pull down to refresh

Hasn't proton collaborated with Swiss authorities to give up user information?
DYOR on privacy and understand what guarantees you are actually getting when using services like these.
reply
Under swiss law an email provider has to comply. French activists didn't protect themselves with tor/vpn. For the VPN this is different, swiss jurisdiction don't have to snitch their clients. Remember that when you use VPN the data center which routes your traffic is what matters. For example, if the data center routing your traffic is in France, law can just go to the DC provider and France will comply and snitch on you, and PROTON can't do shit.
That's why functions like secure core (just a hop on swiss DC) makes sense, because the French DT will snitch swiss IP and not yourse.
VPN shield is just as good as the law the countries you go through.
reply
Sort of, the devil is in the details on this one. I'd recommend familiarizing yourself with the details and to clarify what you mean by "give up user information".
But yeah, remember that subject lines are ALWAYS in plaintext, and that they are required by law to log which IP address you are using to access their service.
reply
That's a fucked up law.
reply
IIRC the ProtonMail user would have been safe if they accessed the service via a VPN. Even if it was there own VPN product.
Swiss VPN providers can't log IP addresses.
At least this is how I remember it when that unfortunate shit show happened.
reply
They don't have to give it but they definitely have it. There is no such things as "no logs VPN". There are always logs or team wouldn't be able to fix shit
reply
Yeah by log, I meant give them to authorities.
reply
Correct
reply
I use protonmail, proton vpn, proton calendar and proton drive. I am gradually escaping Google World. I hope stealth is as promised. I would be curious to see if anyone from China or other VPN busting jurisdictions could post a review in the future
reply
Traditional VPN protocols (such as OpenVPN, IKEv2, and WireGuard) are relatively easy to recognize on a network. And as deep packet inspection (DPI) technology becomes more widespread, it will be easier and easier for authoritarian detect and block VPNs using these protocols.
How does Stealth solve that?
Is it like DoH and masks itself as HTTPS traffic? If so, is that really the definitive solution to all protocols that want to be censorship resistant? Seems lazy and shortsighted if that is the case.
And even the initial https connection leaks the IP address it is connecting to which in case of proton is easily identifiable by authorities as a VPN provider.
How do they get around that issue? Do they routes the last mile traffic using tor or i2p? If so, how reliable is that? Or do they use their own tor like anonymity routing? But doesnt that cause it's own problems since the smaller you are the more you stand out from the crowd.
Finally, is there any known case of wireguard being censored? Is there really a need for a another competing VPN protocol?
reply
How would that compare with this? https://safing.io/spn/
reply
SPN comes without support for mobile devices.
reply
Would it work if you vpn to your own Linux vps that routes your traffic through SPN? Or is the route setup client-side
reply
Good to know 👍
reply