From 2019, but still [this fullstop signals not only the end of that sentence, but also the end of this statement]. And here [those two words indicate that new information/context is being added; it is being indicated that we now no longer talk about the article, which the uneditorialized post title references and the post link leads to] something a bit more recent about the glorious “swiss privacy” [this makes it further clear that the following is about swiss privacy in general and not about Proton] https://www.republik.ch/2024/01/09/der-bund-ueberwacht-uns-alle

key points

[they were added because the main article is about Proton and written in english and because OP assumed that most in here are unable to read german and care less about general swiss privacy than they do care about Proton]

  • New reporting based on documents and court records shows that since 2017, the internet traffic of Swiss citizens has been massively monitored and read when it crosses borders, which happens routinely even for communication within Switzerland.

  • The intelligence service’s claims that purely domestic Swiss internet traffic is collected are false, given how internet routing actually works. Traffic flows across borders dynamically, not through static “cables” as claimed.

  • All data is stored and searched, including retrospectively, meaning the intelligence service builds an ever growing haystack of private communication to dig through. This includes communication from journalists and lawyers that should be protected.

  • In 2023, steps were taken to expand monitoring further by requiring more Swiss internet providers to enable access to their infrastructure, including providers that don’t directly deal with cross-border traffic. This contradicts previous claims about how the monitoring would work.

  • Critics argue this invalidates assurances given earlier by the government and intelligence officials and constitutes mass surveillance that violates civil liberties. There are plans in 2024 to revise the intelligence law again, possibly to retroactively legalize monitoring practices already occurring.

  • summerof69@lemm.ee
    link
    fedilink
    English
    arrow-up
    24
    ·
    10 months ago

    How PM voluntarily offers any assistance? Key points don’t mention PM at all.

    • birdcat@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      6
      ·
      10 months ago

      read the article, the keypoints have nothing to do with proton or the posted article. i just tried to add more context and illustrste that “swiss privacy” is an empty marketing phrase, like “military grade security” etc.

      • LWD@lemm.ee
        link
        fedilink
        English
        arrow-up
        22
        ·
        10 months ago

        If your key points aren’t about Proton, why is it in the title?.

        • birdcat@lemmy.mlOP
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 months ago

          😒 if people comment, why do they not read the post or the linked article?

          • LWD@lemm.ee
            link
            fedilink
            English
            arrow-up
            16
            ·
            edit-2
            10 months ago

            If the title and the key points don’t match each other, why would I then go and read an archive of a translation of the 5-year-old article they are supposed to represent

            And if they don’t represent the article, why would you bother writing them without making that abundantly clear

            • birdcat@lemmy.mlOP
              link
              fedilink
              English
              arrow-up
              1
              ·
              edit-2
              10 months ago

              Thanks for your feedback, I tried to clarify it a bit, the post title, however, cannot be changed because of rule 7.

    • birdcat@lemmy.mlOP
      link
      fedilink
      English
      arrow-up
      7
      ·
      10 months ago

      my inability to answer that question makes me consider to apply for a job in the swiss secret service.

    • Lojcs@lemm.ee
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      Isn’t tls just strong enough that by the time it takes to crack a packet its contents will be irrelevant? If they’re keeping past records they could focus on key connections and hope to stumble on something important

      I might be thinking of something else

  • marcoedelman@lemmy.ml
    link
    fedilink
    English
    arrow-up
    14
    ·
    10 months ago

    Jezus Christ, what a misleading post. This only has to do with Proton in the sense of:

    “Company doesn’t move country after information becomes public that state intelligence is as scummy as that of neighboring countries.”

    This does not imply Proton to be involved or offer assistance. This does not mean it invalidates Proton’s use of Swiss privacy as a selling point. It’s better than what you get in many countries. Sad? Sure, but that’s where we are, currently.

    Privacy on the internet can hardly ever be guaranteed, there’s just best case scenarios on an individual level. Be critical of the companies you trust with your data, obfuscate what you can, use secure connections and encryption where possible, be smart with what you share and pray you never become a target for state intelligence. That’s the most attainable level of privacy for most of us.

    These types of defamatory posts seem like personal attacks born from personal disillusionment and a flawed understanding of either the tech, the laws governing it or the political context around it.

    Lastly, if you feel passionate enough to be an activist, attack the system, not the cogs.

  • jherazob@fedia.io
    link
    fedilink
    arrow-up
    9
    ·
    10 months ago

    As a paying customer, i wanna hear from the other side, plus wanna see if this ping works across ActivityPub services, pinging @protonmail@mastodon.social

  • MonkderZweite@feddit.ch
    link
    fedilink
    English
    arrow-up
    5
    ·
    edit-2
    10 months ago

    Not to invalidate your argument (it’s still pending in EuGH) but germans BND scandal was about wayy to extensive selectors for NSA on europe’s main internet node RIPE. They just made it legal afterwards. My point is, be it swiss or german + US government…

  • Hellfire103@lemmy.ca
    link
    fedilink
    English
    arrow-up
    2
    ·
    10 months ago

    So, I’ve been in touch with some privacy advocates who I know do their research and that I trust the opinions of, and this article is bullshit.

  • Hellfire103@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    edit-2
    10 months ago

    I have a question for eople who know what they’re talking about: should I switch back to Tuta? Or Disroot? Or join a tilde/pubnix?

    I’m not a criminal, if it matters.

    EDIT: Proton is still fine to use. This article is absolute bullshit.

    • Cinner@lemmy.worldB
      link
      fedilink
      English
      arrow-up
      1
      ·
      10 months ago

      Can someone answer this from the “I am a criminal, if it matters” side as well?

      Let’s not be biased now.

      • Hellfire103@lemmy.ca
        link
        fedilink
        English
        arrow-up
        2
        ·
        10 months ago

        If you are a criminal (or are being treated like a criminal by a hostile government), use I2P Mail. It is self-hosted over I2P (Invisible Internet Project), which can make you more anonymous than even Tor (provided you don’t leak personal information by other means).

        https://en.m.wikipedia.org/wiki/I2P

        • Cinner@lemmy.worldB
          link
          fedilink
          English
          arrow-up
          1
          ·
          10 months ago

          Thanks I forgot I2P had email and all the extra stuff. Do they have inproxies and outproxies or do both sender and receiver have to use the i2p service?

          • Hellfire103@lemmy.ca
            link
            fedilink
            English
            arrow-up
            2
            ·
            10 months ago

            You know, I never found out. I never used the email service. In fact, the only thing I really used I2P for was accessing one of the Invidious instances hosted over there.

            However, I follow a channel on PeerTube which did a few videos on I2P.