Hacker News new | past | comments | ask | show | jobs | submit login

They have done several things including:

- enabled IP logging against a specific user account

- disabled an account and rendered assistance

- comply with the data request, to the extent that it is possible, given our cryptography.

The unknowns are what assistance they render and what extent is possible for them to comply with data requests. They have complied with requests without court orders in cases when they believed a court order was inevitable. They have also delayed reporting incidents at the request of authorities in order to not endanger victims.

https://protonmail.com/blog/transparency-report/




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: