STOP Using Proton & Signal? Here’s the TRUTH

Поділитися
Вставка
  • Опубліковано 6 чер 2024
  • Are Proton privacy and the Signal messaging app still secure? Every year this gets called into question, yet rarely is the full story ever told. In this video, Josh explains what's really happening with these privacy and security apps as well as how it affects YOU directly.
    Watch this video on the 12 privacy and security apps I use EVERY DAY: • 12 Privacy & Security ...
    YES, I still use and recommend Proton & Signal:
    ▶ Try Proton Unlimited: www.allthingssecured.com/yt/p...
    ▶ Get the Signal app: signal.org/
    If you care about your personal security and privacy online, download my free security checklist here:
    ✅ Security Checklist: www.allthingssecured.com/secu...
    🔹🔹What to Watch Next🔹🔹
    We've got a lot of great privacy- and security-related content here on the All Things Secured UA-cam channel (although we admit we're a bit biased). If you're wanting to increase your online cybersecurity, here's what's next:
    ✅ Which is the most SECURE email service? • I Tested 5 Secure Emai...
    ✅ Which is the BEST Password Manager? • I Tested 7 Password Ma...
    ✅ iPhone Mistakes the RUIN your Privacy: • iPhone Mistakes That R...
    🔹Support All Things Secured (Recommended Tools)🔹
    If you enjoy this kind of practical security and privacy content, one of the best ways you can help support this channel is by using these affiliate links to our favorite products and services. When purchasing through these links, you not only get the best available deal, the companies will also pay us a small commission. Thank you for your support!
    ✅ Recommended Password Manager: www.allthingssecured.com/yt/1...
    ✅ Recommended Identity Monitoring: www.allthingssecured.com/try/...
    ✅ Recommended 2FA Security Key: www.allthingssecured.com/yt/y...
    ✅ Recommended Secure Email: www.allthingssecured.com/try/...
    ✅ Recommended VPN: www.allthingssecured.com/try/...
    *********************
    Video Timestamps
    *********************
    0:00 - Are Proton & Signal still secure?
    0:36 - Cybersecurity confirmation bias
    1:20 - Privacy companies & government data requests
    2:15 - Encryption & data requests
    3:41 - Signal accused of having encryption broken
    5:12 - Understanding personal OPSEC with privacy apps
    5:50 - How to Remove Proton Recovery Email address
    6:23 - How to Hide IP address from Proton
    6:36 - Practical privacy in the digital age
    7:21 - Should you stop using Proton & Signal?
    *********************
    It's easy to get swept up in the news that a privacy company has handed over user data to a government intelligence agency. But what are the limitations of companies like @ProtonAG or Signal? Or perhaps more importantly, what is YOUR responsibility when using such apps, considering the fact that no single software or service can guarantee you privacy and anonymity?
    #privacymatters #cybersecurity #onlineprivacy
  • Наука та технологія

КОМЕНТАРІ • 533

  • @AllThingsSecured
    @AllThingsSecured  21 день тому +35

    What's your take? Do you think I'm letting Proton and Signal off the hook here? Leave your opinion here and let's discuss. Then make sure to watch my video on the 12 Privacy & Security tools I use EVERY DAY: ua-cam.com/video/XNOAOQktG6U/v-deo.html

    • @TrggrWarning
      @TrggrWarning 21 день тому +1

      4:48 yeah, a proponent of censorship, looks bad… Not sure what “apparent” intelligence connections means, but paired with supporting censorship, could be really bad.
      “Free service” has tended to mean we, (our data) is the product.

    • @jonathancorbett7882
      @jonathancorbett7882 21 день тому +1

      @@TrggrWarning Agreed. Sure, the code is the code, but Signal's leadership were the ones who decided that phone number are still required. Signal has a huge trust problem. Also, Durov has a valid point: Signal doesn't have reproducible builds on iOS. Telegram does. And Meredith Whittaker, who worked 10 years for Google before she realized that surveillance capitalism is a problem, lies about this and claims that Apple prevents Signal from having reproducible builds.

    • @DarkLink606
      @DarkLink606 21 день тому

      I agree that criticism from anyone regarding a widely used e2ee protocol ought to be corroborated by evidence. But then again, much of the criticism on Telegram relies on its protocol, mtproto, being "homebrew", or the company founder being Russian, or its creators not being world-famous cryptographers.
      A few minor flaws on Telegram have been proven in the past, they were acknowledged and readily patched by Telegram, and bounties paid. It's not as technically secure or private as Signal, to be sure, but I think Telegram has another paradigm and focuses on a different risk profile. It's much more like Discord, and way better in every respect.

    • @Yug_9y
      @Yug_9y 20 днів тому

      What about the tutanota. Is it safe?

    • @Casey2262
      @Casey2262 20 днів тому

      I'm more concerned about the NSA and Clearview AI, since they've collected the data of almost everyone in the world.

  • @donh8833
    @donh8833 21 день тому +214

    There have been multiple* court cases where law enforcement agencies submitted a subpeona to signal. And signal replied "Sorry, we have no data" If it were a front for the US govt the result SHOULD be different. HOWEVER if enough people were made to believe that Signal was insecure, they might abandon an actual secure platform.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +23

      That makes sense.

    • @JohnTurner313
      @JohnTurner313 20 днів тому +26

      (tinfoil hat on) Or Signal *is* a front and their SOP is to say "Sorry, we have no data" while the 3-letter agency they're fronting for has access to everything already.

    • @donh8833
      @donh8833 20 днів тому +27

      @@JohnTurner313 the fact it is open source says otherwise.

    • @JohnTurner313
      @JohnTurner313 20 днів тому

      @@donh8833 That’s just the code. That is not the company, nor is it certificate, key or infrastructure management. See the recent xz vulnerability as an example of why “oh, it is open source” is not an automatic pass.

