Proton has handed over 32,076 users' data to governments since 2017. Their own transparency report states a 94% compliance rate in 2024.

submitted by

https://infosec.pub/api/v3/image_proxy?url=https%3A%2F%2Fwww.sambent.com%2Fcontent%2Fimages%2F2025%2F12%2F22.png

Proton has handed over 32,076 users' data to governments since 2017. Their own transparency report states a 94% compliance rate in 2024.
83
295

Back to main discussion

Parent comment

How do they authenticate* you?

I’m also interested in that, but

I can request any account encrypted key and try to brute force it offline

This is likely wrong, any password would allow you to produce a valid key from an encrypted key, it will not be a correct key, so you will fail during decryption, but it will take a lot of time to check and may not be easy to automate.

Regarding the auth, they may provide you with a challenge that is encrypted with your public key, and if you have decrypted it correctly, authenticate you, but I don’t know how it’s done or should be done.

it will not be a correct key, so you will fail during decryption, but it will take a lot of time to check and may not be easy to automate.

If you have any way to check the key validity offline (for example, you subpoena the encrypted data) then it’s trivial to check and automate.
Of course not everybody is capable of this, but it’s becoming less and less difficult to brute force it, and renting a few hours of GPU time to do it is within the means of small bad actors.

If you have any way to check the key validity offline (for example, you subpoena the encrypted data) then it’s trivial to check and automate.

Trivial to automate, yes. The rest is a question of how long it takes to compute, that’s the basic rules of cryptography:

  • good algorithms are computationally more expensive to solve in one direction than the other
  • the hardware of tomorrow will more easily solve the cryptography of today, making it important to rotate your bits into new algorithms as old ones become more solvable
  • big business and big government have more power to throw at the problem, but not infinitely so; where will you fall on their wait list?

Lack of physical access to your files protects you against casual inquiries by businesses and local governments. If you’re a person of interest, they are breaking down your door and getting your bits unless they self destruct or are in a country they can’t bully.

In summary:
- Don’t be a person of interest if you can avoid it.
- If you live somewhere that hurting a politician’s feelings (or having the wrong demographic) will make you a person of interest, assume they will get physical access to your bits unless those bits are in an unfriendly country. What country do you want them in?
- Assume they will get their hands on your bits anyway. How easy are they to decrypt, and will the juice be worth the squeeze?

Still, the idea is that Proton has everything they need to access your data (your encrypted bits, your encrypted key, and your password you send them every time you login). You have no guarantee that they don’t have something (intentionally or not) that can catch this and extract data about you.
You also (and more importantly) have no guarantee that the Swiss government can’t or won’t force them to implement such systems, and hand over your data.
They already lied about not storing your IP until a judge ordered Proton to produce it for a French national. They have since redacted their privacy policy to say they may store such data about you if requested. They can do the same to get your key.

No matter how, if they possess the keys, it’s not your crypto not secure.

Renting a few hours of GPU may not cut it, depending on how long the key is, but you’re right, getting some data offline would help in breaking the encryption

It may not cut it now, but we can’t guarantee it will stay the same within a few years (either faster compute, or other techniques that speed up the brute force)

Insert image