this post was submitted on 03 Jul 2024
872 points (98.0% liked)
Technology
59641 readers
2892 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'll tell you what. If you can prove to me by pointing to the specific source code that would prevent Proton from capturing your private key password when you login or decrypt using their standard clients then I'll join the Proton cult.
You want them to point to code (that's not publicly available) that prevents Proton from capturing credentials?
What a dumb hoop to tell someone to jump through. Do you expect someone to actually post a block of code? Would you even be able to read it?
I mean, you're certainly not providing much proof that you have any measurable software skills that enables you to do the proper evaluation even if you received the code from proton. Why should anyone believe this unsubstantiated claim from you?
Edit: for the record, I'm don't give a shit and I'm just yanking your chain here.
I'm a black belt in TypeScript, JavaScript, Go, Rust, C, C++, Python & can read and write assembly with my eyes closed, okay?๐
Sure thing buddy, you're a very talented young man indeed ๐
This is the best comment so far ๐คฃ.
First off, who gives out belts for languages? I've been writing software for over a decade and never got any belts. You'd better believe I'd actually wear that sucker on my gi.
This simply isn't really possible.
Even if they published open-source code for their backend, it wouldn't prove that it's actually what their systems are running.
And when you are storing your data on their servers, and decrypting it by sending over your password, there's no way you can actually truly prevent them from accessing your data, if they were to modify how their systems function overall. (this is true for every company)
Even if they were using zero-knowledge proofs to verify and prove to you the computation done on the server matched what would be expected from published open-source code, then either their very own systems (and by extension, their administrators), or a different company's proprietary TPM module, would be the root of trust for those ZK proofs, and would still have the same underlying trust assumptions of at least 1 company having the ability to potentially steal your information.
If you want to rail against Proton for this, you have to be against every single cloud-based instance of code that hosts encrypted data, by any company, for any user.
Saying Proton acts just like Microsoft is a laughable comparison to make in order to justify claiming a lack of privacy or security on Proton's part.
Why? Is it because they're both companies that offer online services? Guess what, loads of companies do that. But you know what Proton doesn't do? Give away the contents of people's files, like Microsoft states they do in their own transparency reports, that they conveniently stopped publishing in 2022. Microsoft handed over the content (not just IP, email, etc, but actual docs, communications, stored files, etc) of thousands of people's accounts to law enforcement. Proton hasn't given out content once.
And this doesn't even consider the fact that Proton's business model is privacy. For Microsoft, their users will keep using their services regardless of their privacy, but for Proton, if it comes out that their services are no longer private, nobody will use them anymore, because nobody who got them for privacy would need them at that point.
Such source code isn't possible with the general audience service they offer, even if being open source were a requirement for credibility in any way.
You're comparing them to a company with a long history of actively hostile behavior despite the fact that there's never been a single hint of anything resembling hostile behavior from them, they operate from a country with meaningful privacy protections and only surrender data when compelled by their own courts (who only do so in circumstances that actually warrant it), and haven't actually given up information that's useful when required to because they don't have it.