this post was submitted on 19 Feb 2024
95 points (100.0% liked)

Privacy Guides

16813 readers
1 users here now

In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.

This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.


You can subscribe to this community from any Kbin or Lemmy instance:

Learn more...


Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!

Want to get involved? The website is open-source on GitHub, and your help would be appreciated!


This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.


Moderation Rules:

  1. We prefer posting about open-source software whenever possible.
  2. This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
  3. No soliciting engagement: Don't ask for upvotes, follows, etc.
  4. Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
  5. Be civil, no violence, hate speech. Assume people here are posting in good faith.
  6. Don't repost topics which have already been covered here.
  7. News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
  8. Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
  9. No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
  10. No misinformation: Extraordinary claims must be matched with evidence.
  11. Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
  12. General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.

Additional Resources:

founded 1 year ago
MODERATORS
 

From 2019, but still [this fullstop signals not only the end of that sentence, but also the end of this statement]. And here [those two words indicate that new information/context is being added; it is being indicated that we now no longer talk about the article, which the uneditorialized post title references and the post link leads to] something a bit more recent about the glorious “swiss privacy” [this makes it further clear that the following is about swiss privacy in general and not about Proton] https://www.republik.ch/2024/01/09/der-bund-ueberwacht-uns-alle

key points

[they were added because the main article is about Proton and written in english and because OP assumed that most in here are unable to read german and care less about general swiss privacy than they do care about Proton]

  • New reporting based on documents and court records shows that since 2017, the internet traffic of Swiss citizens has been massively monitored and read when it crosses borders, which happens routinely even for communication within Switzerland.

  • The intelligence service's claims that purely domestic Swiss internet traffic is collected are false, given how internet routing actually works. Traffic flows across borders dynamically, not through static "cables" as claimed.

  • All data is stored and searched, including retrospectively, meaning the intelligence service builds an ever growing haystack of private communication to dig through. This includes communication from journalists and lawyers that should be protected.

  • In 2023, steps were taken to expand monitoring further by requiring more Swiss internet providers to enable access to their infrastructure, including providers that don't directly deal with cross-border traffic. This contradicts previous claims about how the monitoring would work.

  • Critics argue this invalidates assurances given earlier by the government and intelligence officials and constitutes mass surveillance that violates civil liberties. There are plans in 2024 to revise the intelligence law again, possibly to retroactively legalize monitoring practices already occurring.

you are viewing a single comment's thread
view the rest of the comments
[–] FuckyWucky@hexbear.net 17 points 9 months ago (2 children)

Ok isn't there still TLS encryption on top? Even if the Swiss Government were to tap ISP routers they won't see much.

[–] birdcat@lemmy.ml 7 points 9 months ago

my inability to answer that question makes me consider to apply for a job in the swiss secret service.

[–] Lojcs@lemm.ee 1 points 9 months ago

Isn't tls just strong enough that by the time it takes to crack a packet its contents will be irrelevant? If they're keeping past records they could focus on key connections and hope to stumble on something important

I might be thinking of something else