• Protonmail and 'Swiss privacy' remind me of Operation Rubicon.

    From SugarBug@21:1/5 to All on Mon Apr 22 07:05:43 2024
    XPost: alt.privacy.anon-server

    @firefly@neon.nightbulb.net

    Protonmail reminds me of Operation Rubicon.

    Propagandists and useful idiots routinely pump Proton Mail as a champion of privacy. They will post links to articles in which some agency or foreign government has requested Proton Mail to hand over user data. Then the article will position 'Swiss
    privacy laws' as saving the day. This smells of mockingbird media agitprop meant to generate interest in Protonmail. If enough such articles are circulated, the gullible will believe they are protected by 'Swiss privacy' then flock to Protonmail as their
    'privacy savior'.

    Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

    Operation Rubicon
    https://en.wikipedia.org/wiki/Operation_Rubicon

    Crypto AG
    https://en.wikipedia.org/wiki/Crypto_AG

    If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you have
    no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data privacy.
    If you use an email server, even if you use end-to-end encryption, you have zero metadata privacy. Anyone can see WHO you are talking to even if they can't see the talk itself. Criminals and spooks are generally more interested in _who_ you talk to over
    _what_ you say. The _who_ is the most important piece of knowledge for their operations.

    When using email for encrypted messages is always better for both parties to use their own email servers. Even better than that is to use a encrypted messenger through a Tor hidden service. The encrypted messenger must NOT rely on the Tor keys for the
    security of the encryption, but must first encrypt it using secret keys _before_ sending the data over the Tor network. Even with Tor, metadata unmasking is possible through monitoring and traffic correlation attacks. If you are a whistleblower or an at-
    risk person it is still far safer to send coded messages by other channels.

    If you rely on Protonmail and similar services for high-risk communications you are taking a dangerous risk.

    Watch the phan boiz rage outlet!

    #Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG #Switzerland #CIA

    --
    www.sybershock.com | sci.crypt | alt.sources.crypto | alt.lite.bulb

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Anonymous@21:1/5 to SugarBug on Mon Apr 22 17:07:19 2024
    XPost: alt.privacy.anon-server

    On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:
    If you trust any third-party server to protect your privacy, you're a rube.
    If you trust electronic comms you're a rube. Security is offline.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Cri-Cri@21:1/5 to Anonymous on Mon Apr 22 19:14:34 2024
    XPost: alt.privacy.anon-server

    On Mon, 22 Apr 2024 17:07:19 +0000, Anonymous wrote:

    Security is offline.

    And knowing whom you're dealing with.

    --
    Cri-Cri

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Yamn Remailer@21:1/5 to Anonymous on Mon Apr 22 22:12:13 2024
    XPost: alt.privacy.anon-server

    Anonymous <nobody@yamn.paranoici.org> wrote:
    On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:

    If you trust any third-party server to protect your privacy, you're a rube.
    If you trust electronic comms you're a rube. Security is offline.

    I doubt it. Offline, which means non-virtual interaction by
    exchanging physical media, inevitably leaves much more traces than
    electronic communication, to be exact asynchronous anonymous onion
    routing as done with a combination of Tor & Mixmaster / YAMN. Just
    think of fingerprints or DNA contamination of communication media, the
    kind of paper, ink or printer and toner you use, the postoffice that
    took delivery of your letter and so on. And I've no idea how to
    create an anonymous real world reply channel as offered by our
    nymservers. No, provided that your device isn't compromised anonymous remailing is the best we have, state of the art in this field.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Jan Panteltje@21:1/5 to noreply@mixmin.net on Tue Apr 23 06:44:23 2024
    XPost: alt.privacy.anon-server

    On a sunny day (Mon, 22 Apr 2024 22:12:13 +0100) it happened Yamn Remailer <noreply@mixmin.net> wrote in <20240422.221213.b8e85811@mixmin.net>:

    Anonymous <nobody@yamn.paranoici.org> wrote:
    On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:

    If you trust any third-party server to protect your privacy, you're a rube. >> If you trust electronic comms you're a rube. Security is offline.

