IronJumbo

joined 1 year ago
[–] IronJumbo@lemmy.world 2 points 1 day ago (1 children)

Even if it is an advertisement, can the threats be true?

[–] IronJumbo@lemmy.world 2 points 1 day ago (2 children)

I am not associated with any tested company or this blog.

I am an ordinary user of all Proton products since his birth and I love him.

Because the test looks credible, I just want an expert from Proton to dispel my doubts or honestly confirm the problem.

4
submitted 1 day ago* (last edited 1 day ago) by IronJumbo@lemmy.world to c/protonprivacy@lemmy.world
 

This community is reportedly official, but I see no activity of the Proton Team here :(

Can the Proton Team comment on this test?

Source article:

https://venaksecurity.com/2025/06/04/keeper-is-the-only-password-manager-that-protects-against-infostealers/

Edit:

I am not associated with any tested company or this blog.

I am an ordinary user of all Proton products since his birth and I love him.

Because the test looks credible, I just want an expert from Proton to dispel my doubts or honestly confirm the problem.

I am aware that the test may be a product promotion, but the question is: can the threat be real for the Proton Pass?

[–] IronJumbo@lemmy.world 2 points 1 week ago (2 children)

In that case, it seems to me that the only threat is the mindless copying of public keys to other servers, as described in the article. But who does so? Do admins not create separate private-public keys for each server?

Thank you for the explanation!

 

Everyone knows that the content of the notification is encrypted, BUT THIS IS NOT ENOUGH:

https://www.privacy-handbuch.de/handbuch_73.htm

Requests to the PM Team (for example, for the implementation of Unified Push) have been ignored for many years.

For some people, using a safe ProtonMail app with a dangerous FCM can be a disaster in some countries (journalists, signals, political opposition, etc.)

Please repair it!

 

https://blog.thc.org/infecting-ssh-public-keys-with-backdoors

I am not a security expert and I wonder:

  1. Does the described method infect the remote or local machine (from which I connect)?
  2. Can this method be prevented? For example, correctly configuring your etc/ssh/ssh_config

It seems that every VPS supplier can hack you? The description shows that AWS does "harmless", but what if my hosting is a bad actor?

 

Dear Proton Team, do these threats also apply to applications and Web PM?

2
submitted 1 year ago* (last edited 1 year ago) by IronJumbo@lemmy.world to c/protonprivacy@lemmy.world
 

Please clarify if ProtonVPN servers are also affected and what are the corrective actions?

https://citizenlab.ca/2024/07/vulnerabilities-in-vpns-paper-presented-at-the-privacy-enhancing-technologies-symposium-2024/