7/10/2023 0 Comments Proton encrypted email![]() ![]() On the other end, ProtonMail will not see the user's real IP address, so there will be no way to tie a visit to a real identity. Because Tor uses multiple layers of encryption, there is no way for someone monitoring a user's internet connection to tell whether he or she is accessing ProtonMail. The attackers asked the company for US$5,500 to stop, but even after Proton Technologies paid, they continued to hit the service.Īnother benefit is increased privacy. In November 2015, it came under fire by a series of massive DDoS attacks that caused disruptions for over a week. The email service has suffered such attacks before. For one, because no one can discover its real IP address, it can't be targeted in distributed denial-of-service (DDoS) attacks, which means that it can serve as a failover if the internet-accessible ProtonMail servers get attacked. "Ī Tor hidden service also has other benefits. "We realize that censorship of ProtonMail in certain countries is not a matter of if, but a matter of when. "Recently, more and more countries have begun to take active measures to surveil or restrict access to privacy services, cutting off access to these vital tools," the ProtonMail team said in a blog post. Just recently, the Egyptian and UAE governments, which have strict control over the internet in their countries, started blocking people from using the Signal end-to-end encrypted messaging app for Android and iOS. ![]()
0 Comments
Leave a Reply. |