    I doubt it. Offline, which means non-virtual interaction by
    exchanging physical media, inevitably leaves much more traces than
    electronic communication, to be exact asynchronous anonymous onion
    routing as done with a combination of Tor & Mixmaster / YAMN. Just
    think of fingerprints or DNA contamination of communication media, the
    kind of paper, ink or printer and toner you use, the postoffice that
    took delivery of your letter and so on. And I've no idea how to
    create an anonymous real world reply channel as offered by our
    nymservers. No, provided that your device isn't compromised anonymous >remailing is the best we have, state of the art in this field.

    With 2 TB micro SD cards homing pigeons are good for lots of data in a short time.
    Of course adversaries can target the pigeon holders,
    The next step is to add the info to the DNA of animals...
    or just to the regular mail or objects as contamination..
    ;-)

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Nomen Nescio@21:1/5 to All on Tue Apr 23 20:50:41 2024
    XPost: alt.privacy.anon-server

    On 22 Apr 2024, Jan Panteltje <alien@comet.invalid> posted some news:v07lc8$cl5k$1@solani.org:

    On a sunny day (Mon, 22 Apr 2024 22:12:13 +0100) it happened Yamn
    Remailer
    <noreply@mixmin.net> wrote in <20240422.221213.b8e85811@mixmin.net>:

    Anonymous <nobody@yamn.paranoici.org> wrote:
    On Mon 22 Apr 2024 3:05 pm, SugarBug wrote:

    If you trust any third-party server to protect your privacy, you're
    a rube.
    If you trust electronic comms you're a rube. Security is offline.

    I doubt it. Offline, which means non-virtual interaction by
    exchanging physical media, inevitably leaves much more traces than >>electronic communication, to be exact asynchronous anonymous onion
    routing as done with a combination of Tor & Mixmaster / YAMN. Just
    think of fingerprints or DNA contamination of communication media, the
    kind of paper, ink or printer and toner you use, the postoffice that
    took delivery of your letter and so on. And I've no idea how to
    create an anonymous real world reply channel as offered by our
    nymservers. No, provided that your device isn't compromised anonymous >>remailing is the best we have, state of the art in this field.

    With 2 TB micro SD cards homing pigeons are good for lots of data in a
    short time. Of course adversaries can target the pigeon holders,
    The next step is to add the info to the DNA of animals...
    or just to the regular mail or objects as contamination..
    ;-)

    That actually works.

    An SD card fits nicely behind a stamp on a postcard too.

    You're on to something with the DNA.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Cri-Cri@21:1/5 to Jan Panteltje on Wed Apr 24 18:14:44 2024
    XPost: alt.privacy.anon-server

    On Tue, 23 Apr 2024 06:44:23 GMT, Jan Panteltje wrote:

    With 2 TB micro SD cards homing pigeons are good for lots of data in a
    short time.

    Slower: Growing trees in the form of a QR code? ;)

    --
    Cri-Cri

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Edward Teach@21:1/5 to SugarBug on Sun Jun 2 11:17:22 2024
    XPost: alt.privacy.anon-server

    On Mon, 22 Apr 2024 07:05:43 -0500
    SugarBug <3883@sugar.bug> wrote:

    @firefly@neon.nightbulb.net

    Protonmail reminds me of Operation Rubicon.

    Propagandists and useful idiots routinely pump Proton Mail as a
    champion of privacy. They will post links to articles in which some
    agency or foreign government has requested Proton Mail to hand over
    user data. Then the article will position 'Swiss privacy laws' as
    saving the day. This smells of mockingbird media agitprop meant to
    generate interest in Protonmail. If enough such articles are
    circulated, the gullible will believe they are protected by 'Swiss
    privacy' then flock to Protonmail as their 'privacy savior'.

