STOP Using Proton & Signal? Here’s the TRUTH

All Things Secured
16 May 202407:53

Summary

TLDRThe video discusses recent claims questioning the security of Proton and Signal, highlighting the importance of understanding legal frameworks and operational security. It clarifies that while companies must comply with legal requests, end-to-end encryption protects user data. The video emphasizes the need for users to take personal responsibility for their privacy by using tools like VPNs and being cautious with shared information.

Takeaways

  • 🔒 Proton and Signal, once considered secure platforms, are now under scrutiny due to recent events and media coverage.
  • 📜 Proton complied with a legal request from Spanish authorities, highlighting the legal obligations companies have to comply with government requests.
  • 🔗 The importance of understanding that companies can only provide data they possess, and end-to-end encryption limits what can be handed over.
  • 📧 Email and recovery email addresses are inherently not encrypted to ensure delivery, which is a necessary compromise for functionality.
  • 🏛️ Companies like Proton must operate within the legal frameworks of their host countries, even if they prioritize user privacy.
  • 🧐 The founder of Telegram questioned Signal's encryption, suggesting potential bias and a need for concrete evidence to support such claims.
  • 💼 Concerns about Signal's board chairman's history and connections, though the open-source nature of Signal's code provides some reassurance.
  • 🛡️ The strength of privacy apps and services depends on the user's operational security (OPSEC) and how they use these tools.
  • 🔄 Users can take steps like changing recovery email addresses or using VPNs to enhance their privacy, demonstrating personal responsibility in security.
  • 🚫 Even within end-to-end encryption, users must be cautious about what they share, as digital sharing can lead to unintended consequences.

Q & A

  • What is the main concern raised by the media about Proton and Signal?

    -The media claims that Proton and Signal are no longer secure platforms. Proton was reported to have complied with a request to hand over a recovery email address to Spanish police, and there are allegations that Signal is a front for the US government.

  • Why do some people react negatively to news about privacy companies cooperating with government requests?

    -People often have a confirmation bias, believing that privacy and security are illusions. When they hear about privacy companies complying with government requests, they tend to dismiss the idea of privacy altogether without examining the details.

  • What is the legal framework that companies like Proton have to operate within?

    -Companies must operate within the legal frameworks of their respective countries. If a government makes a legal, court-approved request for data, companies are required to comply, regardless of their privacy policies.

  • What limitations do companies have in terms of the data they can provide to authorities?

    -Companies can only provide data that they actually have. Data that is end-to-end encrypted is useless to authorities without the encryption keys, which are held by the users themselves.

  • Why is it necessary for email sender and recipient information to be unencrypted?

    -Sender and recipient information must be unencrypted for the email to be delivered. If this information were encrypted, the email could never be delivered, as it would not be recognizable by the email system.

  • What was Proton's response to the Spanish law enforcement request?

    -Proton complied with the request from Swiss authorities to provide a recovery email address. However, they did not provide the user's name or any of their emails because they did not have that information.

  • What is the controversy surrounding Signal's encryption and its board of directors?

    -There are claims that Signal's encryption has been exploited in US courts or media, and concerns about the chairman's history of promoting censorship and connections with the intelligence community. However, Signal is open source, and its code has been scrutinized by security researchers.

  • What is the primary message the speaker wants the audience to take away from the discussion?

    -The speaker emphasizes that privacy apps and services are only as strong as the user who uses them. Users need to practice good operational security (OPSEC) and be responsible for their own privacy and security.

  • How can users enhance their operational security with Proton Mail?

    -Users can remove or change their recovery email address in Proton Mail settings, use a burner email address, or turn off the allow recovery by email option. They can also use a VPN or TOR to hide their IP address when logging on.

  • What is the speaker's advice on sharing sensitive information within end-to-end encrypted platforms?

    -The speaker advises caution, suggesting that the best way to keep information private is not to share it digitally in the first place. Users should be mindful of what they share, even within secure platforms.

Outlines

00:00

🔒 Privacy Concerns Over Proton and Signal

This paragraph discusses the recent allegations against Proton and Signal, two privacy-focused platforms. Media outlets and social media have claimed that these platforms are no longer secure. Proton was reportedly compelled to provide a recovery email address to Spanish police, while Signal is accused of being a front for the US government. The speaker emphasizes the importance of understanding the legal frameworks within which these companies operate and the limitations they face in protecting user data. The paragraph also highlights the role of end-to-end encryption and the fact that companies can only provide data they possess, which in the case of Proton and Signal, excludes encrypted data without the user's encryption keys. The speaker challenges the sensationalism in the media and encourages viewers to look beyond the headlines to understand the true nature of these incidents.

