Skip to content

ProtonMail Complied with 5,957 Data Requests in 2022 – Still Secure and Private?

Privacy
  • ProtonMail often touts its Swiss jurisdiction and privacy guarantees, but at the same time, it is complying with a record number of data request orders going through the Swiss legal system.

    ProtonMail is one of the most popular secure email services in the world, having launched in 2014 via a crowdfunding campaign. It promises a higher level of privacy and security over other email platforms and frequently touts its Swiss jurisdiction.

    While Switzerland is a good jurisdiction for privacy-conscious users, it’s certainly no guarantee for data security.

    On the ProtonMail homepage, you can see references to “strict Swiss privacy laws” that should keep your data secure.

    Proton provides data to the FBI and other police agencies

    This past week Forbes ran an article on a case where the FBI was able to get data on a U.S. ProtonMail user who was being investigated for harassment (but not charged with any crime).

    The warrant revealed that the FBI managed to acquire data from Proton Technologies, the owner of Proton Mail, to kick off the hunt for the anonymous emailer. It’s a rare example of a U.S. data request on Proton and shows how small pieces of metadata from encrypted software can prove hugely useful for cops trying to unmask users who expect strong privacy protections from such apps.

    – Forbes

    In this case, Proton Technologies provided the FBI with the “recovery and associated email addresses” of the user, which lead to his discovery.

    Two years ago, RestorePrivacy ran an article on another ProtonMail logging case involving a French activist who was also a ProtonMail user. In that case, French police received the user’s IP address from Proton Technologies, leading to the arrest of the suspect.

    This begs the question, how common are cases like these, particularly with cases that don’t end up in the news?

    Nearly 6,000 data request orders “complied with” in 2022

    To ProtonMail’s credit, the organization publishes a transparency report going back to 2017. In it, we find the following statistics detailing legal orders for user data.

    Additionally, you can see that the number for all three categories continues to climb every year. With that being said, this growth is also not surprising given that ProtonMail is a popular brand with a growing user base. Aside from email, the company also offers Proton VPN and a Proton Pass, a password manager.

    Proton prefaces the transparency report noting that data requests must go through Swiss legal channels.

    From time to time, Proton may be legally compelled to disclose certain user information to Swiss authorities, as detailed in our Privacy Policy. This can happen if Swiss law is broken.

    … Swiss authorities may from time to time assist foreign authorities with requests, provided that they are valid under international legal assistance procedures and determined to be in compliance with Swiss law. In these cases, the standard of legality is again based on Swiss law.

    – Proton Transparency Report

    Proton Mail provided us with an explanation for the growing number of cases below.

    The increase in cases reflects the increase in our user base. As Proton has scaled, and now has 100m sign ups to our services, it’s not surprising that these figures have risen. However, these cases have come through the Swiss authorities (which is a good sense check of their validity) and have also been reviewed by Proton to ensure they are reasonable for us to respond to (hence why there are also cases that we have not complied with mentioned on the transparency report). Please note that in all cases email content, attachments, files etc are always encrypted and cannot be read.

    – Proton spokesperson

    Is Proton Mail still secure and private?

    The answer to this question all boils down to determining your threat model and the adversaries you are trying to protect yourself against.

    In short, the answer is yes if you are looking for a secure, encrypted email service that does not have access to the contents of your inbox. After all, ProtonMail is far better than Gmail or Yahoo when it comes to privacy.

    If you are doing things to attract the attention of law enforcement, then the data you provide when you use ProtonMail, such as IP address and recovery email, may be shared with authorities if Proton Technologies is legally compelled to do so in Swiss court.

    All businesses must comply with the laws in the countries where they are legally based. The only other option is to shut down, like we saw with CTemplar in 2022 and Lavabit back in 2013.

    Furthermore, there are also different alternatives with various privacy and security benefits, as you can see in our secure email guide.

    Consider your OPSEC

    It’s also important to consider what data you provide when you sign up for a service. In the ProtonMail cases we mentioned above, the data that exposed the users was the user’s IP address (French activist) and the “recovery and associated email addresses” (US suspect investigated by the FBI recently).

