Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

finlandia:~> apropos win win: nothing appropriate.


computers / alt.privacy.anon-server / Re: ProtonMail is Inherently Insecure, Your Emails Are Likely Compromised

SubjectAuthor
* ProtonMail is Inherently Insecure, Your Emails Are Likely CompromisedAnonymous
`- ProtonMail is Inherently Insecure, Your Emails Are Likely CompromisedD

1
ProtonMail is Inherently Insecure, Your Emails Are Likely Compromised

<0de4288f37920a5883334972eb29496d@remailer.paranoici.org>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=16850&group=alt.privacy.anon-server#16850

  copy link   Newsgroups: alt.privacy.anon-server
Injection-Date: Mon, 8 Jan 2024 01:15:01 +0000 (UTC)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.neodome.net!mail2news
Message-ID: <0de4288f37920a5883334972eb29496d@remailer.paranoici.org>
Injection-Info: neodome.net;
posting-account="mail2news";
key="jNKqA1w+xj9Xas+vF1oWISW6O3h0XKkMs7khzo61rvyphUpbcxdKJqFBvtyhQzB99YW4Fi
P6m8yG72YmTFRX9ifSyOR9CTBT3ykcSnVz0F9hg5AmN0DP1aVdJpvMt9P/ZhOGfVMwrbVw6BA5A
y5pafRQaHj6tIq/J4NKT+FTj50jVjiqVHwwgtBTYV3iPccBN0B/BA2P9ZeQfbd2+rfBZ/f6SagC
QyW3egwohNn37WRdHYkr5M3NGBgTtF+sEjsCtgX/Ya5vddRVIXUv+PzgLvzaslSgJcgTED3E7o+
RHs5uF+Vvf1KUp7ELZxTm+ts/6iYzQSew01x23R5CW+2Wlg==";
data="U2FsdGVkX1/g+94jlEuY9qMfMM3oYnVA5bv10uhKEI9APfv2Q/Pm9hGc94m6Tj25ny5BD
O0fPVdV9o9YIfj8pgvcU5PpQ7k9dcN2kQrf+eLo81N6Opssh12S+EMy9xxig6BDPOO1l9Xorzox
98YzvuCwkJ9OFYKc7p6qnNFgqrljRpeDM3rOyMonIqSq72PsKUZ5WB1sZZOHOOUl6DjvsGar7xO
4iGOnP0r65JXYAPZqJ2VYoKM6KzcBn+rxIEojS9rWlOJwj7ZjCZcYYDi30CCMd7j+kmPtyGizq5
YLXLNx2pcYZWlnTJtORVPMJ6RHzY8a5AkTLPXDKIfnCPCH3h9rUAYo5MLQzQ4p0C9t+jkitQZeV
WgegoyFIYHzCsngjafnY8/005vLTjdF9CpuDPTGfIJncK6UiyqqvHeDVrH9u2bN4OfVzTpAzlmR
c8HGrmcJ/FlWGjNPF0PKEBero3M0Pgt5Xo3e/rf+2FOGurMwDnurErnIf8KeR6qvihQXxyNCHD+
2uX95UA49HZRKW13jdVjnUJiiVX+xYMK2OXDKEJNn9iIdoUFuaxtvSRNd85iKNFX4peP8AYLQRG
nhtH8FB2iOypS00K+/UOztYZ/0VU4ZTzAmz9bWxMMwaallKSzcecENU+Oq5ibAAqcjjLUD0pWZ5
bfHeabmIinPXoNr8eoe4v6OFwxUpLRRMW5SSUmPivW+JVi3OJ63mYKIRWZlghOhYbIABAG1bE4F
9CZk7QslySH/isRaKWxp/UH/P21uRDXeVKOJq67CG1Y8Go8Y5lxKYpZBD29hF6k3vgAeQInBIyJ
KoUMCYWywiQSo7gKEFQoEXOL5TYGjCq68pLRQznCJbzkqwoOw0y9QcKFkiHSjkRPG93o+gpJHCl
7GKurP8XFJNydTiWCkQ5Ijzp1ygipRFc7iJscC1YONPxqQsoBc340cU0dsRRymolWb2qQ41I6zv
Bwkfy424J7T8BzVtEgh3vhVnSJebAJt2JDjw81n/KgEl3YPio1W7BaQxTV/M2b4FueyBV9Jn4PZ
bam3QSJa75hX7/I6NkguT7FnbPZUjKMaIVpUfF1AuOONqJcd+H3bW7wF0PJrFAidHQmR0ed0uQA
sLgcaJXHy1CXW0Riv3qwhiI0fnK/oZKJHSV6VYsO81GZ+VgeFC1B872WxwxH0SE6NEoC/T04ybQ
rM22Hr849nnguhJw8WI08/JMHh4FrxpLf2k9plq8zgyx9ebVEhvQBqZZlw52oD3Qs3kT9uSu+lf
sOKivgNSIXcdcHyvKuSHixs/wskkDgft1rQCJQTzQD5a2J4wXDXIWnmlamNsluu19O4SMmOTYhL
u+TaRmnK9Ecsn9bvq6x6jg==";
mail-complaints-to="abuse@neodome.net"
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@remailer.paranoici.org>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
From: nobody@remailer.paranoici.org (Anonymous)
Date: Mon, 8 Jan 2024 01:10:17 +0000 (UTC)
Subject: ProtonMail is Inherently Insecure, Your Emails Are Likely Compromised
 by: Anonymous - Mon, 8 Jan 2024 01:10 UTC

