Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

A customer that specifically chooses Proton for privacy, must read and agree to privacy policy, which explicitly states, that Proton may in fact keep temporary IP logs and that user may opt in for login IP logs. Requests from authorities may ask for this kind of information and Proton will have to provide it.

The „opt-in“ part for login logs is particularly interesting, because in fact Proton recommends this as a security best practice. Whether it’s in the best interest of the customer or not, it’s an open question. I would say, in a risk model, where threat of human rights violation by Swiss government is much lower than risks of unauthorized party accessing the account, it makes sense. Tough luck for the criminals that followed this advice.

https://protonmail.com/privacy-policy



Anyone that uses ANY electronic device to plan and arrange clandestine opetations - IS AN IDIOT.


Do tell, how do you plan your clandestine operations?


3 days ago i did this very thing. when the oppressive govt banned internet, i had to talk to someone outside india and then i dictated them some text. reddit keeps ip logs for 100 days so i had a dormant account for over a year. i asked the guy to log in, type that message and post.

that way the govt can demand from reddit that account ip but since the only ip available is from outside india, they cant do shit.

i was ready to dictate base64 image character by character but the internet blockade remained for only 2 days so yeah. there are plenty of ways


You think nobody can tap phone records, when you called someone outside India?

Oppressive government?


ah yes. unless they are actively listening in am i not safe enough as compared to DPI censorship and network analyzers mandated by the said oppressive government?


Mass capture of telephony is real. Voice recognition is real. Text processing is real. All of these are low-tech these days.


By using the classics of course.

https://en.wikipedia.org/wiki/Histiaeus#Ionian_revolt_(499-4...

Sure the bitrate is a bit slow and it's UDP only but our governments have proved over and over again that they can't learn from history.


> In 499 BC, he shaved the head of his most trusted slave, tattooed a message on his head, and then waited for his hair to grow back. The slave was then sent to Aristagoras, who was instructed to shave the slave's head again and read the message, which told him to revolt against the Persians.

Since this was a trusted slave, the tattoo seems unnecessary. The slave could just tell Aristagoras "Histiaeus says to revolt against the Persians".


The fact that the slave had been signed confirmed the authenticity to the recipient.


There is trust and there is trust.

There was enough trust that the slave did not desert and that they were taking the message to the destination.

There was not enough trust that the slave would actually know the CONTENT of the message. As such the slave wouldn't even know to where to desert to :)


Do as terrorists and generals do.just use one mail account, never send mail, use the draft feature, and start everything as a discussion about an elaborate real world spy/crime novel.


I am betting on ravens


All analogue.


ADC means analog is trivially made digital. Analog is not an effective firewall unless it is physically shrouded from all sensor networks.


> . I know that when an individual uses an electronic device to communicate withothers in order to commit a crime, the individual’s electronic device will generallyserve both as an instrumentality for committing the crime, and also as a storagemedium for evidence of the crime. The electronic devices are an instrumentalityof the crime because it is used as a means of committing the criminal offense.The electronic devices are also likely to be a storage medium for evidence ofcrime. From my training and experience, I believe that an electronic device usedto commit a crime of this type may contain: data that is evidence of how theelectronic device was used; data that was sent or received; and other records thatindicate the nature of the offense.

Right from a recent court filing, search warrant.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: