They’ve given IPs to governments before and have logs at least for email
Only about Protonmail which is not ProtonVPN at all. They are complete seperate departments and services
No I don’t believe so. I have never heard of anything like that about Proton. Also, if it’s true I would think they only do this when it comes to CSAM cases or similar.
Some of the most notorious hackers has hacked big banks and companies and they communicated the ransom through proton. They never got caught, even though a vast amount of money was on stake
Not only that – the two types of services are covered by different laws in Switzerland. VPN providers would not have been required to hand over IP addresses in that case, but email providers were.
It was only for Protonmail and not about ProtonVPN. They also stated that they are not the same
It was a climate terrorist
Now I feel even more safe
First google article with link to screenshot of french police report
Thank you. I will look into it.
To me it’s more frightening that they have the capability rather than it realistically happening to the average person. Tutanota is a similar case where they’ve given an IP once but are generally good to use
I thought that Proton said that they don’t log IP’s etc. maybe that’s only for their VPN? But I agree with you.
My threat model doesn’t imply hiding from governments but if things get logged, things get breached, which is my concern
Well apparently they have the capability to log. Don’t think there’s been another incident since 2021. Do with that what you will
All providers of clearnet services have the ability to log. To mitigate, ProtonMail works well with Tor, and even provides an onion address.