    By protecting the data you provide when interacting with the email service, you can make your email account even more private and secure.

    • IP address – Use a good VPN service to hide your IP address whenever using the email service (or anytime you are online for that matter)
    • Recovery email – Consider using a disposable email for a recovery email, or a new and unused recovery email address that is not linked to your identity
    • Payment methods – Email is fundamentally different from a no logs VPN service in that there is always personal data stored (your inbox contents and other account data). Therefore it’s more important to use an anonymous payment method if you want more privacy.

    Having good OPSEC is a crucial consideration whenever you are using privacy tools.

    – Source :

    https://restoreprivacy.com/protonmail-data-requests-user-logs/

  • DownPWundefined DownPW marked this topic as a regular topic on
  • @DownPW great article. If this tells you anything, it’s that you should never consider email as secure no matter who provides it. The fact that Proton have since removed their “No logs” policy to me says that if you think you’re secure behind this service, think again.

  • Quite. Better encrypt your emails yourself via Open PGP

  • @DownPW yes, exactly, but without a VPN that would still show your origin IP in the message headers.

  • yeah, I got very excited when I heard proton first. I was deciding between fastmail and protonmail. I gave it a try, but apps on the phone and websites were not as good as I expected. It just did not feel as “professional” and user-friendly. And while I was trying them, every couple of weeks, there was “outage”, some problems in the server and they were not accepting/sending emails for a period of time. I am aware they have improved them now.

    Then, they announced many products on the horizon… drive, notes, calendar, VPN, password manager etc. Although, as a paying customer, I would first expect them to provide “perfect and professional” email service rather than starting other products… Later, this kind of news spread fast… Given their "amateur"ish server shutdowns and these user info news repelled me from the proton.

    So, I felt like they are quite “money” oriented people, rather than “privacy or security” as they claimed.

    Gmail is a more “reliable” email service than them, so I decided it was just not worth the money.

    @phenomlab additionally, I wonder if you think Gmail is also a very secure email service? I am pretty sure they do not care about privacy when it comes to advertisements 😄 but I am asking from the server security perspective. Do you think someone could enter Gmail servers or Proton servers more easily?

  • @crazycells said in ProtonMail Complied with 5,957 Data Requests in 2022 – Still Secure and Private?:

    @phenomlab additionally, I wonder if you think Gmail is also a very secure email service?

    Not at all. No privacy, no crypted email, etc … but that works, but you are the product

  • @DownPW yeah, I know they do not care about privacy at all, but by security, I meant mostly external factors, hackers, attackers etc…

  • @crazycells good question. Gmail being provided by Google is going to be one of the more secure by default out of the box, although you have to bear in mind that you can have the best security in the world, but that is easily diluted by user decision.

    Obviously, it makes sense to secure all cloud based services with at least 2fa protection, or better still, biometric if available, but email still remains vastly unprotected (unless enforced in the sense of 2fa, which I know Sendgrid do) because of user choice (in the sense that users will always go for the path of least resistance when it comes to security to make their lives easier). The ultimate side effect of taking this route is being vulnerable to credentials theft via phishing attacks and social engineering.

    The same principle would easily apply to Proton Mail, who also (from memory) do not enforce 2fa. Based on this fact, neither product is more secure than the other without one form of additional authentication at least being imposed.

    In terms of direct attack on the servers holding mail accounts themselves, this is a far less common type of attack these days as tricking the user is so much simpler than brute forcing a server where you are very likely to be detected by perimeter security (IDS / IPS etc).


Related Topics
  • 7 Votes
    12 Posts
    181 Views

    @DownPW this looks interesting! 😬😬.

  • Network Security Monitoring

    Learning
    7
    3 Votes
    7 Posts
    208 Views

    @phenomlab I will check those out. Thanks for sharing. I appreciate it!