    Everything you need to know about so-called 'Swiss Privacy' we
    learned decades ago from Operation Thesaurus, AKA, Operation Rubicon.
    We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

    Operation Rubicon
    https://en.wikipedia.org/wiki/Operation_Rubicon

    Crypto AG
    https://en.wikipedia.org/wiki/Crypto_AG

    If you trust any third-party server to protect your privacy, you're a
    rube. If you trust Proton Mail to protect your privacy, you're a rube
    getting 'crossed' by the Swiss Rubi-con. Either you own your keys and
    your data on your computer or else you have no privacy. Someone
    else's promise that your data will be 'encrypted' so they can't
    decipher it is a hollow pledge. If you send any form of plaintext to
    a remote server, no matter how much they claim to encrypt it, you
    have zero assurance of data privacy. If you use an email server, even
    if you use end-to-end encryption, you have zero metadata privacy.
    Anyone can see WHO you are talking to even if they can't see the talk
    itself. Criminals and spooks are generally more interested in _who_
    you talk to over _what_ you say. The _who_ is the most important
    piece of knowledge for their operations.

    When using email for encrypted messages is always better for both
    parties to use their own email servers. Even better than that is to
    use a encrypted messenger through a Tor hidden service. The encrypted messenger must NOT rely on the Tor keys for the security of the
    encryption, but must first encrypt it using secret keys _before_
    sending the data over the Tor network. Even with Tor, metadata
    unmasking is possible through monitoring and traffic correlation
    attacks. If you are a whistleblower or an at-risk person it is still
    far safer to send coded messages by other channels.

    If you rely on Protonmail and similar services for high-risk
    communications you are taking a dangerous risk.

    Watch the phan boiz rage outlet!

    #Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG #Switzerland #CIA


    @SugarBug
    Much of what you say is perfectly valid. That said, there are
    intermediate steps that people can take....not getting to complete
    anonymity or perfect privacy.....but a step or two better than nothing!
    (1) Anonymity. You can use mail addresses from MAIL.COM. When you do
    this you also need to make sure that these mail addresses are only used
    from public places (say internet cafes) so that both the email address
    and the IP address are not linked to a single person. Of course the
    RECIPIENT email address(es) might give the game away!
    (2) Privacy. I'm always amused when people talk about "public key infrastructure", say PGP and the like. Any group of people can set up
    a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
    random throwaway shared secret encryption key. There are no published
    keys anywhere....the keys are calculated when needed and then destroyed.
    (3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
    more work. Of course, snooping will not be impossible......but it
    might be made very difficult, both on the privacy side and on the
    anonymity side.....and without huge amounts of heavy lifting for the
    users.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From The Running Man@21:1/5 to 3883@sugar.bug on Sun Jun 2 11:41:40 2024
    On 22/04/2024 07:05 SugarBug <3883@sugar.bug> wrote:
    @firefly@neon.nightbulb.net

    Protonmail reminds me of Operation Rubicon.

    Propagandists and useful idiots routinely pump Proton Mail as a champion of privacy. They will post links to articles in which some agency or foreign government has requested Proton Mail to hand over user data. Then the article will position 'Swiss
    privacy laws' as saving the day. This smells of mockingbird media agitprop meant to generate interest in Protonmail. If enough such articles are circulated, the gullible will believe they are protected by 'Swiss privacy' then flock to Protonmail as their
    'privacy savior'.

    Everything you need to know about so-called 'Swiss Privacy' we learned decades ago from Operation Thesaurus, AKA, Operation Rubicon. We learned that CIA operations and black budget banking are actually headquartered in the Swiss underground.

    Operation Rubicon
    https://en.wikipedia.org/wiki/Operation_Rubicon

    Crypto AG
    https://en.wikipedia.org/wiki/Crypto_AG

    If you trust any third-party server to protect your privacy, you're a rube. If you trust Proton Mail to protect your privacy, you're a rube getting 'crossed' by the Swiss Rubi-con. Either you own your keys and your data on your computer or else you
    have no privacy. Someone else's promise that your data will be 'encrypted' so they can't decipher it is a hollow pledge. If you send any form of plaintext to a remote server, no matter how much they claim to encrypt it, you have zero assurance of data
    privacy. If you use an email server, even if you use end-to-end encryption, you have zero metadata privacy. Anyone can see WHO you are talking to even if they can't see the talk itself. Criminals and spooks are generally more interested in _who_ you talk
    to over _what_ you say. The _who_ is the most important piece of knowledge for their operations.

    When using email for encrypted messages is always better for both parties to use their own email servers. Even better than that is to use a encrypted messenger through a Tor hidden service. The encrypted messenger must NOT rely on the Tor keys for the
    security of the encryption, but must first encrypt it using secret keys _before_ sending the data over the Tor network. Even with Tor, metadata unmasking is possible through monitoring and traffic correlation attacks. If you are a whistleblower or an at-
    risk person it is still far safer to send coded messages by other channels.


    I agree 100%. Use PGP or S/MIME on your own computer. Anyone that uses online encrypted e-mail services is a dunce.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From A Remailer User@21:1/5 to Edward Teach on Sun Jun 2 16:29:01 2024
    XPost: alt.privacy.anon-server

    Edward Teach <hackbeard@linuxmail.org> wrote:
    On Mon, 22 Apr 2024 07:05:43 -0500
    SugarBug <3883@sugar.bug> wrote:

    @firefly@neon.nightbulb.net

    Protonmail reminds me of Operation Rubicon.

    Propagandists and useful idiots routinely pump Proton Mail as a
    champion of privacy. They will post links to articles in which some
    agency or foreign government has requested Proton Mail to hand over
    user data. Then the article will position 'Swiss privacy laws' as
    saving the day. This smells of mockingbird media agitprop meant to
    generate interest in Protonmail. If enough such articles are
    circulated, the gullible will believe they are protected by 'Swiss
    privacy' then flock to Protonmail as their 'privacy savior'.

    Everything you need to know about so-called 'Swiss Privacy' we
    learned decades ago from Operation Thesaurus, AKA, Operation Rubicon.
    We learned that CIA operations and black budget banking are actually
    headquartered in the Swiss underground.

    Operation Rubicon
    https://en.wikipedia.org/wiki/Operation_Rubicon

    Crypto AG
    https://en.wikipedia.org/wiki/Crypto_AG

    If you trust any third-party server to protect your privacy, you're a
    rube. If you trust Proton Mail to protect your privacy, you're a rube
    getting 'crossed' by the Swiss Rubi-con. Either you own your keys and
    your data on your computer or else you have no privacy. Someone
    else's promise that your data will be 'encrypted' so they can't
    decipher it is a hollow pledge. If you send any form of plaintext to
    a remote server, no matter how much they claim to encrypt it, you
    have zero assurance of data privacy. If you use an email server, even
    if you use end-to-end encryption, you have zero metadata privacy.
    Anyone can see WHO you are talking to even if they can't see the talk
    itself. Criminals and spooks are generally more interested in _who_
    you talk to over _what_ you say. The _who_ is the most important
    piece of knowledge for their operations.

    When using email for encrypted messages is always better for both
    parties to use their own email servers. Even better than that is to
    use a encrypted messenger through a Tor hidden service. The encrypted
    messenger must NOT rely on the Tor keys for the security of the
    encryption, but must first encrypt it using secret keys _before_
    sending the data over the Tor network. Even with Tor, metadata
    unmasking is possible through monitoring and traffic correlation
    attacks. If you are a whistleblower or an at-risk person it is still
    far safer to send coded messages by other channels.

    If you rely on Protonmail and similar services for high-risk
    communications you are taking a dangerous risk.

    Watch the phan boiz rage outlet!

    #Cryptography #Cryptology #Encryption #Crypto #Protonmail #CryptoAG
    #Switzerland #CIA


    @SugarBug
    Much of what you say is perfectly valid. That said, there are
    intermediate steps that people can take....not getting to complete
    anonymity or perfect privacy.....but a step or two better than nothing!
    (1) Anonymity. You can use mail addresses from MAIL.COM. When you do
    this you also need to make sure that these mail addresses are only used
    from public places (say internet cafes) so that both the email address
    and the IP address are not linked to a single person. Of course the >RECIPIENT email address(es) might give the game away!

    For that purpose we do have nymservers, controlled through anonymous
    remailers.

    (2) Privacy. I'm always amused when people talk about "public key >infrastructure", say PGP and the like. Any group of people can set up
    a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
    random throwaway shared secret encryption key. There are no published
    keys anywhere....the keys are calculated when needed and then destroyed.

    How will you implement DH key negotiations while preserving the
    anonymity of both participants?

    (3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
    more work. Of course, snooping will not be impossible......but it
    might be made very difficult, both on the privacy side and on the
    anonymity side.....and without huge amounts of heavy lifting for the
    users.

    Let each participant set up an anonymous mail account at a nymserver,
    exchange public keys with the initial mail message and from then on use Whole-Message-Encryption. Problem solved.


    Have a look at the Wikipedia section about anonymous remailing (https://en.wikipedia.org/wiki/Anonymous_remailer), which currently is
    no more than an empty shell and urgently needs an update adding all the software projects this still most secure and universally applicable
    method of anonymous communication bases on (Mixmaster, YAMN,
    Quicksilver, OmniMix).

    https://en.wikipedia.org/wiki/Mixmaster_anonymous_remailer

    | Original author(s) Lance Cottrell
    | Developer(s) Len Sassaman and Peter Palfrader
    | Stable release 3.0 / March 3, 2008
    | Type Anonymous remailer
    | Website http://mixmaster.sourceforge.net/

    e.g. makes you think that anonymous remailing is dead, which is dead
    wrong. Mixmaster continues to work great, in addition we now have the
    YAMN network, and there's client software, that allows a seamless
    integration into your e-mailing workflow.

    There's a comprehensive link list at https://danner-net.de/omd.htm#d05.

    With these tools at hand implementing the Chaumian Mix network strategy
    and onion routing there's no reason to rely on the integrity of any
    service provider. So better stay away from all these dubious con men
    and their questionable promises.

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Anonymous@21:1/5 to A Remailer User on Tue Jun 4 18:41:18 2024
    XPost: alt.privacy.anon-server

    A Remailer User <remailer-user@somewhere.invalid> wrote:

    Edward Teach <hackbeard@linuxmail.org> wrote:

    Much of what you say is perfectly valid. That said, there are
    intermediate steps that people can take....not getting to complete
    anonymity or perfect privacy.....but a step or two better than nothing!
    (1) Anonymity. You can use mail addresses from MAIL.COM. When you do
    this you also need to make sure that these mail addresses are only used
    from public places (say internet cafes) so that both the email address
    and the IP address are not linked to a single person. Of course the
    RECIPIENT email address(es) might give the game away!

    For that purpose we do have nymservers, controlled through anonymous remailers.

    (2) Privacy. I'm always amused when people talk about "public key
    infrastructure", say PGP and the like. Any group of people can set up
    a Diffie/Hellman protocol. With this in place EVERY MESSAGE gets a
    random throwaway shared secret encryption key. There are no published
    keys anywhere....the keys are calculated when needed and then destroyed.

    How will you implement DH key negotiations while preserving the
    anonymity of both participants?

    (3) E2EE. Any group using items #1 and #2 are giving the snoops MUCH
    more work. Of course, snooping will not be impossible......but it
    might be made very difficult, both on the privacy side and on the
    anonymity side.....and without huge amounts of heavy lifting for the
    users.

    Let each participant set up an anonymous mail account at a nymserver, exchange public keys with the initial mail message and from then on use Whole-Message-Encryption. Problem solved.


