I notice that they traced the user using his recovery email.
I have not set a proton recovery email or phone number. Nonetheless, I expect the NSA decrypts 100% of proton mail and identifies the IP addresses and real identities of every user and mail.
If you want anonymity, don’t use bits and bytes.
There are many ways around this. Hackers use them all the time.
You might be OK with a well secured laptop/desktop, writing the bits and bytes to a thumb drive or burning a DVD, and handing it to someone.
Touch the Internet? All bets are off.
I expect the NSA operates ProtonMail as a honeypot.
If you want privacy and electronic communication 1. Write your message in a txt file. 2. Get your recipient’s GPG public key. 3. Encrypt the text file with GPG encryption. 4. Send the message. GPG is unbreakable under the current technology. The government has been pressuring the developers of GPG to put in a back door so that they can spy on their citizens, and to the best of my knowledge there is currently no back door. PGP which is a commercial product that uses the same algorithms has been under the same pressure, ut I don’t know if they’ve caved in or not.
Bump!
Yep. The illusion of online security only protects you from the casual criminal and does nothing against the professional criminals in either the private or government sectors.