Here, try this on for size:

Snowden was using LavaBit. The feds approached Lavabit and tried to force Ladar 
to hand over users' information. The flaw with LavaBit was the fact that users' 
data, or passwords, or keys, were momentarily in server memory. That momentary 
exposure, the feds said, meant the users had no reasonable expectation of 
privacy, so Ladar was legally required to hand it over, under penalty of 
obstruction of justice and various other charges.

Snowden has also been quoted, something about don't use Dropbox, use Spideroak 
instead. It is implausible to believe the NSA didn't know that he used both 
LavaBit and Spideroak, but there was no noisy implosion of spideroak, no 
mention of anything. While this doesn't prove anything, you have to wonder, 
were they approached too? Did they silently hand over data, as LavaBit refused?

You might say, "spideroak, zero-knowledge, means they couldn't/wouldn't hand 
over data, and even if they did, it would be meaningless, because it's 
encrypted client-side without exposure of passwords or keys." If this is true, 
the canary report should be like ProtonMail's, itemizing the number of 
requests, the number of requests granted, and including the statement 
"ProtonMail can only turn over encrypted user data [...]. ProtonMail does not 
have the ability to decrypt user messages."

Keep LavaBit in mind and see this:

"Important Note: When accessing your data via the SpiderOak website or a mobile 
device, you must enter your password which will then exist in the SpiderOak 
server memory for the duration of your browsing session. [...] your data could 
potentially be readable to someone with access to the SpiderOak servers."

https://spideroak.com/features/private-by-design
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to