• Joe
    link
    fedilink
    arrow-up
    1
    arrow-down
    1
    ·
    2 months ago

    IF TLS is used AND configured optimally on both ends, THEN the in transit message contents should be very secure, in that transient session keys were used.

    I would be interested to know how often those two preconditions hold true though.

    Of course, this is only one small link in the chain. There aint no magic bullet.

    • Saik0@lemmy.saik0.com
      link
      fedilink
      English
      arrow-up
      1
      arrow-down
      1
      ·
      2 months ago

      Proton would have the key. A government that is already compelling them to hand over your account can simply be compelled to provide the TLS keys. The point is that government doesn’t have to compel proton for at rest storage, but can compel for in transit interception.

      • Joe
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        edit-2
        2 months ago

        Read up on perfect forward secrecy and TLS.

        And yes, a jurisdiction could compel them to break their security, depending on laws and ability to threaten.

          • Joe
            link
            fedilink
            arrow-up
            1
            arrow-down
            1
            ·
            2 months ago

            PFS matters where a party hasn’t already been compromised. Not so hard.

            • Saik0@lemmy.saik0.com
              link
              fedilink
              English
              arrow-up
              1
              arrow-down
              1
              ·
              edit-2
              2 months ago

              This whole discussion is about a government forcing Proton mail to take actions. Telling me to “read up on pfs” is irrelevant by your own admission. ProtonMail can be compelled to give up their keys, or to hand them over for all current/future transactions.

              So once again…

              “read up on pfs”
              “Pfs doesn’t matter”
              Literally this post.

              You cannot rely on MTAs to transmit ANYTHING securely in the context of this discussion. Period. There is no E2E when there’s an MTA involved unless you’re doing GPG/PGP or S/MIME. Nobody does this though… Like literally nobody. I’ve got both setup and have NEVER had an encrypted email go through because nobody else does it. It doesn’t matter what Proton claims to support.

              That’s it. Telling anyone to read up on anything when they’re 100% correct is asinine.

              Email in transit is not encrypted. At least not encrypted by anything that the government can’t compel the company to hand over.

              Edit:

              Email in transit is not encrypted. At least not encrypted by anything that the government can’t compel the company to hand over.

              This is what I originally said. It was clear. I don’t know why you’re arguing otherwise.