    • @beuman0
      @beuman0 20 днів тому +3

      Only the client unfortunately

  • @student_of_God
    @student_of_God 21 день тому +121

    I've been using Proton services for a while now and I must say this is the only company which provides both anonymity and convenience at there highest levels.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +32

      But there's still need for personal OPSEC!

    • @BillAnt
      @BillAnt 19 днів тому

      ​@@AllThingsSecured - Best to delete the recovery email and store the encryption keys locally on an encrypted storage. imo

    • @coachvalente
      @coachvalente 4 дні тому

      @@ForAndroid101 Operational Security = everything you do or dont to maintain your anonimity including physical things besides online. And about paying, there's no other way i imagine. They dont accept crypto as far as i know.

    • @twelvedanunnaki
      @twelvedanunnaki День тому

      yes of course, they accept crypto

  • @placeholder3853
    @placeholder3853 21 день тому +64

    This is what so many people don't seem to understand, a company HAS to hand over data asked of them by law otherwise they will get shut down and possibly get employees jailed. You have to minimise what data you give to ANY service.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +9

      Exactly 👏

    • @matejkuka797
      @matejkuka797 17 днів тому +3

      one of the things that can end this is, for example, a law that the EU wants to approve, which prohibits encrypted communication, so services like Proton and the like could have a serious problem :/ of course, there are a lot of other options, but every other option takes away "comfort"

    • @DarrylGold
      @DarrylGold 15 днів тому +7

      Lavabit shut down their company rather than give out information

    • @everyhandletaken
      @everyhandletaken 11 днів тому

      @@matejkuka797are you serious? They got USB-C & now they want to HTTP all the things? 💀

  • @LabelsAreMeaningless
    @LabelsAreMeaningless 21 день тому +37

    I appreciate you talking about the big picture instead of being emotional and reactive like so many tend to be. I'm still going to use Proton. I'd also like to have people ask themselves one thing. If you're abandoning Proton due to fear of security, who exactly are you switching to? Proton is still the best available without making your own email server and making sure everything is encrypted with nothing overlooked in terms of security.
    Instead of freaking out and shooting yourself in the foot, think through what you're going to do, be reasonable and rational and then make your decisions.

  • @henrik2117
    @henrik2117 21 день тому +8

    Great video! Especially the last part where you state the obvious fact - something that most people in this always online world fail to realise - don't share every damn part of your life with the rest of the world.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +1

      ha! I know, right?

    • @henrik2117
      @henrik2117 20 днів тому +4

      @@AllThingsSecured I don't remember where I read it but a while back I saw someone posting something like this:
      "the Internet is down at the moment so I went out into the real world. Here I'm shouting to everyone I see how I'm feeling, what I just did, what I got for breakfast and so on. So far it's going great - I've already got three followers, a doctor from a psych ward and two police officers".

    • @nopenotyeti
      @nopenotyeti 9 днів тому

      ​@@henrik2117hilarious and so true but I'm concerned that the US wouldn't be able to care for homeless influencers if the Internet ever really did break

  • @hhbadarin
    @hhbadarin 21 день тому +39

    Thank you so much, many people need to hear this and use their minds before making judgements!

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +2

      Thanks 🙏

    • @henrik2117
      @henrik2117 21 день тому

      That would require actually thinking for themselves and making a personal opinion - not sure the majority of people are ready for that.

  • @7heMech
    @7heMech 21 день тому +45

    Proton yeah, but Signal is open source I've looked at the code myself, your data is 100% safe, because Signal by design is made so that the company (even if it wanted) can't access any of your data except for your number (which the person requesting your data already needs) and account creation date.

    • @testingtesting9046
      @testingtesting9046 21 день тому +17

      Github code may be secure but if you take closer look in 0:18, it says Signal doesn't allow researchers to verify the app deployed in iPhone is the same as the code in Github 😅

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +7

      Thanks for sharing.

    • @NomadKev
      @NomadKev 17 днів тому +4

      Telegram CEO is referring to Tucker Carlson, TC interviewed Pavel Durov last month, Tucker claims his Signal was compromised

    • @7heMech
      @7heMech 17 днів тому

      @@NomadKev it's a claim based on no evidence, I also say the US bank was compromised. People seem to forget Signal is competition to Telegram, he has everything to win by saying that baseless claim.

    • @7heMech
      @7heMech 17 днів тому +9

      @@NomadKev it's a baseless claim.

  • @gerowen
    @gerowen 21 день тому +19

    Given the open source nature of Signal I have a feeling that IF somebody's Signal messages were compromised and used against them in court, it wasn't because of a flaw in Signal, but because they made some other mistake with their OPSEC. Perhaps their device, or the device of the person they were talking to, was infected with some sort of malware that could read the messages after they arrived on the device. End-to-end encryption only means from one end to the other, but the messages have to be decrypted once they arrive on a device or else they couldn't be read, so malware running locally on the device could potentially read them. It's also possible, though less likely that they managed to add a device to somebody's Signal account and they didn't notice it because they don't regularly check which devices are authorized to send/receive messages for that account. With how modern encryption works, it's much easier to trick somebody into installing a piece of malware than it is to break the encryption.

  • @MidianNiles
    @MidianNiles 20 днів тому +2

    Thank you for making this video. The message here isn't letting these vendors off the hook; it's a reality check for the digital frontier as a whole. More specifically "due process". It's the only 'real' sense of security we need to focus on, "did an agency use due process?" But also (and more importantly) are software vendors 'only' providing information under circumstances of due process? As a systems administrator, I applaud the message of User responsibilities and as a personal privacy advocate, I salute the message of due process.
    Fear mongering and baseless accusations run rampant over social media outlets as it is. Thank you for providing a voice of reason and a means of laying a basic framework of the legal challenges.

  • @mahirjan1984
    @mahirjan1984 21 день тому +3

    Thanks Josh. I’m glad you speak with a voice of reason!