  • 1 Votes
    1 Posts
    232 Views
    No one has replied
  • Bad information security advice

    Security
    1
    1 Votes
    1 Posts
    147 Views
    No one has replied
  • 4 Votes
    8 Posts
    1k Views

    @phenomlab
    Sorry to delay in responding, yes as i mentioned above, i had to remove my redis from docker and reinstall a new image with this command

    docker run --name=redis -p 127.0.0.1:6379:6379 -d -t redis:alpine

    and now when i test my ip and port on
    https://www.yougetsignal.com/tools/open-ports/

    the status of my redis port is closed. I think which to configure firewall in droplet digital ocean is a good idea too, and i will configure soon.
    Thanks for the help!

  • Securing javascript -> PHP mysql calls on Website

    Solved Security
    2
    1 Votes
    2 Posts
    383 Views

    @mike-jones Hi Mike,

    There are multiple answers to this, so I’m going to provide some of the most important ones here

    JS is a client side library, so you shouldn’t rely on it solely for validation. Any values collected by JS will need to be passed back to the PHP backend for processing, and will need to be fully sanitised first to ensure that your database is not exposed to SQL injection. In order to pass back those values into PHP, you’ll need to use something like

    <script> var myvalue = $('#id').val(); $(document).ready(function() { $.ajax({ type: "POST", url: "https://myserver/myfile.php?id=" + myvalue, success: function() { $("#targetdiv").load('myfile.php?id=myvalue #targetdiv', function() {}); }, //error: ajaxError }); return false; }); </script>

    Then collect that with PHP via a POST / GET request such as

    <?php $myvalue= $_GET['id']; echo "The value is " . $myvalue; ?>

    Of course, the above is a basic example, but is fully functional. Here, the risk level is low in the sense that you are not attempting to manipulate data, but simply request it. However, this in itself would still be vulnerable to SQL injection attack if the request is not sent as OOP (Object Orientated Programming). Here’s an example of how to get the data safely

    <?php function getid($theid) { global $db; $stmt = $db->prepare("SELECT *FROM data where id = ?"); $stmt->execute([$theid]); while ($result= $stmt->fetch(PDO::FETCH_ASSOC)){ $name = $result['name']; $address = $result['address']; $zip = $result['zip']; } return array( 'name' => $name, 'address' => $address, 'zip' => $zip ); } ?>

    Essentially, using the OOP method, we send placeholders rather than actual values. The job of the function is to check the request and automatically sanitise it to ensure we only return what is being asked for, and nothing else. This prevents typical injections such as “AND 1=1” which of course would land up returning everything which isn’t what you want at all for security reasons.

    When calling the function, you’d simply use

    <?php echo getid($myvalue); ?>

    @mike-jones said in Securing javascript -> PHP mysql calls on Website:

    i am pretty sure the user could just use the path to the php file and just type a web address into the search bar

    This is correct, although with no parameters, no data would be returned. You can actually prevent the PHP script from being called directly using something like

    <?php if(!defined('MyConst')) { die('Direct access not permitted'); } ?>

    then on the pages that you need to include it

    <?php define('MyConst', TRUE); ?>

    Obviously, access requests coming directly are not going via your chosen route, therefore, the connection will die because MyConst does not equal TRUE

    @mike-jones said in Securing javascript -> PHP mysql calls on Website:

    Would it be enough to just check if the number are a number 1-100 and if the drop down is one of the 5 specific words and then just not run the rest of the code if it doesn’t fit one of those perameters?

    In my view, no, as this will expose the PHP file to SQL injection attack without any server side checking.

    Hope this is of some use to start with. Happy to elaborate if you’d like.

  • Security, Or Just Obscurity?

    Blog
    1
    +0
    0 Votes
    1 Posts
    331 Views
    No one has replied
  • is my DMARC configured correctly?

    Solved Configure
    3
    3 Votes
    3 Posts
    474 Views

    @phenomlab said in is my DMARC configured correctly?:

    you’ll get one from every domain that receives email from yours.

    Today I have received another mail from outlook DMARC, i was referring to your reply again and found it very helpful/informative. thanks again.

    I wish sudonix 100 more great years ahead!