{"id":19157,"date":"2022-05-28T19:08:17","date_gmt":"2022-05-29T03:08:17","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12890\/"},"modified":"2022-05-28T19:08:17","modified_gmt":"2022-05-29T03:08:17","slug":"news-12890","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2022\/05\/28\/news-12890\/","title":{"rendered":"Proton Is Trying to Become Google\u2014Without Your Data"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628d53d164f6937ef8df9005\/master\/pass\/Andy-Yen-Proton-Security-GettyImages-1236341455.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gilad Edelman| Date: Wed, 25 May 2022 10:00:00 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/gilad-edelman\">Gilad Edelman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">Since its founding<\/span> in 2014, <a href=\"https:\/\/www.wired.com\/story\/the-best-privacy-app-alternatives\/\">ProtonMail<\/a> has become synonymous with user-friendly encrypted email. Now the company is trying to be synonymous with a whole lot more. On Wednesday morning, it announced that it\u2019s changing its name to, simply, Proton\u2014a nod at its broader ambitions within the universe of online privacy. The company will now offer an \u201cecosystem\u201d of linked products, all accessed via one paid subscription. Proton subscribers will have access not just to encrypted email, but also an encrypted calendar, file storage platform, and VPN.<\/p>\n<p>This content can also be viewed on the site it <a href=\"https:\/\/player.spokenlayer.net\/v1-wired-security?__v=linear&amp;url=http:\/\/www.wired.com\/story\/proton-mail-calendar-drive-vpn\" target=\"_blank\" rel=\"nofollow noreferrer\" class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA ConsentBannerLink-godHGj eTiIvU fhieGc hyLauq\">originates<\/a> from.<\/p>\n<p class=\"paywall\">This is all part of CEO Andy Yen\u2019s master plan to give Proton something close to a fighting chance against tech giants like Google. A Taiwanese-born former particle physicist, Yen moved to Geneva, Switzerland, after grad school to work at CERN, the nuclear research facility. Geneva proved a natural place to pivot to a privacy-focused startup, thanks to both Switzerland\u2019s privacy-friendly legal regime and to a steady crop of poachable physicists. Today, Yen presides over a company with more than 400 employees and nearly 70 million users. He recently spoke to WIRED about the enduring need for greater privacy, the dangers of Apple&#x27;s and Google&#x27;s dominance, and how today\u2019s attacks on encryption recall the rhetorical tactics of the War on Terror.<\/p>\n<p class=\"paywall\">This interview has been condensed and lightly edited.<\/p>\n<p class=\"paywall\"><strong>WIRED: You&#x27;re in the online privacy business. To start super broadly, how do you define privacy?<\/strong><\/p>\n<p class=\"paywall\"><strong>Andy Yen<\/strong>: These days, all Google and Apple and Big Tech talk about is privacy, so the best way to give our definition is to give the contrast. The way Google defines privacy is, \u201cNobody can exploit your data, except for us.\u201d Our definition is cleaner, more simple, and more authentic: Nobody can exploit your data\u2014period. We literally want to build things that give us access to as little data as possible. The use of end-to-end encryption and zero-access encryption allows that. Because fundamentally, we believe the best way to protect user data is to not have it in the first place.<\/p>\n<p class=\"paywall\"><strong>If you ask someone, \u201cWould you like more privacy or less?\u201d they always say more. But if you watch how people actually behave, for most people, data privacy is not a very high priority. Why do you think that is?<\/strong><\/p>\n<p class=\"paywall\">Privacy is inherent to being human. We have curtains on the windows, we have locks on our doors. But we tend to disconnect the digital world from the physical world. So if you take the analogy of Google, it&#x27;s someone that&#x27;s following you around every single day, recording everything that you say and every place you visit. In real life, we would never tolerate that. On the internet, somehow, because it&#x27;s not visible, we tend to think that it&#x27;s not there. But the surveillance that you don&#x27;t notice tends to be far more insidious than the one that you do.<\/p>\n<p class=\"paywall\"><strong>Your company has come out in support of reforms to strengthen antitrust enforcement. But a lot of people argue that privacy and competition are in conflict. Apple will say, \u201cIf you force us to allow more competition on the platform that we run, then that will reduce our control over the security and the privacy of the user. So if you make us increase competition, that will bring privacy down.\u201d And then you see the flip side of the argument, which is when Apple or Google implements some new privacy feature that may hurt competitors. How do you think about these potential conflicts?<\/strong><\/p>\n<p class=\"paywall\">What Apple is basically claiming is, you need to let us continue our use of app store practices because we&#x27;re the only company in the world that can get privacy right. It\u2019s an attempt to monopolize privacy, which I don\u2019t think makes any sense.