- cross-posted to:
- privacyguides@lemmy.one
- cross-posted to:
- privacyguides@lemmy.one
In that particular case they did need to log the ip because they were compelled to do so by a Swiss court.
That was an opsec failure on the user, if they used a VPN or Tor they would not have been caught.
A VPN would’ve only shifted the “blame” unless it was a decent one like IVPN.
Tor would’ve been much better, especially considering Proton has an
.onion
address.Yes, by VPN I meant something decent. Not whatever spyware is top on the Play Store for circumventing geoblocks.
They were already using Proton Mail, they just were probably thinking that was enough. It would have been if the French had not been able to convince a Swiss court that their request was valid.
So couldn’t a court compel the VPN to log all IPs and then use some FISA level shit to prevent the VPN from alerting users?
There’s been a handful of VPN cases taken to court where they have proved, at that moment in time, that they had no logs to hand over. But why not take it that last step and compel the change then?
That’s a good question. I know good vpns like mullvad do not and can not log ips/traffic without changes to their backend, I wonder if they could claim “it’s impossible” or something (clearly bogus, but the argument could be “with our current infrastructure, I.e. We can’t afford to redo our systems to comply”)
US Gov: Here’s a blank cheque, make it happen.
But really, the best I can come up with given this is clearly not impossible, is it would destroy the business, but I still think FISA could somehow bypass that given how broad and secret it is.