DEV Community

Cover image for Your inbox is not a digital safe
spO0q
spO0q

Posted on • Edited on

Your inbox is not a digital safe

The false impression of safety can have devastating consequences. Whether you are an activist or not, dedicated mail services and privacy measures are good practices, not shields to make war.

The Protonmail scandal

Last year, I've read about Protonmail, a secure email company based in Switzerland, that gave the IP address of a French activist to Swiss authorities after a request from Europol. While Protonmail does not log its users' IP addresses, authorities can ask them to cooperate at any time.

Any company must comply with the law.

Even if the ProtonMail user notification policy "requires a user to be notified if a third party makes a request for their private data and such data is to be used in a criminal proceeding", they delayed the notification by several months in this case.

Source: Techcrunch

In other words, the end ultimately justifies all means, and companies may change their conditions at any time.

You don't create a Protonmail account to communicate stealthily and outrun authorities. The company provides an interesting end-to-end encryption, not undercover mailboxes for criminal activities. They have great products!

The problem is not Protonmail but mass surveillance and the sacrifice of individual freedom in western democracies. I'm not even talking about Snowden revelations and the supposed secret backdoors, but just current laws.

There are very dangerous people out there and authorities won't stop hunting them. "Who decides who's dangerous or not? Which activities are criminal? What can make you a person of interest?" are more relevant questions, to me. While there are certainly objective criteria such as whether or not you put other people's life in danger, or if you are stealing money or confidential information, it's ultimately their decision.

What are NSL?

National Security Letters (NSL) are requests by US three-letter agencies such as the FBI that do not require prior approval from a judge. These requests forbid the recipient of an NSL from disclosing the FBI had requested the information.

FISA can also force companies to remain silent even if their privacy policy explicitly forbids it.

That's why some users check that point before choosing a mail provider, but as we saw, if that's necessary, a federal or an international organization can send a request to the local authorities to bypass any restrictions.

Again, the end justifies the means, like this UE Draft Law on the collection and storage of identification that suggested operators of end-to-end encrypted systems undermine encryption to provide access to user communications.

Fortunately, many organizations and cybersecurity experts protested and managed to halt legislation, but some politicians seriously put it forward as a measure against terrorism and cyber threats while it would only aggravate the threat.

Email companies also have their threat model

Email companies are constantly under attack by various threat actors. Their threat model may look like that:

Threat Remediation
sniffing SSL/TLS
phishing, viruses digital signatures, CIA triad
compromised accounts - leaked passwords 2FA, MFA, secret phrases
mass surveillance - advanced attackers encryption 4096 bits - E2EE
compromised devices - zombie computers 0
social engineering 0
lost secret phrases or 2FA/MFA devices 0 or 1FA*
Man In The Middle 0 or not much
DDoS, malicious payloads 0

I use 0 when the provider cannot guarantee a 100% protection but only mitigate the damage. If you care about privacy, it's best if you can think about your own threat model too.

* 1FA is classic login/password

Privacy measures can look suspicious

You may raise the curiosity by taking pretty basic measures to protect your privacy. For many people and organizations, having a Protonmail account is sufficient to look suspicious.

The same people might approve the "nothing to hide" argument. Depending on your goals, such privacy measure might not be the best move.

Top comments (6)

Collapse
 
skywarth profile image
skywarth

Great post.

Collapse
 
enbonnet profile image
Ender Bonnet

Looks like you are talking about two different points, most of the users that want "secure" email providers aren't criminals, most of them just want alternatives to avoid megacorps like Google handling all his data.

Secure doesn't mean that you could use it to commit crimes.

Collapse
 
spo0q profile image
spO0q

If you read the post carefully, you'll see the point is not there. It invites users not to use "secure" emails for the wrong reasons.

It also notices that, unfortunately, many people find secure emails addresses suspicious.

Collapse
 
enbonnet profile image
Ender Bonnet

Maybe I didn't get that point because I'm not a native English speaker, but you are right many people find addresses like "@pm.me" suspicious.

Collapse
 
renanfranca profile image
Renan Franca

Thank you for sharing! I read Snowden's book, I really enjoy it.
After thought with myself, I decided to use paid VPN and use it full time. If you don't disturb the authorities it's ok, but when they want to shut you down it's too late to start using VPN because you already leave trails.

Collapse
 
spo0q profile image
spO0q

Yes, even if some VPN providers pretend to keep authorities away, a VPN is not meant for that. It just cannot do it.