this post was submitted on 22 Dec 2025
303 points (92.4% liked)
Privacy
3213 readers
51 users here now
Icon base by Lorc under CC BY 3.0 with modifications to add a gradient
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'm also interested in that, but
This is likely wrong, any password would allow you to produce a valid key from an encrypted key, it will not be a correct key, so you will fail during decryption, but it will take a lot of time to check and may not be easy to automate.
Regarding the auth, they may provide you with a challenge that is encrypted with your public key, and if you have decrypted it correctly, authenticate you, but I don't know how it's done or should be done.
If you have any way to check the key validity offline (for example, you subpoena the encrypted data) then it's trivial to check and automate.
Of course not everybody is capable of this, but it's becoming less and less difficult to brute force it, and renting a few hours of GPU time to do it is within the means of small bad actors.
Trivial to automate, yes. The rest is a question of how long it takes to compute, that’s the basic rules of cryptography:
Lack of physical access to your files protects you against casual inquiries by businesses and local governments. If you’re a person of interest, they are breaking down your door and getting your bits unless they self destruct or are in a country they can’t bully.
In summary:
Still, the idea is that Proton has everything they need to access your data (your encrypted bits, your encrypted key, and your password you send them every time you login). You have no guarantee that they don't have something (intentionally or not) that can catch this and extract data about you.
You also (and more importantly) have no guarantee that the Swiss government can't or won't force them to implement such systems, and hand over your data.
They already lied about not storing your IP until a judge ordered Proton to produce it for a French national. They have since redacted their privacy policy to say they may store such data about you if requested. They can do the same to get your key.
No matter how, if they possess the keys, it's ~~not your crypto~~ not secure.