  • @snowingfate6100
    @snowingfate6100 21 день тому +33

    Signal is open source and has gone through several law suits. Proton is very similar in that the law suits it is gone though proves that they will only give over what they keep, which is nothing. This is very similar to Private internet access.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +3

      True.

    • @viktoreisfeld9470
      @viktoreisfeld9470 17 днів тому

      This only applies to VPN. Everything on there web servers, mail servers, and database servers is logged. You can access Proton's website through tor. But, you can no longer create a proton account through tor which means the account is linked to you.
      Personally, the only VPN I trust is Mullvad.

    • @imFruzzy
      @imFruzzy 12 днів тому +1

      Maybe, but Proton was funded by the EU and are funding nefarious projects. The company you keep says a lot about you...

    • @Its-Just-Zip
      @Its-Just-Zip 12 днів тому +2

      ​@@imFruzzythis argument holds very little water. The tour project used to get DOD funding but they are very clearly not a Honeypot. There has been plenty of actual court cases that have proved that the US government cannot abuse that Network in fact, the US government uses Tor and I'm pretty certain the same situation exists with the EU and proton. The EU probably pays proton a little bit of money because the EU uses proton.
      Also saying that proton is funded by the EU is a little bit stupid because proton is not a donation-driven company. They are funded by their users. They may have gotten a few EU grants, but that's very different from being funded by the EU

    • @CapitanGreenhat
      @CapitanGreenhat 11 днів тому

      PIA was purchased buy some mossad bros

  • @mohdasaa
    @mohdasaa 21 день тому +2

    Thank you for thorough clarification.
    Keep up the good work, you just earned a new subscriber for the amazing content!

  • @pmjeterjr
    @pmjeterjr 21 день тому +2

    Thank you for this! I was just thinking along those lines, you confirmed them for me!

  • @ThatGuy.75
    @ThatGuy.75 21 день тому +7

    Personally I still use Proton and have for over a year now. In my case it is because I wanted a service with a good reputation and does not have any notable security issues.
    I also take into account that the level of security of my account is truly on me not Proton. Proton provides the service and Proton is a Swiss owned company.
    If you want something secure, it is YOUR job to make it secure over the provider.

  • @xavhow
    @xavhow 21 день тому +25

    Couldn’t agree with you more.
    There are a lot false information on the internet creating FUD. Be smart, question everything and do the research if you have to!

  • @asiliria
    @asiliria 21 день тому +19

    I keep seeing not only news but messages from friends and other acquaintances in Linux and privacy communities that keep propagating a lot of these conspiracies. I agree most of the time that people are not just doing their jobs in the security field right.
    Thanks for going over them in such a manner! 🤩

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +1

      Thanks for watching and commenting 🙏

    • @steve-yq7sb
      @steve-yq7sb 18 днів тому +1

      People should always be finding sources and verifying. Seems like if people even see something at all that they just share it without validity as a thought at all even afterthought. I mean its ridiculous. On the other end not everything can be verified so i dont believe only speaking about verified stuff especially with the ACT checkers... People need to look at who would benefit from each thing... Possible motives... Credibility... Then it could be clearly seen when people are being put in a situation to discredit themselves and others in the long term by not considering these things. The long term is more important.

  • @thelonelyman48
    @thelonelyman48 21 день тому +2

    Well reporeted, Josh! I can’t count on my fingers, toes, and other appendages how many people I have to educate that software is not a cure-all. It takes human intervention and understanding for it to work 99.9999% of the time.

  • @breakfastattwilight
    @breakfastattwilight 21 день тому +35

    Do people not read the TOS and Privacy Policy? I recently read Proton's, and this is not new information to me.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +15

      No, most don’t.

    • @MochaZilla
      @MochaZilla 21 день тому +8

      Why even pst this comment? Of course, most people dont.

    • @Physis_88
      @Physis_88 21 день тому +8

      In general, the TOS is full of legal jargon that is difficult for the average user to decipher, and it is also usually as long as the LOTR.

    • @MochaZilla
      @MochaZilla 21 день тому +3

      ​@@Physis_88exactly the TOS can take literally hours to comb through. Who actually has time to read through it?

    • @BrazenNL
      @BrazenNL 21 день тому

      Ignorance or sarcasm?

  • @OhhMyGiddyAunt
    @OhhMyGiddyAunt 21 день тому +2

    Thank you. will you do a review on TeleGuard by SwissCows?

  • @WaturDzn
    @WaturDzn 21 день тому +3

    One thing that I feel like people never mention is the extensive list of terms and conditions for iOS & Android, considering that’s where proton and signal appear to be used the most. Although signal and proton themselves may never store any information, how are we suppose to feel secure in the fact that the operating system we’re running these apps off of aren’t spying on us equally as bad as people would fear one of these messaging apps would? I’m curious for your take on that

    • @PvtAnonymous
      @PvtAnonymous 20 днів тому

      well, that's exactly the point. If your threat model includes big govt/big tech, using a proprietary mainstream OS already invalidates every action you take further - which was more or less confirmed in 2013 by Ed and hasn't changed since, more or less gotten worse. Everything you do in that OS can and is being recorded, the OS can take and does make screenshots for example. Some people don't realize this, but as long as you don't know what the OS underneath is doing, no E2EE, Signal or Protonmail is gonna help. These solutions only make sense if the threat model is 3rd parties and ad companies.

    • @tonydarcy7475
      @tonydarcy7475 20 днів тому +1

      If you are concerned about that you can always use a privacy-respecting fork of Android like GraphineOS or CalyxOS.

    • @WaturDzn
      @WaturDzn 20 днів тому

      @@PvtAnonymous makes sense, but in that case signal shouldn’t make itself seem “encrypted” because if the operating system can and does use the info you type then it may as well not be encrypted, I personally don’t give a damn about ad traffic or anything along those lines, the entire point of using signal is for encrypted messaging, which if that’s undoable via a normal Android/iphone shouldn’t be available on the App Store/play store

  • @PowPowPixie
    @PowPowPixie 21 день тому +2

    Well said, and thank you for your rational explanation

  • @Mic-Mak
    @Mic-Mak 21 день тому +1

    7:03 Excellent video! I'm glad you included that second part, _don't _*_send_*_ comprising pictures,_ because people shouldn't be shamed for taking compromising pictures of themselves. Don't get me wrong, I advise my friends and family against it, especially women, but I wouldn't shame them for it. On a related note, I have personally always wanted to journal. I've always wanted to have a place where I could write my most intimate thoughts. Preferably on a secure digital journal, because I've had bad experiences as a kid with the security of physical journals. But most journaling apps don't have end-to-end encryption, which is why I have never done it. I don't want to keep everything in my head because writing can be really cathartic. It can help people heal.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +2

      Very interesting thought on the journaling. Thanks for sharing.

    • @Ck87JF
      @Ck87JF 21 день тому +1

      You could just write your journal using a local app on your laptop and make sure the drive is encrypted. Or there are ways to create encrypted "files" which can contain multiple files, folders, etc. You decrypt it, update your journal, and re-encrypt it.

    • @Mic-Mak
      @Mic-Mak 21 день тому

      @@Ck87JF I hear you, but in terms of UI & UX it's not practical. I want a specific app designed for journaling. And those exist, but they're not end-to-end encrypted (E2EE). I have heard of DayOne, which is a promising E2EE journaling app, but they are not natively E2EE so I have some reservations. That said, the biggest hurdle for this magnificent app is that it's only available for Mac and I use Windows. They said they are working on a Windows app though, but I suspect that will take forever as they seem more dedicated to Mac users.

  • @feylights166
    @feylights166 20 днів тому +1

    Unless I suddenly need to run from the law, these particular things don't really worry me too much. Yes, if Proton was hacked, they could see my recovery email, but I have a strong password and use security keys to sign in to my account. I am still learning how to become better at cyber security (my anxiety suddnely made me hyper aware of it).
    While I am very concerned about privacy, I would want law enforcement to be able to find a dangerous criminal.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +1

      I don't think your privacy has to connect in any way to law enforcement finding a dangerous criminal. It's simply how we handle our own data, not expecting a company to do everything for us.

  • @R_Hoefer
    @R_Hoefer 20 днів тому +2

    Good job on this video! You eliminated all the diagrams or explanations for HOW these 2 companies encrypt your data, reducing or eliminating unnecessary confusion in order to make your larger points. You made the whole video accessible to a consumer level audience, The exact group who do not know how to evaluate the accusatory assaults made by telegram or by privacy advocates objecting to there being any form of legal compliance with the country you're operating in.
    Good choices, resulting in very easy to understand video about something very important and critical.

  • @TonyCrenshawsLatte
    @TonyCrenshawsLatte 17 днів тому +1

    Never have illusions about the tools you use. It's a lesson I've learned (sometimes in hard ways) over the years.

  • @gdrmarmokaite1521
    @gdrmarmokaite1521 21 день тому

    Does this fact that they give over the data they have also apply for their VPN service? Proton VPN has the encryption keys would they had that over too? i have always praised Proton VPN for being the best free VPN

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      It’s different because that data isn’t stored.

  • @alessandrotosato4409
    @alessandrotosato4409 16 днів тому +1

    The title is a bit clickbait, but i think you videos are still very imparcial and informative.

  • @meino6465
    @meino6465 20 днів тому

    So I have a question: Is there any reason to keep recovery email on if you know you won't lose the password? As in, are there other cases where you could get locked out of your account unless you use a recovery email?

  • @vbostrom
    @vbostrom 19 днів тому

    How do I verify that the Signal application that I downloaded from the apple app store was built from the open source code that is published?

  • @store-manager-deluxe
    @store-manager-deluxe 21 день тому +2

    Can you register without an email or mobile number over tor? if the answer is no they dont care about your privacy.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +2

      For some people, I get it - that doesn't fit their threat model. But that doesn't mean there isn't privacy.

    • @horustwohawks
      @horustwohawks 20 днів тому

      @@AllThingsSecured First time visitor, and I really like your presentation. I wish you had spoken to this aspect a bit more, I think it belongs in the frame of what you were speaking to. Going to check out your channel, and thank you.

  • @bipin_pariyar
    @bipin_pariyar 14 днів тому

    Hi I keep getting this message in my Google authenticator "Syncing will continue when your device is online and you refresh your Authenticator codes"
    I just can't figure out what is the issue. It would be great if you make a video addressing this issue.

  • @Yotanwaxxi
    @Yotanwaxxi 21 день тому +1

    Hi there there first thank you for the amazing content I learn a lot by watching your content
    I would add that you have to understand the core of the technology you are using.
    You have to know exactly what happens when you send an email. You have to know how does encryption work. And it’s always evolving so you have to update your knowledge as well. Only there it make sense to choose proton or signal or whatever so it would have been cherry on the cake if you link in the description videos where you talk about the technical aspect of it.
    I was wondering though.. is it possible that an open source software has a different code than advertised and nobody realises it ?

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому

      It would be difficult to do that kind of fraud, I believe.

  • @wdm213
    @wdm213 21 день тому +1

    Thanks- Good content presented in a reasonable amount of time.

  • @Mindinis1
    @Mindinis1 12 днів тому

    Shoot. So what services to use ? What VPN service use for anonimity and no logs policy ?? Because I am protons user for a while...

  • @sdkjl5984
    @sdkjl5984 20 днів тому

    How many people review the open source code, and then compile it themselves? If not, how do you know the installed code matches the open source version?

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому

      Most people don't, but you can be sure that it is being reviewed by people who are looking for bug bounties at the very least.

  • @jesse7631
    @jesse7631 21 день тому

    Great video! Subscribed to your channel.

  • @itsmisterchris
    @itsmisterchris 21 день тому +1

    I understand very lil lol but was questioning proton.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      Do you still question them after watching this video?

  • @astrohrs
    @astrohrs 21 день тому +3

    very well explained.

  • @kleanzed
    @kleanzed 18 днів тому

    Hey Josh, I can't afford a security key, however i have a usb flash drive.
    Is there's any way I can turn my usb flash drive into a security key? If you can then please make a video on that.

  • @ZEbwRigG
    @ZEbwRigG 21 день тому

    @AllThingsSecured Hi there! Have you utilised or noticed Spark, myMail, and Airmail? Are they safe in terms of privacy and what are the best ways to use them?

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому

      Never heard of any of them. Sorry.

    • @ZEbwRigG
      @ZEbwRigG 20 днів тому

      @@AllThingsSecured Okay with thx.

  • @janloydsabado
    @janloydsabado 21 день тому

    Do you have personal reco? If signal is not safe anymore.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +1

      Personally I use Signal - I said as much in the video. Beyond that, it gets really hard to migrate to a new platform AND get all your contacts to do the same.

    • @MysteriaNota
      @MysteriaNota 21 день тому

      Threema is the best of the best! But you need to buy a lifetime Threema license first. Luckily it doesn't cost a lot of money. The license is cheap.

  • @nejiross
    @nejiross 20 днів тому

    WOW you really hit the nail on this. Things I overlooked myself, especially with legal stuff. Hey, great video sir!

  • @maits18
    @maits18 21 день тому +2

    Looks like some people here in the comments think privacy and anonymity are same banana.
    Unfortunately Josh even with the great clarification you gave there are people that are stubborn with their beliefs where no one can change them

  • @salapolivalenta77
    @salapolivalenta77 21 день тому +1

    No surprise for me, for privacy I have my own ejabberd server and also a matrix server. Both work like a charm if you know how to proper configure them. Cheers!

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      That’s impressive, but beyond the ability of most people to set up.

    • @salapolivalenta77
      @salapolivalenta77 20 днів тому

      @@AllThingsSecured I agree, indeed....

  • @iAPX432
    @iAPX432 19 днів тому

    There are 2 majors problem, the error 18 aka between keyboard and chair, and the platform used to access websites or run applications. And in case of anything related to messaging, the same problems on the other counterparts of these exchanges.
    Put differently one might be the problem, no end-to-end encryption tools.

  • @Memetaku666
    @Memetaku666 21 день тому

    Nice analogy there❤❤

  • @all3w1s58
    @all3w1s58 19 днів тому

    In the video, you brought up the point about being careful of what recovery email you specify. If the recovery email is from iCloud or Microsoft or Google, then I understand the point that the authorities will have to hand any email id to the authorities. What if it was another Proton email account itself?

  • @catinksreal
    @catinksreal 20 днів тому +1

    2 Things:
    1. The people who had their "Private Signal Messages" compromised probably had it all on their phone and either the phone was compromised and swiped or the authorities gained physical access to the phone when they arrested the person in question, none of which are signals fault - good OPSEC here would be to not leave signal logged in on your phone.
    2. FUD is interesting, I treat FUD as a means and reason to look deeper into claims - false or not, and learn more about the issues they have. FUD has such negative connotations, but really is a great means of criticism and a good reason to improve something - yours or not. Ignoring FUD just proves that a person is both Arrogant and Ignorant.

  • @YannMetalhead
    @YannMetalhead 21 день тому +1

    Good information!

  • @uncoverdatruth6634
    @uncoverdatruth6634 21 день тому

    Why and How should always be asked. It's just part of critical thinking. Thanks Josh for being a critical thinker!

  • @lincolnlincoln27
    @lincolnlincoln27 21 день тому

    what do you think about telegram?

  • @BorgOvermind
    @BorgOvermind 20 днів тому +1

    Well explained. The biggest security vulnerability of all time is the user.

  • @asadon1950
    @asadon1950 21 день тому +3

    The same people complaining about companies legally being required to hand over data they have are here in a UA-cam channels comment section… a Google app.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +4

      Feel free to jump over to Odysee for those who don’t want to use a Google app!

    • @bnalive5077
      @bnalive5077 21 день тому

      Odysee and rumble are good alternatives to this.

  • @PyroRob69
    @PyroRob69 21 день тому +1

    The primary message you should be taking away from this is if have something private to say, do it face to face, in an appropriate place.

  • @blackpurple9163
    @blackpurple9163 20 днів тому +2

    Pavel criticising Signal is pretty ironic when he's turning his own platform into a Facebook-like nightmare

    • @APIAlchemist
      @APIAlchemist 16 днів тому

      And also not using encryption by default, giving people a false sense of security because they "have" end-to-end encryption... But the so called "Secret Chat" function only works mobile-to-mobile.

    • @blackpurple9163
      @blackpurple9163 15 днів тому

      @@APIAlchemist and it's not even advertised as much, considering that's the only encrypted chat

    • @APIAlchemist
      @APIAlchemist 15 днів тому

      @@blackpurple9163 Besides, isn't Telegram closed source? How can we even verify it's end-to-end? If we try to sniff for the packages sent, they will all be encrypted in transit so it would be very hard to decode to try and find out, especially since they use a proprietary encryption algorithm called MTProto that they won't open source even if they do give a detailed description of how it works (and it was analised by a few people, it has several security flaws too).
      And the same encryption is used to send regular messages and end-to-end to their servers. We should just assume that they don't have the key to decrypt the secret chats too?

  • @letseat3553
    @letseat3553 21 день тому

    Zero metadata messaging, is it possible? I sat down and thought about exactly what is gathered in messages and how to remove it from the equation.
    I believe it is possible but it's a little complex and involves individual and different 'mx' servers for each 'contact pairing' - messages are sent to hashes of unique id pubkeys only known to the users in the contact pairing.
    You would need to independently conduct a key exchange with a contact through some kind of centralized server and assign an external messageing exchange server to each contact - at these individual 'mx' servers only hahses of pubkeys that are not quite so public would be used. I did not develop the idea any further, just a thought experiment. Storing initial id and encryption keys on a blockchain type system would allow initial id keys to be distributed through registered 'services' which could be on Tor for example.
    It's a rabbit hole for sure

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому

      Definitely a rabbit hole.

    • @stephanhuebner4931
      @stephanhuebner4931 20 днів тому +1

      I wouldn't choose any kind of direct communication/connection between two endpoints. One could do what these ominous radio stations do that still seem to exist. Exchange some encryption-code in some other way beforehand and then blast the message out via radio signals for the world to hear and pray that your encryption is good enough. Or post the message on some publicly accessible forum which looks unimportant for anybody but the recipient.

  • @kchulkacz7082
    @kchulkacz7082 2 дні тому +1

    When i saw one of the articles claiming proton shares info with law enforcement, i was kinda skeptical. Than i read that they only handed out the recovery email. It was the persons stupidity to use apple id as recovery.
    Proton can protect contents of your emails with encryption, but they cant protect you from your stupidity...

  • @RAM_845
    @RAM_845 20 днів тому

    @AllThingsSecured What are your thoughts on Next DNS? I been using it for a while and it served me well so far AUD$3/mth worth it.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +1

      I haven't used it myself, but I've heard good things.

  • @jytou
    @jytou 20 днів тому

    About encryption, there are sometimes backdoors built-in, so even if the software itself open-source the choice of some parameters that are supposed to be random on the site where the software is running can heavily jeopardize the encryption strength. So in here we have to trust that Signal and Proton have not allowed external agents to push them to leave some holes that we may not even know about (Crypto AG being the most iconic example, Tetra is another one).

    • @stephanhuebner4931
      @stephanhuebner4931 20 днів тому

      That is correct, but we have to use the tools we are provided, and we have to trust those that are more knowledgeable than us. Simply because building our own secure tools is mostly a braindead idea. No homegrown solution will be as secure and as foolproof as tools created by professionals. I am using both Proton and Signal and I would much rather trust these two companies with minimal (if any) security problems in the past than most other apps that are out there somewhere. And having said that, if there are security problems, they'll most likely stem from my own stupidness or the people I communicate with.

    • @jytou
      @jytou 20 днів тому

      @@stephanhuebner4931 Indeed, I was just reminding that even with open-source software, when it is hosted somewhere there is always uncertainty and one can never be sure 100% of the full confidentiality of the data.

  • @RodHelms
    @RodHelms 21 день тому

    What protects the phone from hackers Norton?

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      What do you mean?

    • @a1isrising
      @a1isrising 20 днів тому

      i think he means what would prevent your cell from being hacked , using a servcie like norton or something like them , i dont think norton provides a service for your phone to not get hacked but idk , other than being vegilant by not opening links or emails you dont know are secure and or trusted its kinda up to us to not get phished or download stuff to are phones

  • @t3keen0ob
    @t3keen0ob 17 днів тому

    Thank you for sharing and breaking this down for the average users so many misconceptions and myths floating around out there.

  • @bzipoli
    @bzipoli 21 день тому +1

    great take

  • @lukasbruderlin2723
    @lukasbruderlin2723 8 днів тому

    There are 2 fundamental points on Proton: (1) Even if you use a VPN or TOR whenever you access Proton's website to configure or read emails ... as soon as you run one of their apps, e.g. ProtonVPN or Proton Drive as local app on your machine ... Proton will automatically get your IP address (unless you additionally use TOR or onion service) Isn't it? (2) Most people think, that Proton or Signal have no possibility to get your private key, which is used for their end-to-end encryption, but it could be easily sent encrypted... and whether this actually is done or not... fully relies on how well their Open Source code is audited in this regard, isn't it?

  • @TheITCornerbyJR
    @TheITCornerbyJR 10 днів тому

    Great video. People now days react with the first thing they hear without looking at all aspects. Is mind boggling how the truth can be misconstructed these days.

  • @jonathanmgoodman
    @jonathanmgoodman 19 днів тому

    Being open source doesn’t mean anything without a guarantee that the code submitted by signal or protonmail to the Apple App Store or Google Play Store is the same exact code that they show the sources code for.

  • @TheHagamanstube
    @TheHagamanstube 20 днів тому +1

    Searching for privacy while using third-party networks, devices, or operating systems is essentially wishful thinking.
    Consider three neighbors living side by side. The first and third neighbors want to have a conversation in their backyards. As they start talking from their respective gardens, the second neighbor, situated in the middle, can always hear their conversation. This analogy illustrates the basic principle: you can build a temporary communication channel (like a pipe) for the neighbors to talk privately, but this pipe must be entirely your own construction, not provided by services like NordVPN or OpenVPN.
    Once people grasp this concept, the issue becomes clearer. As long as you rely on third-party systems, true privacy is unattainable, which is the case for 99% of users. Genuine privacy is nearly impossible in these scenarios.
    If you truly desire privacy, consider having face-to-face conversations, perhaps during a walk in nature or while swimming.

  • @bonkmaykr
    @bonkmaykr 11 днів тому

    Best security related advice on UA-cam, period. Nothing is black and white, you should build threat models based on what your concerns are and be aware of what you are sharing and who potentially can see it. All this commotion about "proton bad" "telegram bad" "mullvad bad" only has meaning if you understand the weaknesses of each tool and how they apply to your situation. Thank you and have a sub

  • @MarigoldAW
    @MarigoldAW 13 днів тому

    It's absolutely silly that people have this notion that private email services will provide you with total anonymity. In my opinion people fear monger when these companies get subpoenaed for information as if Google would not hand over every bit of data they have when asked. If your goal is complete and total anonymity then a subscription based email service clearly isn't going to be a part of your threat model. Or they fundamentally misunderstand what exactly a service like this is supposed to do for you.
    It's like some of these content creators forget who exactly these products are marketed toward and that's average everyday users who are simply looking for a slightly better alternative to the all seeing eye that is Google and it's web of tech. When you look at these services through that lens Protonmail is fantastic. I appreciate your level headed take about this. Too many fear mongers

  • @TheCrealkiller
    @TheCrealkiller 20 днів тому +3

    Seems like pidgeons will be the secure protocol of the future.

