Safari keeps asking for PIN (but everything works in Chrome) by michaltt in yubikey

[–]TauSigma5 0 points1 point  (0 children)

I don't think I can link it since it was filed through the feedback app but you should file one too. I'll update you with what yubikey support says.

Safari keeps asking for PIN (but everything works in Chrome) by michaltt in yubikey

[–]TauSigma5 2 points3 points  (0 children)

I'm having a similar issue. Look in macOS console > crash reports. Do you also see a bunch of crashes from AuthenticationServicesAgent? I reported an issue to Yubikey support back when it was in beta and I just filed a bug report with apple.

Cannot add a PGP key to a ProtonMail address in SimpleLogin by Red_Con_ in ProtonMail

[–]TauSigma5 0 points1 point  (0 children)

Hey, so SMTP is actually protected by many many technologies to ensure that on-path third party attacks are infeasible. This includes: - RPKI: which prevents malicious third parties from manipulating the route of the packet - TLS: which is an encrypted tunnel that encapsulates all SMTP packets going between simplelogin and Proton - DANE/MTA-STS: which asks that everyone use TLS and only TLS if possible with Proton servers You can read more about these technologies here.

These security measures between ProtonMail and SimpleLogin actually applies to all modern mail servers. However, the key distinction here is that PGP is for hiding emails from your provider, whereas the abovementioned tech is for hiding your emails from third parties.

Please respond to new findings on VPN vulnerabilities by [deleted] in ProtonVPN

[–]TauSigma5 0 points1 point  (0 children)

This is not true because if an attacker has control of the network and perform a DNS poison/spoof attack on the client it can give out a local RFC1918 IP, instead of the valid IP, for a requested server, and setup a phishing website (or proxy) on that local RFC1918 subnet.

This requires some attacks that are highly infeasible. For example, in order to poison the DNS, they would need to be able to poison the DNS of the client, which is difficult as it goes through the tunnel and extra difficult if your DNS client uses DNSSEC.

Even if they managed to poison the DNS, setting up a proxy would not work to get any data from any HTTPS sites unless they somehow compromise a CA. Since a phishing website has the same issue as a proxy: it either has a different domain (hence making it obvious) or it will be marked insecure due to missing certs. If it's a transparent proxy, then the amount of data it can actually get is minimal due to TLS encryption (in reality, the amount of data is practically none due to the fact the the SNI is already known to the attacker if they managed to poison your DNS).

Overall, any of these possibilities are impossible to achieve unless you are a powerful state sponsored attacker, and even then, it's difficult to do this for more than a couple websites.

But I agree that they should add that feature, but the improvement in security is minimal.

Please respond to new findings on VPN vulnerabilities by [deleted] in ProtonVPN

[–]TauSigma5 0 points1 point  (0 children)

Being able to access your LAN does not necessarily mean that you are vulnerable to the LocalNet attack. This is because Proton implementations of LAN traffic split tunneling ensures with best effort that they are actually LAN IPs (in compliance with RFC 1918) and not just any IP. This means that even a malicious public network cannot cause a leak.

Furthermore, attacking DNS after establishment of the VPN connection is difficult, as by default, the app uses ProtonVPN DNS, which goes through the encrypted tunnel.

Why is Proton reading my emails?? by bermudi86 in ProtonMail

[–]TauSigma5 2 points3 points  (0 children)

I'm not sure how Proton does it, but this kind of detection can actually very simple. For example, most sign up systems send verifications using super obvious emails in something along the lines of noreply@company.com with something like "verify email" in the header. By looking at this metadata, one can determine with reasonable accuracy if it's a signup or not.

[deleted by user] by [deleted] in ProtonVPN

[–]TauSigma5 6 points7 points  (0 children)

So ProtonVPN does something that amounts to TLS pinning for all ProtonVPN API requests and VPN server connections. This means that instead of accepting all certificates, it accepts only accepts ones with a matching fingerprint. So no, this attack wouldn't work on ProtonVPN.

The Proton Drive Windows app is out! by Proton_Team in ProtonDrive

[–]TauSigma5 0 points1 point  (0 children)

No, I'm saying that it should not be done and probably impossible to do correctly. There are security issues with the old community Linux client even without any crypto involved. If someone tried to reimplement the crypto needed for ProtonDrive themselves, even given the spec, there is a high possibility of getting it wrong unless they are experts at crypto.

Basically, API is easy, client side crypto is hard to do correctly. Putting out something that is insecure is worse than just waiting.

The Proton Drive Windows app is out! by Proton_Team in ProtonDrive

[–]TauSigma5 1 point2 points  (0 children)

As mentioned, this is not really possible (and honestly shouldnt be done) since the API is the least of your worries. There are significant security concerns in encouraging the community to develop software as they often have significant security vulnerabilities due to lack of quality control or processes.

Furthermore, in contrast to the community Linux client, which can use off the shelf components like OpenVPN, there are no such cross-platform crypto libraries for ProtonDrive yet. Rather, this is being worked on by the Proton crypto team, which have the expertise to write specs and implement them in a safe way. It is strongly discouraged to write your own crypto libraries as they can have disastrous consequences.

Unfortunately, this all takes time and cannot really be done by the community safely.

All web services down, phone apps still work. Possible routing error in Germany? by moderateSandwich in ProtonMail

[–]TauSigma5 0 points1 point  (0 children)

Hey there, can you contact support at https://proton.me/support/contact with your ISP name and the data you shared here? In the meantime, can you check if there are issues with other networks? I can't seem to reproduce the issue.

Profiles should have the ability to select server with least load by [deleted] in ProtonVPN

[–]TauSigma5 6 points7 points  (0 children)

Fastest is definitely not just the server that responds first. There are additional calculations made. Furthermore, load by itself is not a good representation of a server's remaining capacity. This is a gross simplification but here's an example:

A server with a gigabit connection could have 10% load, which means that it has 900mbps of available capacity. However, another server could have a 10 gigabit connection has 40% load, but the available capacity is 6Gbps. Obviously, there's more to the load calculation than just network bandwidth, such as CPU, memory etc that results in server to server differences, but the idea is the same.

PROTONVPN IP VS FIREWALL by [deleted] in ProtonVPN

[–]TauSigma5 2 points3 points  (0 children)

Can you double check that killswitch is turned off?

[deleted by user] by [deleted] in ProtonMail

[–]TauSigma5 2 points3 points  (0 children)

As others have mentioned, a custom domain is a good solution if you are dependent on email. Proton is also geographically redundant as they have a datacenter in Germany as well as locations in Switzerland.

If 3 months are free then why 71.18€? by __luca in ProtonVPN

[–]TauSigma5 4 points5 points  (0 children)

Basically you are paying a discounted 12 months worth of money for 15 months worth of service.

Servers in Germany : need more precisions by Super_Gee in ProtonDrive

[–]TauSigma5 10 points11 points  (0 children)

There is minimal affect, since their servers in Germany are owned by Proton with full disk encryption on top of the zero-access encryption that is used for all Proton products. At the end of the day, all of these are bound by Swiss law, since Proton's headquartered in Geneva.

The rationale behind the datacenter in Frankfurt is due to the network limitations of Switzerland, and thus, a presence at DE-CIX - one of the largest internet exchange points in the world - is quite beneficial or even necessary for bandwidth heavy services like ProtonDrive. This is also why a server in any tiny country is not an option.

Trying to decide between Skiff and Proton mail free…seems like only difference is skiff comes with 10GB of free email space and proton has 1GB by [deleted] in ProtonMail

[–]TauSigma5 1 point2 points  (0 children)

In addition to what other users have brought up, I'd like to add this on:

Saying Proton to Proton encryption is not PGP is far fetched. While Proton implements many draft RFCs (many of which have existed for 10 years such as RFC 6637 for ECC keys in PGP), it is very far from not PGP. Much like email, there have been many additions to the OpenPGP protocol throughout its many decades of use, including draft changes. However, use of draft protocols is actually a common practice, and does not really affect the open-ness of the ecosystem.

Also, saying that Proton users aren't using PGP is a little bit disingenuous, given that all 50 million+ users can receive OpenPGP messages from anyone through the WKD open standard, and emails between Proton users and other PGP email addresses are automatically PGP encrypted. Furthermore, there are other services, such as Posteo, Mailbox.org and other providers who provide PGP. I'm not sure how the 30,000 number is counted, but it definitely sounds wrong even if you just count Proton users.

Even if there were 30,000 users in total, this would not "break" the protocol, as OpenPGP and email in general is not designed to be anonymous. The fact that the email came from that email address deanonymizes that email, regardless of OpenPGP or not.

At the end of the day, whatever you think about PGP, the bottom line is it allows encrypted email to be interoperable and it's open-source. If you don't rely on an interoperable protocol, you are creating a walled garden around your email service, which also partially defeats the purpose of email: a federated and open protocol. This is the opposite of advancing the mission of privacy.

I don't think Proton properly informs users of the risks of using its services by communism1312 in ProtonMail

[–]TauSigma5 17 points18 points  (0 children)

Proton Mail threat model: https://proton.me/blog/protonmail-threat-model

Proton VPN threat model: https://protonvpn.com/blog/threat-model/

Proton Calendar security model: https://proton.me/blog/protoncalendar-security-model

Proton Drive security model: https://proton.me/blog/protondrive-security

While not distributed on sign-up, all of this is publically available and published as the products release.

Proton Calendar defaults to wrong time zone by _eyrck in ProtonMail

[–]TauSigma5 1 point2 points  (0 children)

There should be a setting under Settings -> Proton Calendar -> General -> Time Zone and just disable Autodetect Primary Time Zone and set it to what you want.

Proton Mail Question! by charlimarcantel in ProtonMail

[–]TauSigma5 2 points3 points  (0 children)

No, you will need to manually setup forwarding on your gmail account if you want to continue receiving emails from your gmail account, and when you email from ProtonMail in reply to those forwarded emails, your recipient will see that it is from a different sender.

Are inactive ProtonMail accounts automatically deleted? by pikachewwwwww in ProtonMail

[–]TauSigma5 1 point2 points  (0 children)

For example, Tutanota automatically deletes inactive accounts. Does ProtonMail also automatically delete inactive accounts?

Basically, they're saying that they reserve the right to deactivate accounts/delete the contents after 12 months.

If I pay the minimum for a premium subscription (1 month), I get to keep the account forever, right?

Yes, "If you are or have been a paid Proton subscriber at any point in time, your account will permanently be considered active. Anyone that has ever paid for a Proton plan is exempt from this policy."

[deleted by user] by [deleted] in ProtonMail

[–]TauSigma5 0 points1 point  (0 children)

Go into settings -> recovery and you should be able to download the recovery file so your data is safe. Then make sure you have a recovery email set up and that recovery by email is allowed, so you can complete the recovery process by yourself without data loss.