05:02

🛡️ Personal Security and the Importance of Operational Security

The second paragraph focuses on the concept of personal operational security (OPSEC) and the responsibility of users in maintaining their privacy. The speaker argues that privacy apps and services are only as strong as the users who use them, using the analogy of a lock on a door. They explain that users can take steps to enhance their security, such as changing or removing recovery email addresses in Proton Mail, using a VPN or TOR to hide their IP address, and being cautious about what they share even within encrypted platforms. The speaker also addresses the criticism against Signal's board of directors and the need for users to be aware of the potential biases in claims about encryption vulnerabilities. The paragraph concludes with a reminder that no matter what tools are used, it is the user's responsibility to build strong privacy habits and practice good OPSEC.

Mindmap

Keywords

💡Proton

Proton refers to Proton Technologies AG, a company known for its secure email service, ProtonMail, and other privacy-focused products. In the video, Proton is discussed in the context of a legal request by Spanish authorities to disclose a recovery email address, highlighting the challenges of balancing privacy and legal obligations. The script mentions that Proton complied with this request, which is a key point in the discussion about the limitations of privacy services.

💡Signal

Signal is a widely recognized encrypted messaging app that prioritizes user privacy and security. The video discusses allegations that Signal is not as secure as believed, with claims that it has been used in US courts against individuals. This is part of a broader conversation about the trustworthiness of privacy tools and the potential for government surveillance.

💡End-to-End Encryption

End-to-end encryption is a security protocol that ensures only the sender and intended recipient can read the contents of a message. It is a crucial aspect of privacy-focused communication tools like Signal and ProtonMail. The script mentions that even if companies are compelled to hand over data, the encrypted nature of the data means it is useless without the encryption keys, which only the user holds.

💡Recovery Email Address

A recovery email address is used to reset or recover access to an account. In the script, it is mentioned that Proton was compelled to disclose a recovery email address to Spanish authorities. This highlights the potential privacy risks associated with recovery mechanisms, as they can be a point of vulnerability in the system.

💡Legal Frameworks

Legal frameworks refer to the set of laws and regulations that govern a country or region. The video discusses how companies like Proton and Signal must operate within these frameworks, even when it conflicts with their privacy policies. This is illustrated by the example of Proton complying with a legal request from Swiss authorities.

💡Confirmation Bias

Confirmation bias is the tendency to interpret new evidence as confirmation of one's existing beliefs or theories. The script suggests that people may be quick to believe negative stories about privacy companies due to their pre-existing skepticism about government surveillance and big tech companies.

💡Operational Security (OPSEC)

Operational security, or OPSEC, refers to measures taken to protect critical information from being gathered by adversaries. The video emphasizes that the strength of privacy tools depends on how users implement and manage them, highlighting the importance of personal OPSEC in maintaining privacy.

💡VPN

A Virtual Private Network (VPN) is a service that allows users to connect to the internet through an encrypted tunnel, hiding their IP address and making their online activity more private. The script suggests using a VPN to protect one's IP address when using privacy tools like ProtonMail.

💡TOR

The Onion Router (TOR) is a network designed to enhance privacy and security on the internet by routing internet traffic through a series of volunteer-operated servers. The script mentions TOR as an alternative to a VPN for hiding one's IP address, further emphasizing the importance of taking personal responsibility for privacy.

💡Recovery Phrase

A recovery phrase is a set of words used to restore access to an encrypted account or device. The video script advises users to enable data recovery via a recovery phrase and to store it safely, illustrating the importance of having a secure method to recover access to encrypted data.

💡FUD

FUD stands for Fear, Uncertainty, and Doubt, and is a term used to describe the spread of negative information to influence public opinion. The script suggests that sensational news about privacy tools can create FUD, leading people to distrust these tools without fully understanding the situation.

Highlights

Proton and Signal are no longer considered secure platforms due to recent events and media claims.

Proton Privacy complied with a request to hand over a recovery email address to Spanish police.

Media often overlooks the legal frameworks within which companies operate when reporting on privacy breaches.

End-to-end encrypted data can be handed over, but without encryption keys, it is useless.

Email sender and recipient information cannot be encrypted for delivery purposes.

Recovery email addresses on online accounts are not private and can be compelled to be handed over.

