Assuming that you trust what Proton says, when they receive a (possibly unencrypted) message they re-encrypt it with your key as soon as possible and they don’t log the content. So, after that point, they (or anyone else) can’t read the email contents. If it was also encrypted in transit, then there’s only a small window inside their email processing system where the plaintext was passed from one encryption to the other. It’s only decrypted again in your browser or proton mail app with the key that only you have. It’s not bulletproof, but it’s better than most providers.
- 0 Posts
- 6 Comments
Joined 2 years ago
Cake day: June 4th, 2023
You are not logged in. If you use a Fediverse account that is able to follow users, you can follow this user.
Agreed. Theoretically possible, but practically not possible unless you are an embedded hardware engineer with access to Sony’s datasheets and potentially crypto keys. Some sort of external box is much more practical.
colournoun@beehaw.orgto Linux@lemmy.ml•Is there any animal you wish Ubuntu used for its naming convention?3·22 days agoassfish are soft and flabby
Your domain name could be ordered to be removed from US-based dns providers, no matter which TLD it is. That would essentially block your website from most US-based viewers without actually shutting down your hosting. Advanced users could still get to it, though. Consider hosting through Tor and a .onion address for more resiliency.
You might enjoy reading Extreme Privacy by Michael Bazzell
A quick fix might be to disable any ipv6 addresses if you don’t specifically need them. The vpn /could/ be ipv4 only, which /could/ leave your ipv6 free to leak or make ipv6 dns requests.