Hacker Newsnew | past | comments | ask | show | jobs | submit | guilamu's commentslogin

"Proton Mail, one of the services he moved to, is ultimately controlled by the US Gov,"

Would you mind elaborating, pretty please?


"Controlled" is a bit hyperbolic, but there's a collaboration agreement between the USA government and the Swiss government, so Proton has to comply with requests from for example the FBI. Quoting a comment by Proton staff on Reddit

> First, let's correct the headline: Proton did not provide information to the FBI. What happened is that the FBI submitted a Mutual Legal Assistance Treaty (MLAT) request, which was processed by the Swiss Federal Department of Justice and Police. Proton operates exclusively under Swiss law, and we only respond to legally binding orders from Swiss authorities, after all Swiss legal checks have been passed. This is an important distinction.

> [...]

> The only information Proton could provide was a payment identifier because the user chose to pay with a credit card. This is information the user themselves provided to us through their choice of payment method. Proton also accepts cryptocurrency and cash payments, which would not have been linkable to an identity.

So basically, don't trust Proton with information unless you want the FBI to know it.


"So basically", what a weird conclusion to take out of it, just don't pay with your credit card for services you can pay cash or crypto.

Sorry, perhaps the takeaway is clearer when you see the full quote [0]. I omitted it for space, here's the relevant part

> Third, let's talk about what was actually disclosed. No emails were handed over. No message content. No metadata about who the user communicated with. The only information Proton could provide [...]

Yes, paying by crypto prevents Proton from disclosing your identity that way. Is there anything preventing Proton from disclosing the email content or metadata? Do they claim they won't disclose that? Clearly they do allow themselves to disclose metadata [1]

> For example, in ransomware cases, we can preserve information about which victims contacted the suspect, so that victims can be notified.

So, "just don't pay with a credit card" comes with the additional caveat of "don't email somebody you don't want the FBI to know you emailed". Whether you also need to "don't write anything you don't want the FBI to know", I haven't investigated further, but you could perhaps look that up yourself. I will just assume that to be the case based on what I've seen.

[0] https://www.reddit.com/r/privacy/comments/1rltej7/comment/o8... [1] https://proton.me/legal/law-enforcement


There are limits of what you can encrypt, in all of the cases of proton being critiqued for its compliance with law I haven't seen any instance of them being able to disclose email content, where metadata is "who we're sending email to", which is, I assume, not encryptable if you want an usable service. That being said, the quote does make your pov clearer, thank you for that.

> Is there anything preventing Proton from disclosing the email content or metadata?

Mmh.. The fact that it is encrypted client-side ? I mean the code is open-source fgs. [0][1][2]

[0]https://github.com/ProtonMail/android-mail [1]https://github.com/ProtonMail/ios-mail [3]https://github.com/ProtonMail/WebClients


Yeah, if you trust that they will never push a backdoor to your client on the request of Swiss law enforcement. It's a web app "fgs".

They also admit to scanning all mail to and from non-Proton accounts "for spam". So what's stopping them from one day adding a small if statement that just writes that data to disk, for specific "interesting" users?

Regarding metadata, I sure hope you have nothing to hide in the below emphasized:

> Account Activity: Due to limitations of the SMTP protocol, we have access to the following email metadata: *sender and recipient email addresses, the IP address incoming messages originated from, attachment name, message subject, and message sent and received times*. We do NOT have access to encrypted message content, but unencrypted messages sent from external providers to your Account, or from Proton Mail to external unencrypted email services, are scanned for spam and viruses to pursue the legitimate interest of protecting the integrity of our Services and users. Such inbound messages are scanned for spam in memory, and then encrypted and written to disk. We do not possess the technical ability to scan the content of the messages after they have been encrypted. We also have access to the following records of Account activity: number of messages sent, amount of storage space used, total number of messages, last login time. User data is never used for advertising purposes.



Please quote where in that document the answer to my question is:

> Is there anything preventing Proton from disclosing the email content or metadata?

Also please link me to the source code of Proton's server-side code, so I can audit their scanning of all incoming and outgoing mail, to verify it's not logging them. What you linked above is just the clients.


that's why they have independent audits.

Use LTSC. It'll fix all the issues you are mentioning here.


