Privacy Guides
In the digital age, protecting your personal information might seem like an impossible task. We’re here to help.
This is a community for sharing news about privacy, posting information about cool privacy tools and services, and getting advice about your privacy journey.
You can subscribe to this community from any Kbin or Lemmy instance:
Check out our website at privacyguides.org before asking your questions here. We've tried answering the common questions and recommendations there!
Want to get involved? The website is open-source on GitHub, and your help would be appreciated!
This community is the "official" Privacy Guides community on Lemmy, which can be verified here. Other "Privacy Guides" communities on other Lemmy servers are not moderated by this team or associated with the website.
Moderation Rules:
- We prefer posting about open-source software whenever possible.
- This is not the place for self-promotion if you are not listed on privacyguides.org. If you want to be listed, make a suggestion on our forum first.
- No soliciting engagement: Don't ask for upvotes, follows, etc.
- Surveys, Fundraising, and Petitions must be pre-approved by the mod team.
- Be civil, no violence, hate speech. Assume people here are posting in good faith.
- Don't repost topics which have already been covered here.
- News posts must be related to privacy and security, and your post title must match the article headline exactly. Do not editorialize titles, you can post your opinions in the post body or a comment.
- Memes/images/video posts that could be summarized as text explanations should not be posted. Infographics and conference talks from reputable sources are acceptable.
- No help vampires: This is not a tech support subreddit, don't abuse our community's willingness to help. Questions related to privacy, security or privacy/security related software and their configurations are acceptable.
- No misinformation: Extraordinary claims must be matched with evidence.
- Do not post about VPNs or cryptocurrencies which are not listed on privacyguides.org. See Rule 2 for info on adding new recommendations to the website.
- General guides or software lists are not permitted. Original sources and research about specific topics are allowed as long as they are high quality and factual. We are not providing a platform for poorly-vetted, out-of-date or conflicting recommendations.
Additional Resources:
- EFF: Surveillance Self-Defense
- Consumer Reports Security Planner
- Jonah Aragon (YouTube)
- r/Privacy
- Big Ass Data Broker Opt-Out List
view the rest of the comments
Sounds like an avoidable problem, that Proton didn't have a whole lot to fight it with. Obviously they could/should have fought it in court, but this could have been avoided if the individual simply didn't link a recovery email and/or didn't share the same email across Apple products + protesting. Although, the article does point out that if you sign up over Tor or a VPN it requires a verification email, which sucks- ~~though you could just use a temporary email address to get around it.~~ As CaptObvious pointed out (literally @CaptObvious@literature.cafe lmfao) the reporter pointed out Proton rejects temporary emails.
Key information:
Comment from Proton:
The reporter noted that disposable verification addresses are rejected by Proton.
You can simply use either: a different protonmail address or a similar service like tutanota.
And how do you get either of those using a throwaway verification account?
I mean, suit yourself if you insist that you can or only want to do it with a throwaway. I'm saying you can do it with similar services like tutanota as the failover address, eliminating the need for a throwaway.
My bad. I thought Tuta also required a verification email when I created an account several years ago. Just tried it, and they don't appear to these days. Good to know. Thanks.
Ah, my bad, I'll edit my comment.
It feels a little like we're playing Whack-a-Mole with threading multiple email providers here. :)
The handle is a hobby nickname, by the way. My wife started calling me that as a trail name several years ago, and it stuck.
I don't know if what I do is the right way around this but, as stated Proton will reject disposable verification emails and you cannot use another proton account to verify a new one.
My workaround for this is to verify proton with a Tutanota account which is also created with as little to no identifiable information as possible.
TLDR: Proton accepts Tuta emails for verification and Tuta emails can be created anonymously.
Which leads to the next logical question: Why not just use Tuta in the first place?
Valid point. I do prefer the UI with Proton, I find it nicer to click through. Also, Tuta usually makes you wait 2-3 days before you can use it - not a big deal really, unless you're trying to sign up for something new.
There was no wait period when I signed up for their service, but that was several years ago. Things always change.
How does Tuta compare to Proton on the root complaint of this post?
https://tuta.com/blog/transparency-report
Other than not requiring a second email address linked to their service, being covered by German rather than Swiss law, actually fighting back against information requests, and not sucking up to the Chinese Communist Party, Tuta is probably fairly similar. Those differences, though, are persuasive.
@CaptObvious @OnePhoenix
Don't put all eggs in one basket?
Always good advice. But at least make the second basket one that you can trust. Proton ain't it.
Sounds pretty messed up.