Jim Newsome is a user on mastodon.social. You can follow them or interact with them if you have an account anywhere in the fediverse. If you don't, you can sign up here.

seems cool, particularly how they store your data encrypted such that they can't access it. Their web site is super hand wavy about exactly what the security properties are and how they achieve them though (i guess trying not to scare off non-experts?). Best write-up I could find is the Wikipedia article, which just cites the source code.

en.wikipedia.org/wiki/ProtonMa

Jim Newsome @sporksmith

E.g. an important point that's easy to miss is that that if you actually care about (or governments or hackers that get into ) not being able to access your data, you need a password strong enough to resist offline brute force attacks.

Hopefully they mitigate this to some degree by using an appropriate key derivation function with non trivial cost, but again: no real documentation or guidance.

Would also like to know what mitigation provides (or expects you to use) against them just serving you js that sends your key back to them.

@sporksmith Or for that matter, a malicious third party with MITM capability doing the same.

@mkb
I think ssl/TLS should prevent that. But yeah in general they could really use a technical write-up with threat analysis. Their web site is a lot of "your data is secure because ENCRYPTION"

@sporksmith Yeah, I’d be very interested to read that too. Perhaps if enough people nudge them they’ll publish something.

Ssl/tls protect against MITM in theory but commercial inspection hardware and dodgy CAs make it doable (but still challenging) with corporate or state budgets.

@mkb
Toying with the idea of writing something up myself based on digging through the code etc.

Fair enough re ssl. My thinking is that it's mostly a "solved" problem orthogonal to what they're doing, but otoh worth mentioning they don't automatically protect you from attackers with those capabilities, and that it can be mitigated eg with cert pinning.

RT @BartCButler
If that is part of your threat model we suggest using the mobile apps, the ProtonMail Bridge, or running the web client yourself locally after verifying the code to your satisfaction. twitter.com/BartCButler/status

@mkb