<\/p>\n<p class=\"paywall\">If you look at the <a href=\"https:\/\/www.wired.com\/story\/facebook-ftc-antitrust-case-smoking-gun\/\">FTC lawsuit against Facebook<\/a>, the theory is that privacy and competition are two sides of the same coin. If you&#x27;re not happy with Facebook&#x27;s privacy practices, what is the alternative social media that you can go to other than Facebook and Instagram? You don&#x27;t really have that many options. We need more players out there. If they had to compete, then competition would force privacy to be a selling point.<\/p>\n<p class=\"paywall\">The same is true for other services that we offer. Today, Google controls the Android operating system, which is used by the majority of people, and they can preload all their applications as a default on your user devices. So they have a massive advantage already because users don&#x27;t change the defaults. So even though their privacy practices are quite terrible for most people, there&#x27;s no real pressure to change it because the alternatives don&#x27;t really exist. And if they do exist, Google&#x27;s able to hide them, because they set the defaults on their devices. So if you want to fix the privacy issue, the best way to do it is to have more competition, because then there will be user choice, and users tend to choose what is more private, because, as you said, everybody wants more privacy.<\/p>\n<p class=\"paywall\"><strong>Europe\u2019s new Digital Market Act has a controversial section requiring the biggest messaging platforms to let competitors interoperate with them, while still preserving end-to-end encryption. But quite a lot of people<\/strong> <a href=\"https:\/\/www.wired.com\/story\/dma-interoperability-messaging-imessage-whatsapp\/\"><strong>argue<\/strong><\/a> <strong>that you can&#x27;t actually do both of those things. So here&#x27;s a place where privacy and competition really do seem to be conflicting with each other technologically.<\/strong><\/p>\n<p class=\"paywall\">I have to say, this has been around <a href=\"https:\/\/www.wired.com\/1994\/11\/cypher-wars\/\">since the early &#x27;90s<\/a>. PGP is basically interoperable encryption, based on the email standard. So it may not be technologically the easiest to do. But to say it\u2019s technologically impossible is also not correct.<\/p>\n<p class=\"paywall\"><a href=\"https:\/\/www.wired.com\/story\/europe-csam-scanning-law-chat-encryption\/\"><strong>Another EU proposal<\/strong><\/a> <strong>would require companies to implement methods of detecting child sex abuse material, or CSAM, on their platforms. People are very alarmed about the implications of that for encryption.<\/strong><\/p>\n<p class=\"paywall\">We&#x27;re still in the process of analyzing it, so I can\u2019t comment specifically on the details of the proposal. But these proposals are not new. In fact, they&#x27;ve been coming up in various forms over the past decade. What is novel and different this time is that these proposals used to be packaged under \u201cterrorism.\u201d Now, they\u2019re packaged under CSAM. It was very clever to repackage this idea into a topic that is even more toxic, which makes informed debate difficult. Obviously, CSAM is a horrible problem, something that the world is better without. But a wholesale attack on encryption can have unforeseeable consequences that are not always completely understood or considered by the drafters of these proposals.<\/p>\n<p class=\"paywall\"><strong>Do you think that this<\/strong> <em><strong>is<\/strong><\/em> <strong>a wholesale attack on encryption, though? The people making these proposals say, \u201cWe&#x27;re not attacking encryption. You just have to figure out a way to monitor for CSAM.\u201d<\/strong><\/p>\n<p class=\"paywall\">Well, there is really no practical way in today&#x27;s technology to do that in a way that doesn&#x27;t weaken encryption.<\/p>\n<p class=\"paywall\"><strong>The analogy to terrorism is interesting because, during the Bush-era War on Terror, there was a sense of literally anything being justified in the name of stopping terrorism. The US government was secretly spying on its own citizens. It was really hard to argue that we have to accept that some terrorism is going to happen. It&#x27;s even harder to say, look, we&#x27;ve got to accept that some amount of child exploitation is going to happen and people are going to use digital tools to spread it. But at some point, I think you do have to defend the principle that we have to tolerate a certain amount of even the very worst things if we want to have meaningful civil liberties.<\/strong><\/p>\n<p class=\"paywall\">If there was no privacy in the world, that world would be more \u201csecure.\u201d But that world does exist; it&#x27;s called North Korea. And the people that live there probably don&#x27;t feel very secure. As a democracy, you have to strike the right balance. The balance is not total mass surveillance of everybody, because we know that there are serious consequences to democracy and freedom as a result of that. It&#x27;s not easy to find the right balance. But during the Bush years, with terrorism, I think they went to an extreme that really was a backsliding on democracy. And this is something that we need to avoid.