Use this URL to find the full and original copy on the WayBack
Machine:
https://theconsciousresistance.com/protonmail-is-insecure/

"I�m currently writing this post in a dark room by candelight and it
seems fitting.

Ever since I got into this space, and even before, people have always
been quick to recommend ProtonMail, a �private� email service based
in Switzerland.

I�ll admit though, I went along with it and used the service, but
after a while, seeing its growth gave me an uneasy gut feeling.

As I should have done half a year ago, I finally read into it, and my
suspicions were validated.

If nothing else, take away these three points from this post:
1. ProtonMail is inherently insecure, if you�ve used the Webmail
client, ProtonMail has always had the ability to grab your password
and private encryption key without you knowing, giving them backdated
access to your emails.
2. ProtonMail lies to its supporters and has close ties with
intelligence agencies, and world governments.
3. ProtonMail has several points of security failure which can be
utilized by many bad actors.
History

There are two versions of the ProtonMail origin story. There�s the
�official� one, on their Wikipedia, which describes Proton
Technologies as being started by �a group of scientists from CERN�.

And then there�s the origin story that has been scrubbed from all of
ProtonMail�s marketing material and denied by official
representatives that goes as follows - "

Re: ProtonMail is Inherently Insecure, Your Emails Are Likely Compromised

<5427e1e0fc3d1e006dbec5e7e3c17d7f@dizum.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=16851&group=alt.privacy.anon-server#16851

  copy link   Newsgroups: alt.privacy.anon-server
From: J@M (D)
References: <0de4288f37920a5883334972eb29496d@remailer.paranoici.org>
Subject: Re: ProtonMail is Inherently Insecure,
Your Emails Are Likely Compromised
Content-Transfer-Encoding: 7bit
Message-ID: <5427e1e0fc3d1e006dbec5e7e3c17d7f@dizum.com>
Date: Mon, 8 Jan 2024 04:36:31 +0100 (CET)
Newsgroups: alt.privacy.anon-server
Path: i2pn2.org!i2pn.org!weretis.net!feeder8.news.weretis.net!news.mixmin.net!news2.arglkargh.de!alphared!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128
 by: D - Mon, 8 Jan 2024 03:36 UTC

On Mon, 8 Jan 2024 01:10:17 +0000 (UTC), Anonymous <nobody@remailer.paranoici.org> wrote:
>Use this URL to find the full and original copy on the WayBack
>Machine:
> https://theconsciousresistance.com/protonmail-is-insecure/
>"I'm currently writing this post in a dark room by candelight and it
>seems fitting.
>Ever since I got into this space, and even before, people have always
>been quick to recommend ProtonMail, a 'private' email service based
>in Switzerland.
>I'll admit though, I went along with it and used the service, but
>after a while, seeing its growth gave me an uneasy gut feeling.
>As I should have done half a year ago, I finally read into it, and my
>suspicions were validated.
>If nothing else, take away these three points from this post:
>1. ProtonMail is inherently insecure, if you've used the Webmail
>client, ProtonMail has always had the ability to grab your password
>and private encryption key without you knowing, giving them backdated
>access to your emails.
>2. ProtonMail lies to its supporters and has close ties with
>intelligence agencies, and world governments.
>3. ProtonMail has several points of security failure which can be
>utilized by many bad actors.
>History
>There are two versions of the ProtonMail origin story. There's the
>'official' one, on their Wikipedia, which describes Proton
>Technologies as being started by 'a group of scientists from CERN'.
>And then there's the origin story that has been scrubbed from all of
>ProtonMail's marketing material and denied by official
>representatives that goes as follows - "

(using Tor Browser 13.0.8 w/meek bridge)
https://theconsciousresistance.com/protonmail-is-insecure/
>...The trio who created ProtonMail were CERN researchers along with a MIT graduate.
>They were semifinalists at the 2014 MIT 100K startup lunch competition.
>Why was his involvement scrubbed from the history of the company? We'll find out
>later in Part II, which is a short post you can read exclusively at the neo-network.
>First let's see how secure ProtonMail really is.
>Claims
>ProtonMail has made the following claims since the early days.
>"We have no access to your messages, and since we cannot decrypt them, we cannot
>share them with third parties,"
>There has never been independent verification of these claims until 2018, when
>Professor Nadim Kobeissi released his own analysis. He responded to the claims made
>by ProtonMail's technical specification detailing "security features and
>infrastructure" in July 2016.
>Professor Kobeissi found that ProtonMail's architecture did "not guarantee end to
>end encryption for the majority of its users" along with a plethora of other
>concerns.
>The majority of this article is synthesizing his technical paper into layman
>language.
>It won't take long to realize how blatantly insecure this is, you don't need to be
>a cryptographer or computer scientist to understand it.
>Let's start by defining ProtonMail's claims in general security characteristics:
>1. Confidentiality: An encrypted email sent from one person to another can only be
> read by those two people.
>2. Authenticity: An email you received from someone must have been sent by them and
> can't be spoofed by someone in the middle.
>Next, let's understand how ProtonMail's authentication and encryption schemes work.
>First, ProtonMail uses a Zero-Knowledge Password Proof to avoid giving anyone else
>information about your password.
>ZKPP has a complex explanation, but its purpose is to show someone you have a valid
>password without providing them any information (zero knowledge) about the value of
>the password.
>ProtonMail uses this method for user authentication, to prevent the user from ever
>sending ProtonMail their password. Why is this important?
>"The security granted by this protocol extends to the user's private keys, which
>are encypted with a salted hash of their password before being sent with the server"
>Stop right there. Yes, that's right, the most critical piece to the 'private' email
>service, your private key - is sent to and saved on ProtonMail's server.
>PM openly states they have your private key, and it is only a matter of getting
>access to your password to decrypt the encrypted privacy key.
>In addition to this, ProtonMail has no password requirements, and the Professor has
>tested it with passwords like '1', 'iloveyou', and 'password', which are all trivial
>to crack in dictionary attacks. Once these can be confirmed, an attacker has your
>entire email history.
>That's still not the main flaw:
>The Flaw
>The inherent security flaw is introduced with the ProtonMail WebMail portal, the
>normal web application that we've all visited in the browser.
>And the flaw is that it is relatively simple for ProtonMail to serve you a modified
>version of their web application or the underlying PGP implementation. There is no
>way to cryptographically verify that you are getting the official version of the web
>client as stored in their repository.
>If PM decides to act maliciously, they can do so undetected. Unlike the mobile
>application who's binaries get cryptographically signed to match the official
>codebase, there is no method to verify a web application.
>Once they have your password, they can use it with the private key that they have
>stored for you to decrypt any communication you've ever made through ProtonMail.
>Additionally, they can spoof email messages to others on your behalf.
>PM also has a Encrypt-To-Outside feature, which allows you to send encrypted email
>to other email providers.
>Not only are PM servers involved in this, but a third party, like Microsoft Outlook.
>It works by redirecting the recipient to a PM page in which they type a encryption
>key that they should have previous outside knowledge of, and this key decrypts the
>message. They also receive the PM sender's public key so that they can write a reply
>back.
>This leaves many open attacks:
>1. PM can once again replace the web application or PGP software to recover the
> original message and passcode.
>2. PM can also give the recipient a different public key, one that they have the
> private key to, retrieving the reply for themselves, which they can once again
> reencrypt with the sender's public key - completely undetected.
>3. The third party mail server is free to do the same, sending their own URL,
> pretending to be PM, allowing them to harvest the encryption key, which allows
> them to get the original message. Once they have the original message, they can
> use it to derive the private key. Then they are able to encrypt the reply back
> to the sender using their public key.
>Conclusions & Recommendations ...
[end quoted excerpt]


computers / alt.privacy.anon-server / Re: ProtonMail is Inherently Insecure, Your Emails Are Likely Compromised

1
server_pubkey.txt

rocksolid light 0.9.81
clearnet tor