Proton handed over a recovery email address under compulsion from Swiss authorities, not user data.

Signal's encryption has been questioned by the founder of a competing app, Telegram, without substantial evidence.

The burden of proof lies with those who claim encryption has been broken, not the users.

Signal's board chairman has a history that could raise concerns, but the app remains open source.

Privacy apps and services are only as strong as the user who uses them.

Users can change or remove their recovery email address in Proton Mail settings.

Using a VPN or TOR can help hide your IP address when logging on to privacy services.

Operational security is crucial and involves more than just using privacy apps.

Users should be cautious about what they share, even within end-to-end encrypted platforms.

Operational security is as important as the tools used for privacy protection.

Transcripts

play00:00

Proton and Signal are no longer secure  platforms…or at least that’s been the  

play00:04

message shared by multiple media outlets and  social media accounts. Proton Privacy complied  

play00:09

with a request to hand over a recovery  email address to Spanish police and a new  

play00:14

hit piece is making the rounds claiming that  Signal is just a front for the US government.

play00:19

What are we supposed to do with this kind  of information? I want to explain what’s  

play00:24

really happening here, but more importantly, this  highlights one critical part of personal security  

play00:28

and privacy that we need to address and that often  gets ignored for the sake of sensational news.

play00:36

Most of us are already skeptical of government  surveillance and big tech companies. So when  

play00:41

we read that a privacy company just handed over  user data or is in bed with government agencies,  

play00:46

there’s a confirmation bias that I think  tends to happen. Instead of asking questions  

play00:51

and figuring out what’s really going on, some  people just throw up their hands and say “See,  

play00:55

I knew it. There simply is no such thing as  privacy and security anymore. We’re screwed.”

play01:01

I’ve seen this happen multiple times over the  years, and the story is usually the same thing  

play01:06

whether you’re watching this right now in  May of 2024 or whether it’s years later.  

play01:11

So let’s look at these cases specifically  - and please do me a favor and watch to  

play01:16

the end, because I also want to explain  exactly how this affects YOU directly.

play01:20

Let’s start with the case of Proton. Spanish law  enforcement made a request to Swiss authorities  

play01:24

to identify somebody they claimed to be a  terrorist. Now whether or not a government  

play01:30

abuses this authority to label somebody as a  terrorist doesn’t matter here. Companies like  

play01:35

Proton do have a legal remedy to fight  these requests, and sometimes they do.  

play01:41

Sometimes they don’t. But at the end of  the day, every single company is required  

play01:45

to operate within the legal frameworks  of the country in which they are based.

play01:50

If you’re a US company and the US government makes  a legal, court approved request for you to hand  

play01:55

over data, you have to do it, whether you agree  with it or not. The same goes for Switzerland and  

play02:00

every other country in the world. Just because a  company says they protect your privacy does not  

play02:05

mean they can just go and ignore these requests.  That’s really important to understand and one of  

play02:10

things that media outlets seem to overlook  each time they cover these news events.

play02:15

But what’s also important to know is that  companies can only give over the data that  

play02:19

they actually have. All of the data that’s  end-to-end encrypted can be handed over, but  

play02:24

it’s of no use without the encryption keys that,  in the case of Proton and Signal, only you hold.

play02:31

And when it comes to email, you also  have to realize that in order for  

play02:34

an email to be sent - like any mail -  it needs to have sender and recipient  

play02:39

information. That can’t be encrypted or  else the it could never be delivered.

play02:45

The same goes for a recovery email address on any  online account you create. If that were encrypted,  

play02:50

the company wouldn’t be able to see the email  address in order to help you recover the account.

play02:54

In other words, in order to function,  certain information can’t be hidden.

play03:00

“Oh, but you’re just trying to  defend a company that you like  

play03:02

and that has sponsored your channel in the past!”

play03:05

No, I’m not. I’m trying to be realistic  here. In this Spanish terrorist case,  

play03:10

Proton didn’t hand over the name of the user  or any of his email. They couldn’t because  

play03:16

they didn’t have that information to give. They  were compelled by Swiss authorities to hand over  

play03:21

the recovery email address, which they did. In  this case, it was an Apple email address and  

play03:26

it was Apple who then handed over the name of the  person associated with the recovery email address.

play03:31

At worst, you could maybe accuse Proton  of not doing a good enough job letting  

play03:36

users know that this recovery address isn’t  private. But we’ll get to that in a moment.

play03:41

Switching gears to Signal, we’ve got an  entirely different situation happening  

play03:45

but one that I’ve seen countless times as well.  The founder of Telegram, a competitor of Signal,  

play03:50

shared a message questioning Signal’s encryption.  I wonder what his motivation is? Well in this  

play03:56

message he states that “an alarming number  of important people I’ve spoken to remarked  

play04:00

that their private signal messages had been  exploited against them in US courts or media.”

play04:07

Notice that there’s no  source to back up this claim,  

play04:09

and the numerous people who reshared  this conveniently ignored the fact  

play04:12

that these are competitors. In other  words, there’s undeniable bias here.

play04:17

Here’s the thing: anybody can claim that  encryption can be or has been broken. But  

play04:22

the burden of proof is not on you, it’s  on the one who makes the claim. So if the  

play04:27

Telegram CEO is going to claim that their  competitor Signal has had their encryption  

play04:31

broken - and I don’t know, that could  be true - but you’re going to have to  

play04:34

provide more than hearsay evidence in  order for me to take you seriously.

play04:38

The other part of the complaint against  Signal has to do with their board of  

play04:42

directors. Apparently the current  chairman has a history of promoting  

play04:46

censorship and has concerning connections  with the intelligence community. And I get  

play04:50

it - that’s a bad look for Signal and  one that should probably be addressed.

play04:55

But Signal, like Proton, is open source,  which means that over the past 10 plus years,  

play05:01

security researches have had access to the code  base of these apps. Leadership certainly matters,  

play05:08

but the code is the code. The board  chair’s opinion doesn’t change that.

play05:12

Ok, here’s the primary message I want you to  take away from all of this. It’s not that you  

play05:16

should ignore FUD, it’s not that you should  blindly trust me to use Proton and Signal.

play05:22

The primary message is this:  

play05:25

privacy apps and services are only  as strong as the user who uses them.

play05:31

You can purchase and install the strongest  lock on the front door of your house,  

play05:35

but if you leave the window unlocked,  that’s not the door’s fault, it’s yours.

play05:40

This is something called personal  OPSEC, or operational security. This  

play05:45

is everything that you do that includes  the usage of apps like Proton and Signal.

play05:49

So, for example, did you know that you can  remove or change the recovery email address  

play05:54

in Proton Mail? In the settings of your  Proton account, click on “Recovery” and  

play05:58

then right here under Account Recovery you  can either turn off the allow recovery by  

play06:03

email option or you can change it to a burner  email address that you’ve created. Mind you,  

play06:09

if you turn it off, you won’t be able to  recover your account if you lose your password,  

play06:13

but that’s on you. That’s part  of your operational security.

play06:17

At the very least, you should turn on data  

play06:19

recovery via a recovery phrase and  keep that stored somewhere safe.

play06:23

And if you don’t want Proton to have  access to, let’s say, your IP address,  

play06:27

which is the identifier assigned  to your device on the internet,  

play06:31

simply use a VPN or TOR when you’re  logging on, which hides your IP address.

play06:36

Honestly, most of this only applies to those  who have reason to be highly concerned about  

play06:41

their privacy or security, but even if you’re  just the average internet user, you can’t  

play06:45

rely solely on software to protect you. It’s your  responsibility to build strong privacy habits.

play06:51

And one final thought: be careful what you  share, even within the walls of end-to-end  

play06:56

encryption. Sometimes we get lulled into  this false sense of security and that’s  

play07:01

when the mistakes happen. If you don’t  want compromising pictures of you shared  

play07:05

online, then here’s a wild idea for you -  don’t take compromising pictures and send  

play07:11

them to your boyfriend! I know it’s not always  as black and white as that, but sometimes the  

play07:15

best and easiest way to hide information is  to not share it digitally in the first place.

play07:20

Should you stop using Proton and  Signal? That’s up to you. This kind  

play07:25

of news doesn’t change the fact that  I still use and recommend them, but  

play07:29

no matter what software or app you end up using,  you need to recognize that your operational  

play07:35

security - how you use these apps, how you store  your personal information, how you share data,  

play07:40

etc. - is just as important, if not more  important, than the tools you use to do it.

play07:47

Thanks for watching, and if you want to see the  

play07:48

privacy and security tools I use  every day, watch this video next.

Rate This

5.0 / 5 (0 votes)

Related Tags
Privacy ConcernsProton MailSignal AppEncryption DebateLegal FrameworksOperational SecurityEnd-to-End EncryptionData RecoveryUser ResponsibilityDigital Security