Skip to content

ProtonMail Complied with 5,957 Data Requests in 2022 – Still Secure and Private?

Privacy
  • ProtonMail often touts its Swiss jurisdiction and privacy guarantees, but at the same time, it is complying with a record number of data request orders going through the Swiss legal system.

    ProtonMail is one of the most popular secure email services in the world, having launched in 2014 via a crowdfunding campaign. It promises a higher level of privacy and security over other email platforms and frequently touts its Swiss jurisdiction.

    While Switzerland is a good jurisdiction for privacy-conscious users, it’s certainly no guarantee for data security.

    On the ProtonMail homepage, you can see references to “strict Swiss privacy laws” that should keep your data secure.

    Proton provides data to the FBI and other police agencies

    This past week Forbes ran an article on a case where the FBI was able to get data on a U.S. ProtonMail user who was being investigated for harassment (but not charged with any crime).

    The warrant revealed that the FBI managed to acquire data from Proton Technologies, the owner of Proton Mail, to kick off the hunt for the anonymous emailer. It’s a rare example of a U.S. data request on Proton and shows how small pieces of metadata from encrypted software can prove hugely useful for cops trying to unmask users who expect strong privacy protections from such apps.

    – Forbes

    In this case, Proton Technologies provided the FBI with the “recovery and associated email addresses” of the user, which lead to his discovery.

    Two years ago, RestorePrivacy ran an article on another ProtonMail logging case involving a French activist who was also a ProtonMail user. In that case, French police received the user’s IP address from Proton Technologies, leading to the arrest of the suspect.

    This begs the question, how common are cases like these, particularly with cases that don’t end up in the news?

    Nearly 6,000 data request orders “complied with” in 2022

    To ProtonMail’s credit, the organization publishes a transparency report going back to 2017. In it, we find the following statistics detailing legal orders for user data.

    Additionally, you can see that the number for all three categories continues to climb every year. With that being said, this growth is also not surprising given that ProtonMail is a popular brand with a growing user base. Aside from email, the company also offers Proton VPN and a Proton Pass, a password manager.

    Proton prefaces the transparency report noting that data requests must go through Swiss legal channels.

    From time to time, Proton may be legally compelled to disclose certain user information to Swiss authorities, as detailed in our Privacy Policy. This can happen if Swiss law is broken.

    … Swiss authorities may from time to time assist foreign authorities with requests, provided that they are valid under international legal assistance procedures and determined to be in compliance with Swiss law. In these cases, the standard of legality is again based on Swiss law.

    – Proton Transparency Report

    Proton Mail provided us with an explanation for the growing number of cases below.

    The increase in cases reflects the increase in our user base. As Proton has scaled, and now has 100m sign ups to our services, it’s not surprising that these figures have risen. However, these cases have come through the Swiss authorities (which is a good sense check of their validity) and have also been reviewed by Proton to ensure they are reasonable for us to respond to (hence why there are also cases that we have not complied with mentioned on the transparency report). Please note that in all cases email content, attachments, files etc are always encrypted and cannot be read.

    – Proton spokesperson

    Is Proton Mail still secure and private?

    The answer to this question all boils down to determining your threat model and the adversaries you are trying to protect yourself against.

    In short, the answer is yes if you are looking for a secure, encrypted email service that does not have access to the contents of your inbox. After all, ProtonMail is far better than Gmail or Yahoo when it comes to privacy.

    If you are doing things to attract the attention of law enforcement, then the data you provide when you use ProtonMail, such as IP address and recovery email, may be shared with authorities if Proton Technologies is legally compelled to do so in Swiss court.

    All businesses must comply with the laws in the countries where they are legally based. The only other option is to shut down, like we saw with CTemplar in 2022 and Lavabit back in 2013.

    Furthermore, there are also different alternatives with various privacy and security benefits, as you can see in our secure email guide.

    Consider your OPSEC

    It’s also important to consider what data you provide when you sign up for a service. In the ProtonMail cases we mentioned above, the data that exposed the users was the user’s IP address (French activist) and the “recovery and associated email addresses” (US suspect investigated by the FBI recently).

    By protecting the data you provide when interacting with the email service, you can make your email account even more private and secure.

    • IP address – Use a good VPN service to hide your IP address whenever using the email service (or anytime you are online for that matter)
    • Recovery email – Consider using a disposable email for a recovery email, or a new and unused recovery email address that is not linked to your identity
    • Payment methods – Email is fundamentally different from a no logs VPN service in that there is always personal data stored (your inbox contents and other account data). Therefore it’s more important to use an anonymous payment method if you want more privacy.

    Having good OPSEC is a crucial consideration whenever you are using privacy tools.

    – Source :

    https://restoreprivacy.com/protonmail-data-requests-user-logs/

  • DownPWundefined DownPW marked this topic as a regular topic on
  • @DownPW great article. If this tells you anything, it’s that you should never consider email as secure no matter who provides it. The fact that Proton have since removed their “No logs” policy to me says that if you think you’re secure behind this service, think again.

  • Quite. Better encrypt your emails yourself via Open PGP

  • @DownPW yes, exactly, but without a VPN that would still show your origin IP in the message headers.

  • yeah, I got very excited when I heard proton first. I was deciding between fastmail and protonmail. I gave it a try, but apps on the phone and websites were not as good as I expected. It just did not feel as “professional” and user-friendly. And while I was trying them, every couple of weeks, there was “outage”, some problems in the server and they were not accepting/sending emails for a period of time. I am aware they have improved them now.

    Then, they announced many products on the horizon… drive, notes, calendar, VPN, password manager etc. Although, as a paying customer, I would first expect them to provide “perfect and professional” email service rather than starting other products… Later, this kind of news spread fast… Given their "amateur"ish server shutdowns and these user info news repelled me from the proton.