Second ltsc -look into it once you try you will never go back. Available from various resellers nowadays. It is, what windows should be sold as.


AFAIK Office isn't supported on LTSC fka. LTSB.

Installed LTSB for a conservative superior. He just wanted to work, without changes. I supported that happily. Until we had to start using Office 365.

Or did they revert that restriction?


LTSC cannot be bought as a regular customer unfortunately. Legally, regular customers are only allowed to use the enshittified version.


You can get access to it, but it's a quest. You need to buy a volume license, and this requires at least 5 licenses (about $300). Then you'll be eligible to buy an LTSC version.

It doesn't require a corporation or anything, you can do that as a private person. But it IS annoying.


Why not just get the iso, install, activate with massgravel and be done for life?


Because it's illegal and that matters to some people


That's true indeed, but Microsoft is not giving us any other option so why not use the good version at home? I mean what is the risk really?


MS has always been (and probably still does) wanting you to pirate Windows instead of jumping to Linux or Mac.


For those interested, I just made a quick guide to migrate from Swiftkey to Heliboard: https://github.com/guilamu/SwiftKey2HeliBoard


This is Google. Just change the default launcher and you're good.


Nova Launcher just added advertisements, unless you buy Pro. Ads come for everyone.


Try https://github.com/spocky/miproja1, it's awesome and will never get any ads.


Can confirm, it works very well. You can set it as the default launcher, and never have an issue.


That's because Nova launcher sold to new owners (whose presumed only goal is to serve ads)


I asked 6 llms "What do you think of Grokipedia as a factual source of information?". Results: https://pastebin.com/cuxfHAr4

I then asked Claude Opus to sumup: https://markdownpastebin.com/?id=aa29d92662ac4a9ea7f9b3c1d9a...

Bottom Line All LLMs agree: Grokipedia is useful for quick orientation but unreliable for serious research, especially on political, controversial, or current event topics. Wikipedia remains the more trustworthy alternative.


Why should we care what LLM's say about other LLM's?


Because of (1) all the people using them uncritically, (2) that they're elite projects in a field whose foudation of "what even are bugs here?" includes amongst its narratives stories of how elites can abuse them for personal gain


Thanks for your kind words ^^.


Well, you just answered brilliantly to your own question. You nailed it.


Leaving room for someone to give me convincing evidence to the contrary. I didn't expect any, though.

It also lets someone who knows more than I to elaborate with more depth.


Agreed, I just wanted to say I agree with your sentiment.


It seems that anybody mentioning Telegram is downvoted, but I'm gonna try anyway just to add a simple fact: I just looked up the app in my task manager, while being used, the Telegram app is using 24 mb of ram.

Telegram has its own faults and issues, but the native Windows app is incredibly good and fast.


I'd say Ente-photo is at least as good if not better than Immich.

https://github.com/ente-io/ente


I would say the opposite. Ente has one huge advantage and that it is e2ee so it's a must if you are hosting someone else photos. But if you are planning to run something on your server/NAS for yourself then Immich has many advantages (that often relate to the e2ee). For example... your files are still files on the disk so less worry about something unrecoverably breaking. And you can add external locations. With Ente it is just about backing up your phone photos. Immich works pretty well as camera photo organizer.


The Ente desktop app has a continuous export function that’ll just dump everything into plain file directories.

It makes a little more sense when you’re using their cloud version, because otherwise you’re storing the data twice.


Does it have a mobile app that backs up the photos while in the background and can essentially be "forgotten"? That's pretty much what I need for my family: their photos need to get to my server magically.


Both Ente and Immich have that.


I'm also a very happy Ente user. I use Garage for its S3-like storage, with one of the nodes running on my local network (LAN). My local DNS (CoreDNS) is also configured to use this local node for the domain, which makes everything very fast.


I'm a very happy Ente Photos user as well.


Never had this issue.

Tested isos: Windows 10 x64 (Pro, LTSC), Windows 11 (Pro, LTSC). I've installed windows on hundreds of computers with Ventoy and it never failed me.


Lucky you. I'm not sure why it happened to me and not you, but it's a real problem and others have had it too.

It manifests itself as the dreaded "a media driver your computer needs is missing" error message when trying to start the install.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: