ProtonMail

From Wikispooks
Revision as of 02:15, 4 August 2021 by Terje (talk | contribs) (email company)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

Group.png ProtonMail  
(Tech company, Alt Tech)Rdf-entity.pngRdf-icon.png
Protonmail logo.png
Formation16 May 2014
Founder•  Jason Stockman
•  Andy Yen
•  Wei Sun
HeadquartersSwitzerland
Email and VPN server originally located in formally neutral Switzerland to avoid US/NATO surveillance or "information requests", but this has been hollowed out.

ProtonMail is an end-to-end encrypted email service founded in 2013 in Geneva, Switzerland by scientists who spent time at the CERN research facility.[1]

Originally an Alt Tech company located in formally neutral Switzerland to avoid any surveillance or information requests from countries under the Fourteen Eyes, and/or under other government surveillance laws, like the United States' Patriot Act or covert surveillance, by 2021 there had been several revelations of its cooperation with US authorities.

Encryption

ProtonMail uses client-side encryption to protect email content and user data before they are sent to ProtonMail servers, unlike other common email providers such as Gmail and Outlook.com. The service can be accessed through a webmail client, the Tor network, or dedicated iOS and Android apps.[2]

ProtonMail is run by its parent company Proton Technologies AG, which is based in the Canton of Geneva.[3] The company also operates ProtonVPN, a VPN service. ProtonMail received initial funding through a crowdfunding campaign. Initially invitation-only, ProtonMail opened up to the public in March 2016. In 2017, ProtonMail had over 2 million users,[4] and grew to over 5 million by September 2018,[5] 20 million by the end of 2019,[6] and over 50 million in 2020.[7]

An email message sent from one ProtonMail account to another is automatically encrypted with the public key of the recipient. Once encrypted, only the private key of the recipient can decrypt the message. When the recipient logs in, their mailbox password decrypts their private key and unlocks their inbox.

Email messages sent from ProtonMail to non-ProtonMail email addresses may optionally be sent in plain text or with end-to-end encryption. With encryption, the message is encrypted with AES under a user-supplied password. The recipient receives a link to the ProtonMail website on which they can enter the password and read the decrypted message. ProtonMail assumes that the sender and the recipient have exchanged this password through a backchannel.[8] Such email messages can be set to self-destruct after a period of time.[9]

Official Story

Proton1-s.jpg

Both ProtonMail and ProtonVPN are located in Switzerland to avoid any surveillance or information requests from countries under the Fourteen Eyes, and/or under government surveillance laws like the United States' Patriot Act or outside the bounds of law.

The company claims that it is also located in Switzerland because of its strict privacy laws.[10]

By law, ProtonMail has to cooperate with Swiss security authorities. With the Swiss Surveillance Act (BÜPF) and the Intelligence Service Act (NDG), Switzerland is "a fully-fledged surveillance state"[11]. Switzerland provides mutual legal assistance to the United States on the basis of the Legal Assistance Treaty of 1973; this way data also ends up with law enforcement agencies there.[11]

ProtonMail founder Andy Yen originally stated that the company would rather leave Switzerland than comply with the BÜPF. ProtonMail chose to stay in Switzerland, and thus has to comply with Swiss surveillance law.[11]

Good cooperation with (US) authoritites

In 2021, the company was involved in threats against the well-known health bureaucrat Anthony Fauci. In a series of emails, the sender threatened, among other things, to kill Fauci and his family. As the American Justice Department wrorte[12] in an affidavit that the accused used "an email account from a provider of secure, encrypted email services based in Switzerland". According to the affidavit, the relevant e-mails end with “Sent with ProtonMail Secure Email”[11].

Based on data from ProtonMail, it became apparent that the accused had used several ProtonMail user accounts at the same time. According to his own statements, the accused had switched to ProtonMail because he believed he was protected by Swiss data protection law and end-to-end encryption. Nevertheless, the sender could be identified in the interaction of data from ProtonMail and other online services such as Mail.com.[13]

The Swiss Federal Office of Police (Fedpol) confirmed the exchange with the American authorities. At the same time, Fedpol said it was delighted to work with ProtonMail: «Protonmail is cooperating with the authorities. The cooperation is good."[14]

Participating in information war

In May 2021. during the aftermath of the emergency landing in Minsk of a Ryanair flight between Greece and Lithuania] ProtonMail provided fractional information about emails which delivered a bomb threat against the plane to several airports. As analyst Moon of Alabama, the partial and seemingly willfully incomplete response by ProtonMail" about when and how many emails were sent, "has led to false claims by various media against the government of Belarus, thus making it part of the Western "information war against Belarus."[15]


Many thanks to our Patrons who cover ~2/3 of our hosting bill. Please join them if you can.


References