• Diotima@kbin.social
    link
    fedilink
    arrow-up
    51
    ·
    8 months ago

    I’d be interested in seeing the number of E2EE enabled accounts used for criminal activity versus the number of regular ol’ free Gmail, Yahoo, Outlook etc accounts. Governments absolutely have a hate-on for E2EE, so the police calling out these services specifically raises questions of motive.

    Not that we should not be shutting down criminals… but this sort of framing tends to suggest that E2EE services are inherently criminal enabling, and that does not feel like a mistake.

    • ItsComplicated@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      14
      ·
      8 months ago

      Forgive my question, but if the email is encrypted and the service is unable to read it, how are they sure the accounts in question are criminal? How would they know any account was?

      This is confusing to me so I am grateful for any insight.

      • Diotima@kbin.social
        link
        fedilink
        arrow-up
        21
        arrow-down
        1
        ·
        8 months ago

        Fair question!

        If an email address is being used for fraud, they don’t need to see the encrypted copy; they can see the copy sent out to other people from that address. So if I send you a message from my Protonmail to your Gmail, the following is true:

        Copy @ Protonmail: E2EE.
        Copy @ Gmail: NOT E2EE.

        There are other, circumstantial ways to tell as well. If you’re trying to scam people with DudeBro Cryptocurrency, you necessarily reveal the address you use when you send our your spam or scams. If I send malware from notactuallydiotima@proton.me, the proof that I sent the malware does not require you to see my server stored mail; you can just look at your own copy to see.

        Does that make sense?

          • baseless_discourse@mander.xyz
            link
            fedilink
            English
            arrow-up
            3
            ·
            edit-2
            8 months ago

            Yes, the “to address” cannot be encrypted as it is necessary to deliver the mail, the “from address” are needed to send a notification when the “to address” doesn’t exist.

            Technically, the “from address” probably can be encrypted, like in signal; but I think it is required in the current email standard.

        • jkrtn@lemmy.ml
          link
          fedilink
          English
          arrow-up
          1
          ·
          8 months ago

          Surely Proton also receives the mails in plaintext? There’s no E2EE about it. You have to take their word that they encrypt it and discard the plaintext data.

      • Pips@lemmy.sdf.org
        link
        fedilink
        English
        arrow-up
        8
        ·
        8 months ago

        There’s typically reason to suspect the account owner first. They’re not trawling through random accounts, law enforcement doesn’t have the time or authority to do that. Note that intelligence agencies are not law enforcement, I’m not talking about what some spy agencies might do.

        Since this is law enforcement, typically you don’t have a verdict to rely on, but they’d have a warrant or subpoena to get the necessary evidence to further the case.