<\/p>\n<p class=\"paywall\"><strong>But then on the flip side,<\/strong> <a href=\"https:\/\/www.wired.com\/story\/tracers-in-the-dark-welcome-to-video-crypto-anonymity-myth\/\"><strong>you read stories<\/strong><\/a> <strong>about law enforcement catching really bad criminals, and in a lot of those stories, if that person had used a Tor browser and a ProtonMail account and a VPN, and so on, they might not have been caught. Do you ever worry about a future where all the bad guys get smart enough to use the best privacy tools, and it becomes too easy to evade the legal system entirely?<\/strong><\/p>\n<p class=\"paywall\">Well, encryption and privacy technologies are what I would call dual-use. What is law enforcement also concerned about these days? People\u2019s information being stolen, sensitive communications being hacked, emails of political campaigns being stolen by state actors and disseminated to shift the political balance. In order to prevent all of those potential ills, you need privacy, encryption, and good security. So, the same tools that people in law enforcement criticize are actually the same things that are shielding a lot of the internet ecosystem and the economy from a disastrous outcome. If you were to weaken or prohibit all of these security tools and privacy tools, then you would open the floodgate to a massive amount of cybercrime and data breaches.<\/p>\n<p class=\"paywall\"><strong>Proton has grown a lot over the years, but it\u2019s still basically a rounding error compared to something like Google. We\u2019ve talked about competition from a regulatory perspective, but on a practical level, how do you even try to compete with your massive rivals?<\/strong><\/p>\n<p class=\"paywall\">The current plan is the launch of the Proton ecosystem. It&#x27;s one account that gives you access to four privacy services: Proton Mail, Proton Calendar, Proton Drive, and Proton VPN. One subscription that gives you access to all those services. It&#x27;s the first time anybody has taken a series of privacy services and combined them to form a consolidated ecosystem. That doesn&#x27;t match all of Big Tech\u2019s offerings, of course. But I think it provides, for the first time, a viable alternative that lets people say, \u201cIf I really want to get off of Google, I can now do it, because I have enough components to live a lot of my daily life.\u201d For the first time, you\u2019ll have a privacy option that\u2019s not fully competitive with Google, but reasonably competitive, and that will start to break the dam. I don&#x27;t know how it will go, but I think this is the future of privacy, and that\u2019s why we&#x27;re doing it.<\/p>\n<p class=\"paywall\"><strong>This is probably the first time I have ever thought about having an encrypted calendar.<\/strong><\/p>\n<p class=\"paywall\">A calendar is essentially a record of your life: everybody you&#x27;ve met, everywhere you\u2019ve been, everything that you have done. It&#x27;s extremely sensitive. So you don&#x27;t intuitively think about protecting that, but actually, it&#x27;s essential.<\/p>\n<p class=\"paywall\"><strong>And by making that encrypted, who am I protecting that information from?<\/strong><\/p>\n<p class=\"paywall\">Maybe it&#x27;s the government requesting information on you. Maybe it&#x27;s a data leak. Maybe it&#x27;s a change in business model of your cloud provider at some point in the future that decides that they want to monetize user data in a different way. Your data is just one acquisition away from going across the border to a country that you didn&#x27;t expect when you signed up for the service.<\/p>\n<p class=\"paywall\"><strong>Right. Elon Musk is about to own all my Twitter DMs.<\/strong><\/p>\n<p class=\"paywall\">Exactly right. And with end-to-end encryption, no matter what happens, it&#x27;s your data; you control it. It&#x27;s just a mathematical guarantee.<\/p>\n<p class=\"paywall\"><strong>But what if I move all my stuff to the Proton ecosystem, and then like four years from now, you go out of business? What happens to my stuff?<\/strong><\/p>\n<p class=\"paywall\">Proton has been around for eight years now. In the tech space, that&#x27;s a long time. I think an indicator of what is sustainable in the long term is alignment between the business and the customers. Our business model is simple: Premium users pay us to keep their data private, and our only incentive is to keep it private. Sometimes the easiest and simplest models are the ones that are the most durable. I strongly believe that Proton will be a company that outlives us.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/proton-mail-calendar-drive-vpn\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/628d53d164f6937ef8df9005\/master\/pass\/Andy-Yen-Proton-Security-GettyImages-1236341455.jpg\"\/><\/p>\n<p><strong>Credit to Author: Gilad Edelman| Date: Wed, 25 May 2022 10:00:00 +0000<\/strong><\/p>\n<p>The encrypted-email company, popular with security-conscious users, has a plan to go mainstream.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21382,21357],"class_list":["post-19157","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-privacy","tag-security-security-news"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19157","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19157"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19157\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19157"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19157"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19157"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}