  • @xastronix
    @xastronix 21 день тому +9

    I think there's a difference between privacy and anonymity....you can use this services for privacy and not for anonymity

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +1

      Great point 🫡

    • @MarigoldAW
      @MarigoldAW 13 днів тому

      Exactly my take away. If you are using Protonmail for "anonymity" there is a flaw in your threat model long before email services come into play.

  • @MochaZilla
    @MochaZilla 21 день тому +1

    Never create text of any compromising information. Share that info in person without your phones around for maximum privacy.

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      Agreed, but that's often easier said than done.

    • @man_at_the_end_of_time
      @man_at_the_end_of_time 21 день тому

      I had a phone on by accident and the so-called AI search engine made a relevant comment. I've never trained it to my voice.

    • @stephanhuebner4931
      @stephanhuebner4931 20 днів тому

      I highly doubt the "maximum privacy" via sharing something in person. If some state organization wants to listen to what you do or say, there are countless methods to do so, no matter the way of communication. Unless, maybe, you're able to build a bunker without anybody knowing anything about it and then you're also able to get the people you want to talk to there in absolute privacy.

  • @matt79de
    @matt79de 19 днів тому

    A frustratingly number of times people miss the fact that someone ... nefarious, shall we say, may not *need* to have the encryption key if the endpoint is compromised.

  • @Kirk-oj6qm
    @Kirk-oj6qm 20 днів тому

    The reality is this: If you are online, there is no way to be completely secure from online threats.
    Proton and Signal give you better tools to safeguard your privacy than others, by a significant margin. They are still however online.
    It took a multi-national government order with proof of terrorism to just get the recovery email address. If that isn't secure, then what is?
    Well created video, thanks for sharing.

  • @RichardMcCulloch-fq9ks
    @RichardMcCulloch-fq9ks 14 днів тому

    And this will always be the case with centralised systems. If there is somebody to call, they can pressure/bully them into giving up the information.

  • @randysavage7351
    @randysavage7351 9 днів тому +1

    Enjoyed your take on this matter.

  • @sebastien79a
    @sebastien79a 20 днів тому

    You could do a one way encryption or hash on a recovery e-mail address and then only 'check' when supplied rather than have the recovery e-mail in plain text. Could be enumerated obviously so a bit more complex but can be fixed if someone wanted to.

  • @zedev444
    @zedev444 4 дні тому

    signal is most likely NOT compromised, however the amount of oxymorons and false equivalences you try to pass as arguments is astonishing

  • @Joseph-xt2qg
    @Joseph-xt2qg 14 днів тому +1

    Great video and you bring up a lot of good points. FWIW, Tucker Carlson said the US gov found out about his trip to Russia via Signal...

  • @D.von.N
    @D.von.N 21 день тому

    Proton isn't quite transparent in more than one thing. I hoped to get 1GB data on the free plan just by signing up. That I had to fulfil 4 more conditions within 15 days, that wasn't obvious on the sign up website and anywhere. Without that I only have half of it.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +1

      Oh man, so you're complaining about a company that you didn't pay any money to for not giving you everything you wanted?

    • @D.von.N
      @D.von.N 20 днів тому

      @@AllThingsSecured no, misleading advertising. Cheaky. I didn't ask fot it. They offered it. That is different. Hope you aren't doing a law degree.

    • @AdemNecmi
      @AdemNecmi 13 днів тому

      If you check the conditions of the free plan it clearly states “Up to 1 GB Mail storage, start with 500 MB and unlock more storage on the way”.

    • @D.von.N
      @D.von.N 13 днів тому

      @@AdemNecmi yes, I saw that. Not sufficient to inform a potential user what conditions they have to meet to get the promised 1GB 'on the way'.

  • @jamesredfield555
    @jamesredfield555 20 днів тому

    so how do you prove the open source code is the code that is actually being implemented

    • @vikkran401
      @vikkran401 3 дні тому

      Most simple way is just by comparing the checksum & signatures from the repository with the actual program. And if its legit then the source code and program should have the same the exact same checksum. If it doesn't, then there might be something going on

    • @jamesredfield555
      @jamesredfield555 3 дні тому

      @@vikkran401but how would i do that for protons web page not the desktop app, its not like i can just download the html and checksum that lmfao

  • @Simon-us4bn
    @Simon-us4bn 12 днів тому

    It amazes me how many ‘experts’ jump on the lack of metadata encryption when using Proton Mail….email simply doesn’t exist without it.
    If privacy is that important to you, why are you using a method of communication that is - by design - not private?

  • @georgeyoung108
    @georgeyoung108 9 днів тому

    Do you have GAPPS or anything FB on your phone with Signal? Then no app is secure.

  • @FreedomIsNotGoingToBeFree
    @FreedomIsNotGoingToBeFree 9 днів тому

    Open source won't help for the masses in this case as you can't check if the app from the store is running that code or a slightly modified version. Unless you compile it yourself of course.

  • @Canuck-1976
    @Canuck-1976 19 днів тому

    In this case. If the user always used a VPN when signing into Proton and created an account with no identifying "records", as recovery email and name etc. The Proton email account name would exist but if you call it "Gibberish@ proton.. Then nothing would come of it. The IP would just lead to some VPN server. The data is encrypted and Proton say they cannot decrypt it. So it would be Gibberish. This coupled with Proton only as to abide by Swiss government that has good privacy laws. Then there is not much to worry about.

