Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Anyone know a good alternative to ProtonMail with no ties to the Israeli Military? Preferably European.


I'd be interested in your rebuttal of this:

https://protonmail.com/support/knowledge-base/protonmail-isr...


Thanks for that! I really didn't know they had a response to these claims. However it's not hard to see this can just be a PR shield anyway.


For this not to be a PR shield (i.e. for Israel to really be able to read protonmail) the link would have to be an outright lie, or protonmail would have to have shared key data.

Heck, even if somehow radware (the BGP-based DDoS proxy they use) had access to protonmails private key or had minted their own SSL cert for protonmail, you'd still be protected by PGP.

For outgoing mail, they don't use radware so even if you were to send plaintext emails to a mailserver that doesn't support SSL encryption, radware still wouldn't be able to read that.

Unless the linked statement is just a lie, their DDoS protection service is not able to MitM them. Your proposed scheme seems a lot more convoluted than protonmail just giving access to the Israeli government. Similarly, it seems a lot more conspicuous.

If you don't want to use them because it indirectly supports an Israeli company, that makes sense, but their DDoS prevention scheme as outlined does not harm privacy in any way.


> you'd still be protected by PGP.

You wouldn't, PGP is verified by code that can be MITM'd if the traffic is spoofed.


Ah yes, you are right. That darn server-provided client-side code without any decent means of verification really wrecks a lot of security guarantees.


Where did you read I proposed any scheme at all, dude? Saying something looks like a PR shield is a problem now?


Is something still a PR shield against accusations if it is correct? I'd argue an actual rebuttal to the accusations is more than a PR shield. As described in my response, I consider the article to be a rebuttal of the accusations presuming they are not lying. Thus I conclude that it is not a PR shield. Notably, I'd say that outright lying about facts isn't a PR shield.


Then they can't win.

An accusation has been made, they've refuted the claims with a response, response is dismissed as a PR shield.

What are they going to do?


They could stop doing business with a company that has strong links to IDF.


That would be any Israeli tech company.

Or any Chinese company (ties to PLA). Quickly becoming more true in the US as well.


Nothing at all wrong with the IDF or Israel. I happily support my Jewish brothers and sisters buy buying Israeli-made goods.


Arrange a 3rd party (from a different country) audit?


You might as well not use the Internet at all.


Mailfence.

I'd be very interested to hear the problems with protonmail, considering all they claim to see is email metadata.

Edit: ok some quick googling says its related to ddos protection, which is still in effect currently, the malicious intent here seems overstated.

The official statement - https://protonmail.com/support/knowledge-base/protonmail-isr...


+1 for Tutanota. The new client is simply amazing - https://mail.tutanota.com/ - it convinced me to go Premium which is way cheaper than PM.


* https://posteo.de/en

* https://mailbox.org

posteo implements multiple encryption schemes: encrypt incoming mails with GPG (making them inaccessible by any end device not having the corresponding secret key). Or encrypt via the login passphrase with transparent decryption on authorized access.


It is great data hygiene to use encryption at rest. However, it gives no security guarantees. You still need to trust posteo.

If posteo wants, they can read all incoming email. Their security scheme depends solely on their good intentions. Still great that their data at rest is encrypted in a way even they cannot read.

The scheme does defend against third parties outside of posteo being able to access data, or coerce posteo to decrypt data. Posteo could probably still be coerced to push out a fraudulent client update that still breaks their encrpytion, but that is a very hard problem to deal with.


> Posteo could probably still be coerced to push out a fraudulent client update that still breaks their encrpytion, but that is a very hard problem to deal with.

They are based in Germany and would need to be coerced in accordance to german law. I don't think that there is something like National Security Letters in Germany, so doing such a thing without (eventual?) public disclosure seems unlikely.

Also posteo regularly releases as much information as they are allowed to regarding their interaction with law enforcement, e.g.:

https://posteo.de/en/site/transparency_report


There are other methods of coercion than courts, but I agree that the German courts are probably much safer than the American courts.

In any case, the fraudulent client update is a very hard hole to patch. The only solution for this I know of is local hosting. At the moment, defending against this in web-apps is simply not possible.


There's one way I know to stop that.

Ipfs. Its immutable, for a given key. And its easy to see what an IPNS link points to.

It may not be a way to verify, but others could do that hard work.

But it strictly shows proof that codebase for a web app hasn't changed.


The only real antidote against unauthorized access is using end-to-end encryption between email's sender and recipient(s), via PGP/GPG or S/MIME. Unfortunately this requires the sender's cooperation. As long as the sender does not cooperate, there will always be some leg of the communication path that is vulnerable.


Indeed. But that problem has been to "Show clients how to install the relevant plugins, make their certs, and then appropriately use certs." That's been error-prone since the beginning with PGPMail and PGPphone.

That's why this was switched to doing it in a webapp, to streamline the process and remove user error out of the equation. There's one problem, and that the owner of the script can change it to a bad one that does X.

With an immutable data structure, like what IPFS uses, can provide that chain of custody with a script they make that simplifies PGP usage, while still maintaining "We didn't change anything" - and you can prove that.


German intelligence services in the past just listened to all traffic at internet exchange points. No need for national security letters.


And not only German intelligence services. This is why most websites nowadays protect against pervasive monitoring by using TLS and ephemeral keys (including Posteo). Also the mail transport layer of most mail servers uses TLS-encrypted SMTP which is safe against pervasive monitoring (but may be affected by MITM attacks).

Some mail servers are set up or can be configured to not trannsmit or receive mails unless TLS protocol can be negotiated (I think mailbox.org allows users to enforce SMTP via TLS by using the domain secure.mailbox.org, not sure about Posteo).

(See also https://tools.ietf.org/html/rfc7258

https://support-en.mailbox.org/knowledge-base/article/before...)

[edit] replaced SSL with TLS


Not sure about Posteo but at least Mailbox.org allows you provide public key and all the email coming in will be encrypted with your public GPG/PGP key.

So you can only read them in your mail client with GPG support.

Yes, mailbox could create copy of your email before encryption. But assuming that they don't/didn't so far, in case they change their mind the historical emails will not be accessible.

The other solution where they keep private key (pass protected), well sure, that pretty much open for abuse but at some level you have to start trusting the law, otherwise everything false apart.


So does Mailbox.org but unlike posteo Mailbox allows using own domain.

The only issue is "German" quality customer support. So be patient and expect to receive terse "no." ;)


Another vote for Posteo.


Not exactly an anonymous service as ProtonMail, but a business-oriented secure mail - https://dekko.io. Has a free tier, too.


ProtonMail does not have "ties with the Israeli military". Where are you reading this stuff?


I've been very happy with migadu.com although I've only recently moved to it. But they make a pledge to privacy in a similar fashion to ProtonMail. I like their pricing and simplicity, they're worth a look.


Can you elaborate on ProtonMail's "ties to the Israeli Military"?



Not sure what you are talking about. What does a Swiss email service has to do with Israeli military? I like conteos as much as the other guy but these allegations are a bit far fetched say the least.



posteo.de is very privacy friendly too


How is protonmail tied to the Israeli Military?



Are you wanted by the Israeli military? And, do you actually have any evidence of "ties" beyond ridiculous conspiracy theories? Radware isn't the "Israeli Military" -- and even if they were, I'd trust them more than I'd trust, say France [1] or any EU country for that matter -- even Germany. [2]

[1] https://www.hrw.org/news/2013/12/26/french-contradictions-da... [2] https://www.opendemocracy.net/digitaliberties/sara-bundtzen/...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: