Is it possible to have Privacy in 2024? I ask Andy Yen (CEO of Proton) this and other very important questions about being anonymous and private on the Internet in 2024. // Books Mentioned // Extreme Privacy: What it takes to disappear by Michael Bazzell: amzn.to/3Hcz23m Linux Basics for Hackers by Occupy the Web: amzn.to/3RUC69d How to Hack like a Ghost by Sparc Flow: amzn.to/3NS8WWY If it’s smart, it’s vulnerable by Mikko Hypponen: amzn.to/4aGV2AK // Proton Affiliate LINKS // Proton Mail: go.getproton.me/SHs9 Proton VPN: go.getproton.me/SHsA // Andy’s SOCIAL // X: twitter.com/andyyen Proton Blog: proton.me/blog/author/ayen LinkedIn: www.linkedin.com/in/andy-yen-03a9676/ // David's SOCIAL // Discord: discord.com/invite/usKSyzb X / Twitter: twitter.com/davidbombal Instagram: instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal RUclips: www.youtube.com/@davidbombal // MY STUFF // www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 00:00 - Coming up 00:45 - Andy Yen, CEO of Proton // How Proton started 03:52 - Recommended books 04:31 - Is it possible to have privacy in 2024? 07:36 - Privacy vs Anonymity 09:39 - "Privacy is a human need" 10:41 - How to be more private 11:53 - Google's business model 13:45 - How to be more private (continued) 15:20 - How Apple uses your data 16:51 - The Proton and French activist case 20:52 - Proton Mail's encryption explained 23:14 - The Proton and French activist case (continued) 25:48 - The UK Online Safety Act explained 32:15 - How Proton's public keys work 36:51 - No logs on Proton VPN 38:41 - Switzerland and their privacy laws 40:25 - TOR vs VPN 43:32 - Proton's ecosystem 45:20 - Proton Pass and Proton Sentinel // Leaked passwords 52:42 - Basics on how to get privacy in 2024 57:02 - Advanced ways to get privacy 01:03:13 - Recommended messaging apps 01:06:19 - The worry of A.I. in 2024 01:07:58 - Why encryption in email is needed // SMTP (Simple Mail Transfer Protocol) explained 01:11:12 - Proton vs Google 01:13:28 - Conclusion vpn proton mail proton vpn proton tor proxy chains linux android iphone ios tails tails linux invisible online hide identity privacy kali linux online privacy internet security online privacy and security online privacy tips online privacy guide internet security tutorial Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Keep spreading content David your amazing man! And on mission I see! Keep doing u and help trying come up with security and privacy for us human beings! Pls. And I stand firmly behind you!… And stay strong and always look out for the next man! Godspeed.
great interview david thanks . any chance you could do an interview with a cypher punk ? i think cypher punks have done so much for privacy and open source internet from the verry beginning . but noone even knows who they are and that is such a shame . i think anyone in this kind of community should know what it even is .
its called cypher punks . he was one when he started out so im not surprised he kept some of those ideals later on. you should look up what cypher punks are . its thanks to them that internet was open source and not a government owned thing
@boxcarhobo8315 SteveWozniak doesn’t run this company, We are Talk in Billionaire & Trillions Battles here. @DavidBombel. WHY my company Made BIGtech a the USA, Change it all? Ground-Zero.
Indeed, and Andy doesn't make that very clear, and I'm not even sure if he actually fully understood or thoroughly thought about what he said. The things we (necessarily) hide are the ways to access places where people can interfere with us, such as passwords, pin numbers. Everyone has things they can lose, even if it's just that 20 bucks you wanted to spend on a gift. If you thought you had it and someone stole it, that will piss you off. If it happens once, you'll recover and use another 20 bucks, but if people have access to your email and bank account and you never know how much money you actually have, that's unlivable. You're not hiding your money, we just like to have some control and reliability.
It's very rare to see a CEO that acknowledges the possibility that Proton would eventuality get breached, not in the matter of If but When. Ego and ignorance is most big companies downfall and Andy knows it so I can see Proton making it far in the future. Hopefully we will get like an Office Suite from Proton
Can't wait for Proton Docs...which I hope will come in 2024. Thanks for an fantastic channel and great interview! There are a lot of struggle in my life at the moment, but your intonation always infuses me with hope and more connection with my future self. Thank you David!
I love this man, he is honest and so technical, and his vision is crystal clear without zero doubt in mind and soul. This kinda people are always makes hope for the people are are really concerned about privacy for generations. God bless you.
Just when I thought there is no more hope left for online privacy, I watched this video and I signed up with Proton. Thanks guys, you are real life savers!!
Thank you David, this was one great video you have put up. Thank you for just being who you are, I enjoy watching your videos and interviews. Keep up the good work!
Even the most private mailing and messaging services can become a honeypots when authorities force them legally to turn the data and no matters how encrypted your data can be if they can scan your data before encryption or on the recipient side after decryption, windows and mac are to the brim of black boxes, for privacy it is better to use any open source OSs.
I want to thank you for having such an incredible channel that is extremely informative. I have been in the computer business since 1967 working in the consulting field, I was placed on the COBOL F compiler team to help debug and correct any bugs that was discovered ( I am aging myself). Because of your channel, I started to learn about hacking since I wanted to understand how these individuals penetrate networks. I have recommended your channel to so many young professionals to further their education and everyone contacted me to tell me thank you for your channel. Keep up the great work Mr. Bombal you are providing everyone with a great education.
If one uses any technology, there is no security at all,, all modern telecom, computers, gadgets, are built on architecture in favour of creator, and not users..it was always left to creator right since start, what to do with the service or tech provided to users, nothing to prevent the creators if any misused happened. Still today, despite all sugar coating, there is no security at all if one uses any modern tech. No privacy exists in reality.
Great Interview, I enjoyed it a lot! And you are a great interviewer, good questions and not to much talking in between, for me just the right amount 👍🏻
The other day, I searched "David Bombal one eye up" because I couldn't find the name of the specific video, I really thought that the thumbnail was funny. Since then, he has dropped two videos with that thumbnail, with this one being one of them. 😂
I never thought I would watch this type of video for more than an hour, very informative, great minds, really like the way he explains things logically, thank you very much ❤
Amazing chat, very informative hooked to this all the way through. Definitely going to try to move to proton, free model first then pay if it's actually usable. Keep these convos coming, enjoying your content, thanks 👍
thanks man I'm learning a lot from you and your channel you making great empact on the online world and we benefiting and getting more knowledge and awareness on the internet .. I'm still new learning and interested about linux and hacking and passion to understand how lot of things work and caring about privacy too ..
look up what cypher punks are . they are the people talking the most about this exact topic . they are the reason the internet is open source and not owned by governments . wikileaks etc was also examples of cypher punks work .
David, this was such a great interview, and as someone who’s quite concerned about privacy, this interview is right up my alley. I’ve got friends that will sometimes spout the same bullcrap about not needing privacy, and I can’t help but shake my head. I’m on IOS, and fairly into the ecosystem, but my vehicle I drive has android auto and GM Onstar. Aside from ripping it all out or just disabling the entire infotainment system, what options are really available for me? I have gmail account that exists solely for android auto and the built in google maps.
At 21:13, he says "data" comes in and is then encrypted by the users public key. TLS is used in transit, the encryption ceases when the payload is at REST on Proton Mail servers. So if proton mail can encrypt the email at a certain point, then they can read it in clear text prior to encryption no? There was a bit of confusion at 23:05, and it was unclear how the key distribution occurred or where the private key was held. It would be good to have a follow-up to see if ProntonMail ever can see the clear text before encryption
If a Proton user sends mail to another Proton user, the sender will encrypt the message with the receiver's public key. If a user on another mail service sends an email to a Proton user, the mail will not be encrypted in transit, but Proton will store it encrypted.
Can't recall if it's mentioned in this but people should also avoid cross-site authentication (so where you log into a news or other site with FB's credential system). I recall linked accounts being one of the key attack methods used by a group who wanted to steal a prized Twitter handle from a journalist, they got in through another app using social engineering and eventually to his Apple ecosystem where they were able to destroy EVERYTHING - phone, tablet, Macbook, server, apparently even his backups. This article was from some time back but still the principle applies I think.
It would be great if people like Andy Yen, Michael Bazzel, Edward Snowden, Daniel Micay and like minded professionals would design and manufacture a new privacy phone and operating system for phones and computers. No need to De-Google a phone or accept a poisonous Apple from any tech Queen. While there are operating systems like Graphene, Google still gets a hardware sale from their Pixel devices. Virtually every keystroke on our computer is tracked by the leading hardware & software manufacturers. Governments all over the world demand access to every thought in the name of “security” and public “safety”….the list of invasive acts is getting longer by the day.
Excellent talk, and VERY revealing! I've been a Proton customer for about 6 years, I fired Google once I learned all this info (except RUclips, obviously). So WHEN will Proton release a web browser?
Proton is a good source but it's no different than using any other email client if you don't use use the keys to encrypt your messages. Yeah sure Proton has the option to set a login and mailbox password but that does not encrypt your messages. You have to do this task manually and pass the encryption keys to the ones you communicate with and they must be using Proton also with their own keys or else there is no encryption what so ever and anyone can read your messages and track you even if you use Tor with Proton which includes the Proton onion relays it does zero even if you pay for the premium you must setup the encryption manually.
@@davidbombal David…thanks the reply, I finally finished the interview. Your advice was to be patient opened another path. The issue I’m trying to resolve (privacy) can only be attained by using bandaids, when we really need surgery. Thanks for listening, I enjoy all your interviews especially OTW. Bruce
I do love the way he talks about security and i thank you for opening this up for people, I agree about keeping yourself safe and i love the fact we can do that but to a certain degree you are telling people what to do to commit crime and get away with it no ? as there will be no logs or way the authorities can use anything to get the data (if needed) ?
Great interview David, you talked about the Swiss law and the no log policy of Proton. What happens if I connect to a VPN server that’s located in the US or somewhere else outside of Swiss. Do these laws still apply, or is it dependent on where I exit the VPN? Thank you.
Google already has a profile on everyone and their search habits once they began to grow Sure you can switch, but Google still has your information. Are they going to delete it? Ever? 2FA(two factor authentication) on your phone is a potential major headache if you get your phone stolen, lose it, drop it in the lake, etc. Now accessing your accounts becomes a big problem.
very interesting video, I personally use and likes proton mail and vpn services. but at the end of the road, whatever privacy and security you are mentioning is not for everybody, if you get rid of google, Gmail, Facebook and go to Linux instead of IOS or Windows. there is no way you escape from being watch. cellphone company watch and record you, ISP provider also, google, even the apps you installed on your mobile are constantly watching you. So, getting out of few services will not make any difference. all browsers are getting cookies and keeping your info, even they say it is private. so, who is going to change everything to make they lives more difficult but still getting watch by other services, companies, browsers, telephone companies etc. we need to learn how to live without privacy, and monitor everything daily to detect if something is not right. the only way to be secure if coming back to cavemens . good video David good information.
Hey David, Would it be possible for you to make a comprehensive video for CISSP? I'm totally new in the realm of Cyber, and Which books should I start to prepare to be ready to read for the CISSP domain? I mean the pre-requisites of CISSP and that guideline.
I wonder how come that RUclips is not mentioned in this interview as a Google asset? By watching these videos we expose our details to Google exactly like when using Gmail, I am sure. A solution might be moving to Rumble maybe? Somehow I can only see 6 videos from David there. Rob Braxman, who is quite privacy addict is there, Naomi Brockwell too.
In order to be private or anonymous in real life you need to build your own device& gadgets,your own apps and your own network which is not possible for a indivisual ,so there is no chance that you can be anonymous or private, there will always be someone watching your moves on the internet ,though you use any type of marketing bullshit.These marketing gimics will only work against indivisual like us working on limited resources.
A government's interest isn't always criminal issues. It could be security, or a patent they want to bring into the black world - with our without compensation, the target could be on a terrorist list, or it can be corporate espionage, or other reasons. To assume that because you're not a criminal they wouldn't target your data is not true.
There will always be countermeasures to circumvent privacy and anonymity. It’s huge money. Just comes down to how interesting one is to use such methods on. For average law abiding citizen risk is very low.
Great stuff, Proton has my trust, thanks for bringing him and for the preparation you put in for the interview, great questions. Also, it's so useful when you make recaps of the answers he gives, it helps so much to make everything clear.
, big fan of your videos! You're like a teacher to me. Could you consider making a video on MITMA and HTTP spoofing? I'm sure it would be super informative and helpful! Keep up the awesome content!"
Is it possible to have Privacy in 2024? I ask Andy Yen (CEO of Proton) this and other very important questions about being anonymous and private on the Internet in 2024.
// Books Mentioned //
Extreme Privacy: What it takes to disappear by Michael Bazzell: amzn.to/3Hcz23m
Linux Basics for Hackers by Occupy the Web: amzn.to/3RUC69d
How to Hack like a Ghost by Sparc Flow: amzn.to/3NS8WWY
If it’s smart, it’s vulnerable by Mikko Hypponen: amzn.to/4aGV2AK
// Proton Affiliate LINKS //
Proton Mail: go.getproton.me/SHs9
Proton VPN: go.getproton.me/SHsA
// Andy’s SOCIAL //
X: twitter.com/andyyen
Proton Blog: proton.me/blog/author/ayen
LinkedIn: www.linkedin.com/in/andy-yen-03a9676/
// David's SOCIAL //
Discord: discord.com/invite/usKSyzb
X / Twitter: twitter.com/davidbombal
Instagram: instagram.com/davidbombal
LinkedIn: www.linkedin.com/in/davidbombal
Facebook: facebook.com/davidbombal.co
TikTok: tiktok.com/@davidbombal
RUclips: www.youtube.com/@davidbombal
// MY STUFF //
www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming up
00:45 - Andy Yen, CEO of Proton // How Proton started
03:52 - Recommended books
04:31 - Is it possible to have privacy in 2024?
07:36 - Privacy vs Anonymity
09:39 - "Privacy is a human need"
10:41 - How to be more private
11:53 - Google's business model
13:45 - How to be more private (continued)
15:20 - How Apple uses your data
16:51 - The Proton and French activist case
20:52 - Proton Mail's encryption explained
23:14 - The Proton and French activist case (continued)
25:48 - The UK Online Safety Act explained
32:15 - How Proton's public keys work
36:51 - No logs on Proton VPN
38:41 - Switzerland and their privacy laws
40:25 - TOR vs VPN
43:32 - Proton's ecosystem
45:20 - Proton Pass and Proton Sentinel // Leaked passwords
52:42 - Basics on how to get privacy in 2024
57:02 - Advanced ways to get privacy
01:03:13 - Recommended messaging apps
01:06:19 - The worry of A.I. in 2024
01:07:58 - Why encryption in email is needed // SMTP (Simple Mail Transfer Protocol) explained
01:11:12 - Proton vs Google
01:13:28 - Conclusion
vpn
proton mail
proton vpn
proton
tor
proxy chains
linux
android
iphone
ios
tails
tails linux
invisible online
hide identity
privacy
kali linux
online privacy
internet security
online privacy and security
online privacy tips
online privacy guide
internet security tutorial
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
government sure seems to be breaking end to end with spying laws.
Keep spreading content David your amazing man! And on mission I see! Keep doing u and help trying come up with security and privacy for us human beings! Pls. And I stand firmly behind you!… And stay strong and always look out for the next man! Godspeed.
great interview david thanks . any chance you could do an interview with a cypher punk ? i think cypher punks have done so much for privacy and open source internet from the verry beginning . but noone even knows who they are and that is such a shame . i think anyone in this kind of community should know what it even is .
isn't Brave Chromium based which is the same as google chrome?
@@moe3060 Brave is chrome, librewolf is ff
Steve Wozniak is the face of good intentions and innocence of programmers/engineers who wanted to do good in the world.
Wish we had more people like him investing in good projects ☹️
Never meet your heroes.
its called cypher punks . he was one when he started out so im not surprised he kept some of those ideals later on. you should look up what cypher punks are . its thanks to them that internet was open source and not a government owned thing
@boxcarhobo8315 SteveWozniak doesn’t run this company, We are Talk in Billionaire & Trillions Battles here. @DavidBombel. WHY my company Made BIGtech a the USA, Change it all? Ground-Zero.
@@myname-mz3lo stop it’s more then you will ever know about! Not even close!
More on privacy, exactly what I waited for. Thanks David!
Privacy isn't about hidding but losing, most of us have nothing to hide but almost all of us have something to lose.
yep . its why we close the door when we go to the toilet even though we have nothing to hide . or why we put blinds on our windows
Indeed, and Andy doesn't make that very clear, and I'm not even sure if he actually fully understood or thoroughly thought about what he said. The things we (necessarily) hide are the ways to access places where people can interfere with us, such as passwords, pin numbers. Everyone has things they can lose, even if it's just that 20 bucks you wanted to spend on a gift. If you thought you had it and someone stole it, that will piss you off. If it happens once, you'll recover and use another 20 bucks, but if people have access to your email and bank account and you never know how much money you actually have, that's unlivable. You're not hiding your money, we just like to have some control and reliability.
@@xCheddarB0b42xif you are a law abiding citizen then sure you should have your rights mate.
Hiding*
@@JRE-ut2tbNah. Everyone should have equal opportunity to access thorough privacy. Citizens and criminals and cops alike. Makes it fun.
This gentleman is a great CEO; he does it his way, is very trustworthy, and we need to protect great minds like his.
Andy is great!
What a fascinating conversation. This issue is often skimmed over it poorly laid out. This is perfect and couldn't be more relevant.
Rob Braxman is simple but thorough as well, check out his anonymity suggestions
It's very rare to see a CEO that acknowledges the possibility that Proton would eventuality get breached, not in the matter of If but When. Ego and ignorance is most big companies downfall and Andy knows it so I can see Proton making it far in the future. Hopefully we will get like an Office Suite from Proton
I love Proton mail!! Excellent service!!
Glad to hear it!
Happy to hear that, Anthony!
Can't wait for Proton Docs...which I hope will come in 2024. Thanks for an fantastic channel and great interview! There are a lot of struggle in my life at the moment, but your intonation always infuses me with hope and more connection with my future self. Thank you David!
This guy stands by logic, truth, and honesty; and that's exactly what we need more of in this world!
“if something is free, you’re the product”.
My area in the UK is covered by plenty of Meshtastic nodes - goes to show what we thought of the Online Safety Bill!
I loved the interview and the energy and joy.
Glad you enjoyed the video.
I love this man, he is honest and so technical, and his vision is crystal clear without zero doubt in mind and soul. This kinda people are always makes hope for the people are are really concerned about privacy for generations. God bless you.
Just when I thought there is no more hope left for online privacy, I watched this video and I signed up with Proton. Thanks guys, you are real life savers!!
dam man, hell of interview, totally sold for this one!!
Glad you enjoyed the interview :)
Fantastic talk! David, you and Andy knocked this one out of the park!! Great job!
Thank you!
I think my IQ & decency just doubled listening to Mr. Yen speak. Flawless interview! Thank you, David!
Nothing can increase the IQ of a person who refuses to think
Facts ❤@@kiyoponnn
Thank you David, this was one great video you have put up. Thank you for just being who you are, I enjoy watching your videos and interviews. Keep up the good work!
I appreciate that!
Andy Yen is amazing
Honored to meet the CEO of Proton, really appreciated this conversation, so helpful, thank you.
Even the most private mailing and messaging services can become a honeypots when authorities force them legally to turn the data and no matters how encrypted your data can be if they can scan your data before encryption or on the recipient side after decryption, windows and mac are to the brim of black boxes, for privacy it is better to use any open source OSs.
Why can't more companies be run by people like this....
Great video, I really enjoyed watching it! Its good to know what other options there are!
The only reason why i have a Proton Email account is because of this channel. Thank you for the great interview. Keep these coming!!
Thank you. Lots more content coming :)
This is why I like this channel, solid info with no nonsense thanks
I want to thank you for having such an incredible channel that is extremely informative. I have been in the computer business since 1967 working in the consulting field, I was placed on the COBOL F compiler team to help debug and correct any bugs that was discovered ( I am aging myself). Because of your channel, I started to learn about hacking since I wanted to understand how these individuals penetrate networks. I have recommended your channel to so many young professionals to further their education and everyone contacted me to tell me thank you for your channel. Keep up the great work Mr. Bombal you are providing everyone with a great education.
Fantastic! Thank you for sharing :)
Wow!!! 🤯🤯🤯🤯 Thank you, David and Andy!! I had no idea I will be switching to every product, Proton offers!!
If a business offers you something for free, and sells what you do, you are not the customer, you are the product.
Thanks again for the great conversation, David
Interesting interview David. Dissecting what privacy means for the folks to understand, which all of us pay heed to.
Glad you enjoyed the interview. Such an important topic at the moment!
If one uses any technology, there is no security at all,, all modern telecom, computers, gadgets, are built on architecture in favour of creator, and not users..it was always left to creator right since start, what to do with the service or tech provided to users, nothing to prevent the creators if any misused happened. Still today, despite all sugar coating, there is no security at all if one uses any modern tech. No privacy exists in reality.
Great episode! And love using Proton
This an extremely important video that needs to and should be seen and watched by everyone !!! Instead like me learning this all on my own !!
Great Interview, I enjoyed it a lot! And you are a great interviewer, good questions and not to much talking in between, for me just the right amount 👍🏻
Great interview! Thanks David and Andy.
I'm pretty sure my phone can read my mind
It's really worrying ☹️
The other day, I searched "David Bombal one eye up" because I couldn't find the name of the specific video, I really thought that the thumbnail was funny. Since then, he has dropped two videos with that thumbnail, with this one being one of them. 😂
The only way to be anonymous and being free from any government either in international waters or in space.
Loved the topic. Great interview! Thank you.
Great content Thank you! So much because of you and the seemingly Honest answers given I’ll now have proton for everything. Thank you again, David.
I never thought I would watch this type of video for more than an hour, very informative, great minds, really like the way he explains things logically, thank you very much ❤
Amazing chat, very informative hooked to this all the way through. Definitely going to try to move to proton, free model first then pay if it's actually usable.
Keep these convos coming, enjoying your content, thanks 👍
Glad you enjoyed it!
Important
0:45 - 3:55
7:40 - 9:39
16:51 - 25:50
32:15 - 40:25
Great interview ❤ David ❤ Proton (The Trust)
thanks man I'm learning a lot from you and your channel you making great empact on the online world and we benefiting and getting more knowledge and awareness on the internet ..
I'm still new learning and interested about linux and hacking and passion to understand how lot of things work and caring about privacy too ..
Can freedom exist without privacy?
It's a real problem ☹️
look up what cypher punks are . they are the people talking the most about this exact topic . they are the reason the internet is open source and not owned by governments . wikileaks etc was also examples of cypher punks work .
Nope because people want to control others. The desire to control other people is to strong
Nope.
This is one of the most informative videos I've ever watched. Thanks
Very happy to hear that!
Proton is the best! I love proton pass!
Happy to hear that!
Happy to hear that you're relying on our most recently developed service!
Love proton, been using it for years. Was great hearing the ceos thoughts on this all. Great interview
I love this channel. I’ve learned so much. This interview was awesome. Such a friendly face 😆 this put me in a even better mood 😄
One of the best interviews I’ve seen on this channel.
David, this was such a great interview, and as someone who’s quite concerned about privacy, this interview is right up my alley. I’ve got friends that will sometimes spout the same bullcrap about not needing privacy, and I can’t help but shake my head.
I’m on IOS, and fairly into the ecosystem, but my vehicle I drive has android auto and GM Onstar. Aside from ripping it all out or just disabling the entire infotainment system, what options are really available for me?
I have gmail account that exists solely for android auto and the built in google maps.
Thank you so much Mr. David Bombal for making this interview with Mr. Andy Yen.......really learn a lot.
loved every sec of this video! ❤🙏🏽
Love Proton. Been a member since 2017
Great to meet a long-time user! 🙌
At 21:13, he says "data" comes in and is then encrypted by the users public key. TLS is used in transit, the encryption ceases when the payload is at REST on Proton Mail servers. So if proton mail can encrypt the email at a certain point, then they can read it in clear text prior to encryption no? There was a bit of confusion at 23:05, and it was unclear how the key distribution occurred or where the private key was held. It would be good to have a follow-up to see if ProntonMail ever can see the clear text before encryption
If a Proton user sends mail to another Proton user, the sender will encrypt the message with the receiver's public key.
If a user on another mail service sends an email to a Proton user, the mail will not be encrypted in transit, but Proton will store it encrypted.
Thanks for this wonderful podcast on privacy.
Completed whole video in 2 days.
❤ From India
thanks mr. Andy Yen, a great and honest man. Very interesting to listen
Glad you enjoyed it
Are we going to ignore how proton claim they dont log IP but they actually logged IP and gave it to the FBI?
Can't recall if it's mentioned in this but people should also avoid cross-site authentication (so where you log into a news or other site with FB's credential system). I recall linked accounts being one of the key attack methods used by a group who wanted to steal a prized Twitter handle from a journalist, they got in through another app using social engineering and eventually to his Apple ecosystem where they were able to destroy EVERYTHING - phone, tablet, Macbook, server, apparently even his backups. This article was from some time back but still the principle applies I think.
It would be great if people like Andy Yen, Michael Bazzel, Edward Snowden, Daniel Micay and like minded professionals would design and manufacture a new privacy phone and operating system for phones and computers. No need to De-Google a phone or accept a poisonous Apple from any tech Queen.
While there are operating systems like Graphene, Google still gets a hardware sale from their Pixel devices. Virtually every keystroke on our computer is tracked by the leading hardware & software manufacturers. Governments all over the world demand access to every thought in the name of “security” and public “safety”….the list of invasive acts is getting longer by the day.
Stick to a flip phone then. Less maintenance.
this gonna be a banger
The content you create here on RUclips is fantastic. Keep it up!
Excellent talk, and VERY revealing! I've been a Proton customer for about 6 years, I fired Google once I learned all this info (except RUclips, obviously). So WHEN will Proton release a web browser?
Proton is a good source but it's no different than using any other email client if you don't use use the keys to encrypt your messages. Yeah sure Proton has the option to set a login and mailbox password but that does not encrypt your messages. You have to do this task manually and pass the encryption keys to the ones you communicate with and they must be using Proton also with their own keys or else there is no encryption what so ever and anyone can read your messages and track you even if you use Tor with Proton which includes the Proton onion relays it does zero even if you pay for the premium you must setup the encryption manually.
@@UnitedPublicServantAwareness Not sure how that has anything to do with my question. 🤔
How does proton software suite integrate with say Chromebooks? Since you need Gmail to sign on.
you are great David❤
Thank you 😀
Great interview and of course how he answers questions based on reality not in business wise I'm switching to proton.
I'd like to see Proton make their own social media platform
simply brilliant video. My UDM Pro is now completely VPN protected for all traffic.
Is there a difference between privacy or being anonymous and the right to protect your privacy ?
Please watch the interview - we discuss this.
@@davidbombal David…thanks the reply, I finally finished the interview. Your advice was to be patient opened another path. The issue I’m trying to resolve (privacy) can only be attained by using bandaids, when we really need surgery. Thanks for listening, I enjoy all your interviews especially OTW.
Bruce
Is there any connection to bluetooth and privacy why this millionaire ceo is still using the wired EarPods?
Many Thanks,
Democracy = Privacy, so a country that breaks privacy can't claim to be a democracy, that should be an assumed choice, that all.
Another banger , great interview and info
Love proton!
Awesome content!!! Its practical content!
How can you be a RUclipsr without a google account ?
I do love the way he talks about security and i thank you for opening this up for people, I agree about keeping yourself safe and i love the fact we can do that but to a certain degree you are telling people what to do to commit crime and get away with it no ? as there will be no logs or way the authorities can use anything to get the data (if needed) ?
Great interview David, you talked about the Swiss law and the no log policy of Proton. What happens if I connect to a VPN server that’s located in the US or somewhere else outside of Swiss. Do these laws still apply, or is it dependent on where I exit the VPN?
Thank you.
Google already has a profile on everyone and their search habits once they began to grow Sure you can switch, but Google still has your information. Are they going to delete it? Ever?
2FA(two factor authentication) on your phone is a potential major headache if you get your phone stolen, lose it, drop it in the lake, etc. Now accessing your accounts becomes a big problem.
il be switching to proton this evening. great interview
very intersting ,already maid a proton e-mail i think it should be my main mail after this video, isn't that Kurburt way of encryption
Good content ❤
Thank you!
even if not signed in to google your searches will still make it back to them . they use fingerprinting to recognise you .
big fan of your videos sir ❤❤
Thank you so much 😀
I love getting confirmation that my money is well spend.
Thanks so much David 🙏
You are very welcome
very interesting video, I personally use and likes proton mail and vpn services. but at the end of the road, whatever privacy and security you are mentioning is not for everybody, if you get rid of google, Gmail, Facebook and go to Linux instead of IOS or Windows. there is no way you escape from being watch. cellphone company watch and record you, ISP provider also, google, even the apps you installed on your mobile are constantly watching you. So, getting out of few services will not make any difference. all browsers are getting cookies and keeping your info, even they say it is private. so, who is going to change everything to make they lives more difficult but still getting watch by other services, companies, browsers, telephone companies etc. we need to learn how to live without privacy, and monitor everything daily to detect if something is not right. the only way to be secure if coming back to cavemens . good video David good information.
Called a degoogled phone 😉
Privacy give us more opportunity.
Hey David, Would it be possible for you to make a comprehensive video for CISSP? I'm totally new in the realm of Cyber, and Which books should I start to prepare to be ready to read for the CISSP domain? I mean the pre-requisites of CISSP and that guideline.
I wonder how come that RUclips is not mentioned in this interview as a Google asset?
By watching these videos we expose our details to Google exactly like when using Gmail, I am sure. A solution might be moving to Rumble maybe? Somehow I can only see 6 videos from David there. Rob Braxman, who is quite privacy addict is there, Naomi Brockwell too.
It’s called convenience vs privacy.
In order to be private or anonymous in real life you need to build your own device& gadgets,your own apps and your own network which is not possible for a indivisual ,so there is no chance that you can be anonymous or private, there will always be someone watching your moves on the internet ,though you use any type of marketing bullshit.These marketing gimics will only work against indivisual like us working on limited resources.
Yes, but encryption can make it more difficult to violate privacy
Sure you can. It’s called a fake identity.
Keep up proton 💟
44:58 Bro literally said "We choose to go to the moon in this decade and do the other things not because they are easy, but because they are hard."
what i dont understand about proton mail is that if you signup for the premium they your info so whats the point
Try Mailu or another self hosted email server NOT Proton. The only person that should be trusted handling your email is you!
thank you David B
A government's interest isn't always criminal issues. It could be security, or a patent they want to bring into the black world - with our without compensation, the target could be on a terrorist list, or it can be corporate espionage, or other reasons. To assume that because you're not a criminal they wouldn't target your data is not true.
Even with OS like graphene, networks can still be intercepted
There will always be countermeasures to circumvent privacy and anonymity. It’s huge money. Just comes down to how interesting one is to use such methods on. For average law abiding citizen risk is very low.
Always watching. Monsters inc
Great stuff, Proton has my trust, thanks for bringing him and for the preparation you put in for the interview, great questions.
Also, it's so useful when you make recaps of the answers he gives, it helps so much to make everything clear.
Thank you. I appreciate that!
💜
, big fan of your videos! You're like a teacher to me. Could you consider making a video on MITMA and HTTP spoofing? I'm sure it would be super informative and helpful! Keep up the awesome content!"
Great suggestion!