![]() Having all your correspondence stored and readable on a server that isn't under your control means you have to trust the security of the server much more than you would with this type of encryption. I'd speculate that targeted attacks are more often client-side, usually trying to steal credentials from the user, but at least the user can be careful about these. These are more feasible for smaller-scale attackers, and in getting an entire, potentially complete history of your emails, potentially offer something more than just spying on one email. If you're worried about a data breach or targeted attack compromising your stored email in its entirety, however, it does. ![]() If your concern is a major state-level actor, able to spy on every recipient/sender you're communicating with and generally tap emails being transmitted, yes, Proton offers little protection, and email is insecure. While it does do relatively convenient PGP encryption to other ProtonMail users (and annoyingly inconvenient PGP encryption to others, when I've tried), these are rather limited in scope, because of the limitations on recipients. Proton's major draw, in my view, is the storage being encrypted and not accessible unencrypted to the server, not the transmission and emails to others.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |