this post was submitted on 26 Feb 2024
261 points (97.5% liked)
Technology
59381 readers
2539 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
I'd be interested in seeing the number of E2EE enabled accounts used for criminal activity versus the number of regular ol' free Gmail, Yahoo, Outlook etc accounts. Governments absolutely have a hate-on for E2EE, so the police calling out these services specifically raises questions of motive.
Not that we should not be shutting down criminals... but this sort of framing tends to suggest that E2EE services are inherently criminal enabling, and that does not feel like a mistake.
Forgive my question, but if the email is encrypted and the service is unable to read it, how are they sure the accounts in question are criminal? How would they know any account was?
This is confusing to me so I am grateful for any insight.
Fair question!
If an email address is being used for fraud, they don't need to see the encrypted copy; they can see the copy sent out to other people from that address. So if I send you a message from my Protonmail to your Gmail, the following is true:
Copy @ Protonmail: E2EE.
Copy @ Gmail: NOT E2EE.
There are other, circumstantial ways to tell as well. If you're trying to scam people with DudeBro Cryptocurrency, you necessarily reveal the address you use when you send our your spam or scams. If I send malware from [email protected], the proof that I sent the malware does not require you to see my server stored mail; you can just look at your own copy to see.
Does that make sense?
So any email address is not encrypted even if the message goes to another encrypted account? Is this correct?
Yes, the "to address" cannot be encrypted as it is necessary to deliver the mail, the "from address" are needed to send a notification when the "to address" doesn't exist.
Technically, the "from address" probably can be encrypted, like in signal; but I think it is required in the current email standard.
Thank you. This helped.
Surely Proton also receives the mails in plaintext? There's no E2EE about it. You have to take their word that they encrypt it and discard the plaintext data.