    So, I felt like they are quite “money” oriented people, rather than “privacy or security” as they claimed.

    Gmail is a more “reliable” email service than them, so I decided it was just not worth the money.

    @phenomlab additionally, I wonder if you think Gmail is also a very secure email service? I am pretty sure they do not care about privacy when it comes to advertisements 😄 but I am asking from the server security perspective. Do you think someone could enter Gmail servers or Proton servers more easily?

  • @crazycells said in ProtonMail Complied with 5,957 Data Requests in 2022 – Still Secure and Private?:

    @phenomlab additionally, I wonder if you think Gmail is also a very secure email service?

    Not at all. No privacy, no crypted email, etc … but that works, but you are the product

  • @DownPW yeah, I know they do not care about privacy at all, but by security, I meant mostly external factors, hackers, attackers etc…

  • @crazycells good question. Gmail being provided by Google is going to be one of the more secure by default out of the box, although you have to bear in mind that you can have the best security in the world, but that is easily diluted by user decision.

    Obviously, it makes sense to secure all cloud based services with at least 2fa protection, or better still, biometric if available, but email still remains vastly unprotected (unless enforced in the sense of 2fa, which I know Sendgrid do) because of user choice (in the sense that users will always go for the path of least resistance when it comes to security to make their lives easier). The ultimate side effect of taking this route is being vulnerable to credentials theft via phishing attacks and social engineering.

    The same principle would easily apply to Proton Mail, who also (from memory) do not enforce 2fa. Based on this fact, neither product is more secure than the other without one form of additional authentication at least being imposed.

    In terms of direct attack on the servers holding mail accounts themselves, this is a far less common type of attack these days as tricking the user is so much simpler than brute forcing a server where you are very likely to be detected by perimeter security (IDS / IPS etc).


  • 0 Votes
    4 Posts
    367 Views

    @DownPW 🙂 most of this really depends on your desired security model. In all cases with firewalls, less is always more, although it’s never as clear cut as that, and there are always bespoke ports you’ll need to open periodically.

    Heztner’s DDoS protection is superior, and I know they have invested a lot of time, effort, and money into making it extremely effective. However, if you consider that the largest ever DDoS attack hit Cloudflare at 71m rps (and they were able to deflect it), and each attack can last anywhere between 8-24 hours which really depends on how determined the attacker(s) is/are, you can never be fully prepared - nor can you trace it’s true origin.

    DDoS attacks by their nature (Distributed Denial of Service) are conducted by large numbers of devices whom have become part of a “bot army” - and in most cases, the owners of these devices are blissfully unaware that they have been attacked and are under command and control from a nefarious resource. Given that the attacks originate from multiple sources, this allows the real attacker to observe from a distance whilst concealing their own identity and origin in the process.

    If you consider the desired effect of DDoS, it is not an attempt to access ports that are typically closed, but to flood (and eventually overwhelm) the target (such as a website) with millions of requests per second in an attempt to force it offline. Victims of DDoS attacks are often financial services for example, with either extortion or financial gain being the primary objective - in other words, pay for the originator to stop the attack.

    It’s even possible to get DDoS as a service these days - with a credit card, a few clicks of a mouse and a target IP, you can have your own proxy campaign running in minutes which typically involves “booters” or “stressers” - see below for more

    https://heimdalsecurity.com/blog/ddos-as-a-service-attacks-what-are-they-and-how-do-they-work

    @DownPW said in Setting for high load and prevent DDoS (sysctl, iptables, crowdsec or other):

    in short if you have any advice to give to secure the best.

    It’s not just about DDos or firewalls. There are a number of vulnerabilities on all systems that if not patched, will expose that same system to exploit. One of my favourite online testers which does a lot more than most basic ones is below

    https://www.immuniweb.com/websec/

    I’d start with the findings reported here and use that to branch outwards.

  • 4 Votes
    8 Posts
    583 Views

    @phenomlab
    Sorry to delay in responding, yes as i mentioned above, i had to remove my redis from docker and reinstall a new image with this command

    docker run --name=redis -p 127.0.0.1:6379:6379 -d -t redis:alpine

    and now when i test my ip and port on
    https://www.yougetsignal.com/tools/open-ports/

    the status of my redis port is closed. I think which to configure firewall in droplet digital ocean is a good idea too, and i will configure soon.
    Thanks for the help!

  • 4 Votes
    2 Posts
    286 Views

    Here’s a very useful video that will walk you through the privacy features of Android - mostly around the ones you should disable to get the most out of the experience

  • 1 Votes
    1 Posts
    171 Views
    No one has replied
  • 4 Votes
    3 Posts
    668 Views

    @phenomlab

    No they have a free and pro console instance.
    We can see alert with IP, Source AS, scenario attack etc…

    Installation on the NODEBB server without problems. Very good tools

    cf7e5a89-84f4-435b-82eb-434c0bfc895e-image.png
    cc82a10e-a1f1-4fd8-a433-7c9b2d31f254-image.png

    1b7147b0-37c6-4d87-b4f1-a0fe92e74afd-image.png

    7c21fc10-1825-48e1-a993-92b84455f074-image.png


    We can also do research on IPs via the crowdsec analyzer

    I believe it’s 500 per month in the Free version

    43bc8265-a57c-4439-829c-0bb8602d99b4-image.png

  • 1 Votes
    1 Posts
    201 Views
    No one has replied
  • 0 Votes
    1 Posts
    207 Views
    No one has replied
  • 1 Votes
    1 Posts
    324 Views
    No one has replied