    Have a look at the Wikipedia section about anonymous remailing (https://en.wikipedia.org/wiki/Anonymous_remailer), which currently is
    no more than an empty shell and urgently needs an update adding all the software projects this still most secure and universally applicable
    method of anonymous communication bases on (Mixmaster, YAMN,
    Quicksilver, OmniMix).

    https://en.wikipedia.org/wiki/Mixmaster_anonymous_remailer

    | Original author(s) Lance Cottrell
    | Developer(s) Len Sassaman and Peter Palfrader
    | Stable release 3.0 / March 3, 2008
    | Type Anonymous remailer
    | Website http://mixmaster.sourceforge.net/

    e.g. makes you think that anonymous remailing is dead, which is dead
    wrong. Mixmaster continues to work great, in addition we now have the
    YAMN network, and there's client software, that allows a seamless
    integration into your e-mailing workflow.


    Are you aware of http://en.wikipedia.org/w/index.php?title=Anonymous_remailer&diff=prev&oldid=260821642

    There's obviously someone who aims at dampening awareness of anonymous remailing, which makes it even more attractive, at least to me.

    Anyone out there with a Wikipedia account willing to update the remailer section with contents we put together here? For years nobody took steps against such blandant censorship. Isn't it time to put things straight?

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • From Nomen Nescio@21:1/5 to Anonymous on Wed Jun 5 16:25:31 2024
    XPost: alt.privacy.anon-server

    Anonymous wrote:

    Are you aware of >http://en.wikipedia.org/w/index.php?title=Anonymous_remailer&diff=prev&oldid=260821642


    The latest removal of that remailer software section happened in 2017.

    <https://en.wikipedia.org/w/index.php?title=Anonymous_remailer&diff=next&oldid=774688059>

    And yes, we have to resist. Freedom of speech is too important!


    Have a look at the polished Proton Mail Wikipedia article and compare
    that with reality:

    ----------------------------------------------------------------------
    * PROTONMAIL provides IP logs to police *

    A recently released court document revealed that PROTONMAIL provided IP
    address logs of a user to the French authorities, and this was
    instrumental in the arrest of the respective user.

    * Swiss jurisdiction isn’t what it used to be *

    From the company’s inception, PROTONMAIL punctuated that their Swiss jurisdiction confers them legal independence and that the Swiss Federal
    Supreme Court can compel them to only release extremely limited
    information.

    Here’s a quote from their official website:

    “As PROTONMAIL is outside of US and EU jurisdiction, only a court order
    from the Cantonal Court of Geneva or the Swiss Federal Supreme Court can
    compel us to release the extremely limited user information we have.”

    What was previously unknown was what this “extremely limited
    information” actually meant. Seemingly, in the past this did not include
    IP logs. However, now this seems to have changed as per Swiss
    regulations.

    Again, it’s important to point out here that contrary to what’s being reported in other media outlets, it seems that it was not PROTONMAIL who
    was at fault in this case.

    The data handover happened as a consequence of a legal request by a
    Swiss court, something the email provider was legally unable to
    challenge.

    Therefore, the essence of this case is not the fact how PROTONMAIL
    handled this situation, but the fact that seemingly Swiss jurisdiction
    does not offer as many protections anymore as it was assumed in the
    past.

    * Other email providers have surrendered to pressure too *

    RISEUP, a US-based email and VPN provider, was legally compelled to
    cooperate on two sealed warrants from the FBI. The consequences should
    they not obey – jail time and premature closing of the RISEUP company.

    In their defense, they had a gag order preventing them from warning
    users of these events. They couldn’t even update their Warrant Canary
    because of this. Only when the gag orders expired could they breathe a
    word about it.

    Another famous case is that of TUTANOTA, a German email provider. In
    2020, a German court compelled TUTANOTA to log incoming and outgoing unencrypted emails for a German user.

    The German court could access all unencrypted emails sent to and from
    the user’s email address, while the encrypted correspondence stayed that
    way.

    The situation with TUTANOTA is strikingly similar to PROTONMAIL, in that
    a court-issued order targeted one individual. The email providers had to
    log that specific user’s activities and collect the IP address. Other
    users were not affected at all.

    From <https://www.privacyaffairs.com/protonmail-surrenders-user-logs/> ----------------------------------------------------------------------

    Snake oil everywhere you look.


    The best we have are anonymous remailers. That has to be made public!

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)