  • @podroznik2214
    @podroznik2214 3 дні тому

    One thing to consider, hide in the crowd approach :)

  • @hypothebai4634
    @hypothebai4634 21 день тому +1

    The biggest problem with Signal is that you need a real phone number to register. A phone number is registered to a person.
    Use Session. This gets around this problem.

    • @AllThingsSecured
      @AllThingsSecured  20 днів тому +3

      Yea, I get that. But now I have to get all my friends and family to use Session too. Not going to happen.

    • @hypothebai4634
      @hypothebai4634 20 днів тому

      @@AllThingsSecured Yes, it is a problem. But the point I was trying to make is that Using Signal instead of ProtonMail gains nothing with respect to hiding a person's identity from government.

    • @vpctech
      @vpctech 20 днів тому

      @@hypothebai4634 : Why compare Signal and Proton? Proton doesn’t offer a standalone messaging app.

    • @stephanhuebner4931
      @stephanhuebner4931 20 днів тому +1

      Convincing regular people to use some obscure solution, no matter how secure it is, is absolutely unrealistic. And there's another viewpoint to this: The fact that you are one of potentially very few people who use said obscure solution makes you and those people an easier approachable target, as you stand out from the countless numbers of people using some other, widely more popular solution.

    • @hypothebai4634
      @hypothebai4634 20 днів тому

      @@stephanhuebner4931 My starting point is that all new solutions initially come from the pool of obscure solutions. And initially convincing regular people to use Solution A rather than solution B is just as hard as convincing them to use solution C rather than solution B.
      I agree that using, for instance, Session over Signal does not allow a user to hide in the long grass. But the thing about systems such as Session is that it is very hard to determine that anybody is using it at all. And Session leaks so little info that who cares if somebody is watching.

  • @readifdumb
    @readifdumb 8 днів тому

    Stories like these just let me know what I should avoid, and help me keep in the loop. It also lets me know the lengths authorities have to go if they need your recovery address and and a 3rd party to help them get your data. If anything that's ensuring, and just lets me know that recovery email is flawed to begin with, just like email is flawed and I should use E2EE messaging apps instead of email for sensitive data.

  • @OldAlastair
    @OldAlastair 21 день тому

    Proton & Signal. So what email to use?

  • @terramoo6936
    @terramoo6936 21 день тому

    get two proton emails that recover to each other?

    • @AllThingsSecured
      @AllThingsSecured  21 день тому

      At least one would have to be set up before you could create the other.

  • @Dk-qf8dd
    @Dk-qf8dd 21 день тому +1

    This is something so basic that so many fail to understand. Some deliberately so.

  • @t2ken
    @t2ken 16 днів тому

    I suggest that the next episode be about the best artificial intelligence services (such as GPT chat and...) that respect user privacy (alternatives to Google Bard)

  • @russellmania5349
    @russellmania5349 4 дні тому

    Proton was forced to disclose what their recovery email was. Why would anyone that uses Proton Mail provide a recovery email. Had the person never set up a recovery email address then Proton would have no data to give.

  • @macbitz
    @macbitz 21 день тому +91

    It amuses me how people seem to be worried that Proton provided an email address in response to a court order and yet didn't seem to care about the subsequent apprehension of a terrorist 🤔 I also saw a UA-camr recently bemoaning the fact that Proton do NOT mine and analyse your emails so that they can serve targetted ads 🤦🏻‍♂ Thank you Josh for being a voice of reason in an increasingly crazy world!

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +1

      Thanks 🙏

    • @TrggrWarning
      @TrggrWarning 21 день тому

      So Proton only provides email addresses of terrorists & draws the line on “for targeted ads” scanning. Folks pay for some of their products, which helps everyone bypass ads.
      Also, for a good percentage of users are “free” which tends to mean they, their data, is still the product.
      So, your phrasing leaves a lot to the imagination, providing email addressees, merely addresses? Sure seems pointless.
      If they are scanning, but NOT for ad placement, why? To find email addresses of terrorists? Lol wat?

    • @AllThingsSecured
      @AllThingsSecured  21 день тому +3

      Confusing comment. Please stay on one topic for goodness sake.
      What makes you say that Proton is scanning? Where are you getting this?

    • @robmcewen4621
      @robmcewen4621 21 день тому +17

      @AllThingsSecured read his comment again more carefully. You're misinterpreting what he said about scanning. He's not claiming that proton scans emails. He was referring to how crazy it was... that he saw somebody complaining about Proton not scanning emails.

    • @bnalive5077
      @bnalive5077 21 день тому +26

      One groups “terrorist” is another groups freedom fighter. So yeah, privacy is privacy…….

  • @davidswanson9269
    @davidswanson9269 21 день тому

    If you know you are going into nefarious activities, you must already understand your communications pathways are already compromised to various degrees thus you have to practice opsec, comsec and offline encryption one time pads. Nature of the old school operative game, tradecraft.

  • @idib1739
    @idib1739 21 день тому

    Thanx for the Video, I'm fine with Proton but after what happened with Tucker Carlson i just can't trust Signal anymore...🤷‍♂

  • @janovmi2
    @janovmi2 9 днів тому

    i use those not because i need to be absolutely anonymous from the gov, but because i dont want to deal and be spied on by the big tech
    also privacy and security isnt supposed to shield you for doing illegal stuff

  • @Sunrise-d819i2
    @Sunrise-d819i2 21 день тому

    yea, none this effects the platforms for me. all I care about is my messages being read by companies workers/ad targeting, my IP is public, and ect. all this hysteria over nothing.

  • @steponmeirene
    @steponmeirene 17 днів тому

    Naomi Wu did a very good breakdown of why Signal isn't a secure app, before she got vanned by the Chinese government for talking too much. In fact it was probably her discovering and making public those vulnerabilities that led directly to her vanning.

  • @yee-7o7
    @yee-7o7 18 днів тому

    thanks for clarifying that, good point.