No racism/sexism/bigotry. Good faith argumentation only. This includes accusing another user of being a bot or paid actor. Trolling is uncivil and is grounds for removal and/or a community ban. Do not respond to rule-breaking content; report it and move on.


2. All posts should contain a source (url) that is as reliable and unbiased as possible and must only contain one link.


Obvious right or left wing sources will be removed at the mods discretion. We have an actively updated blocklist, which you can see here: https://lemmy.world/post/2246130 if you feel like any website is missing, contact the mods. Supporting links can be added in comments or posted seperately but not to the post body.


3. No bots, spam or self-promotion.


Only approved bots, which follow the guidelines for bots set by the instance, are allowed.


4. Post titles should be the same as the article used as source.


Posts which titles don’t match the source won’t be removed, but the autoMod will notify you, and if your title misrepresents the original article, the post will be deleted. If the site changed their headline, the bot might still contact you, just ignore it, we won’t delete your post.


5. Only recent news is allowed.


Posts must be news from the most recent 30 days.


6. All posts must be news articles.


No opinion pieces, Listicles, editorials or celebrity gossip is allowed. All posts will be judged on a case-by-case basis.


7. No duplicate posts.


If a source you used was already posted by someone else, the autoMod will leave a message. Please remove your post if the autoMod is correct. If the post that matches your post is very old, we refer you to rule 5.


8. Misinformation is prohibited.


Misinformation / propaganda is strictly prohibited. Any comment or post containing or linking to misinformation will be removed. If you feel that your post has been removed in error, credible sources must be provided.


9. No link shorteners.


The auto mod will contact you if a link shortener is detected, please delete your post if they are right.


10. Don't copy entire article in your post body


For copyright reasons, you are not allowed to copy an entire article into your post body. This is an instance wide rule, that is strictly enforced in this community.

founded 2 years ago
MODERATORS
 

Summary

Proton Mail, known for its privacy-first email services, faced backlash after CEO Andy Yen praised the Republican Party and its antitrust stance.

The company initially posted and deleted a statement supporting Yen’s comments, later claiming an “internal miscommunication” and reiterating its political neutrality.

Critics question Proton’s impartiality, particularly as it cooperates with Swiss authorities on legal data requests.

Privacy advocates warn that political alignments could undermine trust, especially for Proton’s users—journalists and activists wary of government surveillance under administrations like Trump’s.

you are viewing a single comment's thread
view the rest of the comments
[–] renzev@lemmy.world 5 points 1 day ago (2 children)

Aside from the political stuff, I'm also concerned about proton from a technological standpoint. You can't use a standard mail client with proton, you have to use their own. So, if they wanted to, they could push out a single malicious update which would render all of the end-to-end encryption stuff pointless. You could argue that using Thunderbird + GPG + Gmail is more secure/private.

[–] sudneo@lemm.ee 2 points 17 hours ago

You can if you use the bridge, which is not perfect but basically does the GPG encryption/decryption for you and exposes IMAP etc. (I think you can also do your own PGP encryption on top, not sure).

The supply chain issue you discuss is the same with any tool, with the exception that with proton you have an automated update system (I.e. every time the page loads js code), while with more traditional tooling you upgrade based on your choice (more or less). You are likely not checking the code in either case, but a malicious update could backdoor or bypass your encryption either way. Technically you can build the proton client yourself but anyway, this is just theoretical stuff, nobody does that.

Gmail + GPG is anyway worse, first of all from a UX perspective, where every device needs to be managed separately (GPG keys need to be available, you need to manage them, managing keys and keeping them secure is hard). Second, you will use GPG only with selected people of whom you have the key. With proton you will use it automatically for all Proton users at the very least and all proton users can use it with you automatically too.

Then there is the problem with metadata. They cannot be encrypted of course, and with gmail you are 100% sure they are using them to profile you and mine whatever data can be mined (e.g., who you talk to), while with proton you can reasonably be confident they don't.

[–] dan@upvote.au 3 points 1 day ago* (last edited 1 day ago)

You can't use a standard mail client with proton, you have to use their own.

Part of the reason is that the protocol that's uses for retrieving emails (IMAP) is pretty old and doesn't support end-to-end encryption. JMAP is supposed to be a modern replacement, but it's not widespread yet, and also intentionally doesn't support E2EE.

E2EE is hard, for example searching has to be done client side rather than having a search index on the server side (since the server is not able to decrypt the data to index it). I haven't tried Proton but I'm curious as to how they solve this... I guess they'd sync the entire mailbox and index it locally, like what (non-mobile) Thunderbird does.

I really question the value of E2EE for emails, though. Communication between servers (e.g. someone on Gmail sending an email to a Proton user) uses TLS but is not, and will likely never be, end-to-end encrypted. Emails you send to other providers are also not likely to be encrypted on the other provider's end.