all-in-one privacy solution":["Proton Unlimited is een all-in-one privacy-oplossing"],"Black Friday":["Black Friday"],"No ads. Privacy by default.":["Geen advertenties. Standaard privacy."],"People before profits":["Mensen vóór winst"],"Security through transparency":["Veiligheid door openheid"],"The best Proton Mail ${ BLACK_FRIDAY } deals":["De beste ${ BLACK_FRIDAY }-deals voor Proton Mail"],"The world’s only community- supported email service":["'s Werelds enige door de community ondersteunde e-mailservice"]},"specialoffer:limited":{"${ hours } hour":["${ hours } uur","${ hours } uur"],"${ hoursLeft }, ${ minutesLeft } and ${ secondsLeft } left":["Nog ${ hoursLeft }, ${ minutesLeft } en ${ secondsLeft } resterend"],"${ minutes } minute":["${ minutes } minuut","${ minutes } minuten"],"${ seconds } second":["${ seconds } seconde","${ seconds } seconden"],"Limited time offer":["Aanbieding beperkt geldig"]},"specialoffer:listitem":{"Create multiple addresses":["Maak meerdere e-mailadressen aan"],"Hide-my-email aliases":["Hide-my-email-aliassen"],"Quickly unsubscribe from newsletters":["Meld u eenvoudig af voor nieuwsbrieven"],"Use your own domain name":["Gebruik uw eigen domeinnaam"]},"specialoffer:logos":{"As featured in":["Zoals te lezen in"]},"specialoffer:metadescription":{"Get an encrypted email that protects your privacy":["Kies voor beveiligde e-mail die uw privacy beschermt"]},"specialoffer:metatitle":{"Proton Mail Black Friday Sale - Up to 40% off":["Proton Mail Black Friday Sale - Tot 40% korting"]},"specialoffer:newmetadescription":{"Get up to 40% off Proton Mail subscriptions this Black Friday. Find great deals on our secure end-to-end encrypted email plans.":["Profiteer tijdens Black Friday van wel 40% korting op Proton Mail-abonnementen. Bekijk geweldige aanbiedingen voor onze veilige, end-to-end versleutelde e-mailabonnementen."]},"specialoffer:newmetatitle":{"Proton Mail Black Friday sale | Up to 40% off secure email":["Proton Mail Black Friday Sale | Tot 40% korting op veilige e-mail"]},"specialoffer:note":{"* Billed at ${ TOTAL_SUM } for the first year":["*U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"*Billed at ${ TOTAL_SUM } for the first 2 years":["*U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"30-day money-back guarantee":["30 dagen niet-goed-geld-terug-garantie"],"Billed at ${ TOTAL_SUM } for the first 2 years":["U betaalt ${ TOTAL_SUM } voor de eerste 2 jaar"],"Billed at ${ TOTAL_SUM } for the first year":["U betaalt ${ TOTAL_SUM } voor het eerste jaar"],"You save ${ SAVE_SUM }":["U bespaart ${ SAVE_SUM }"]},"specialoffer:off":{"${ DISCOUNT } off":["−${ DISCOUNT }"],"${ PERCENT_OFF } off":["−${ PERCENT_OFF }"]},"specialoffer:testimonial":{"I love my ProtonMail":["Ik ben fan van ProtonMail"],"My favorite email service":["Mijn favoriete e-mailservice"],"Thanks Proton for keeping us all safe in the complicated internet universe.":["Proton houdt ons allemaal veilig in het complexe internetuniversum."],"You get what you pay for. In the case of big tech, if you pay nothing, you get used. I quit using Gmail and switched to @ProtonMail":["Je krijgt waarvoor je betaalt. In het geval van Big Tech betekent 'gratis' dat je wordt gebruikt. Ik ben gestopt met Gmail en overgestapt op @ProtonMail"]},"specialoffer:time":{"Days":["Dagen"],"Hours":["Uur"],"Min":["Min"]},"specialoffer:title":{"And much more":["En nog veel meer"],"Make your inbox yours":["Personaliseer uw inbox"],"Safe from trackers":["Beschermd tegen trackers"],"Stay organized":["Houd overzicht"],"Black Friday email deals":["Black Friday-deals voor e-mail"],"Don’t just take our word for it":["U hoeft ons niet te geloven"],"Our story":["Ons verhaal"],"Transfer your data from Google in one click":["Zet uw gegevens van Google over met één klik"]},"specialoffer:tooltip":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, connect up to 10 devices, access worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, verbinding met maximaal 10 apparaten, wereldwijd toegang tot streamingdiensten, malware- en advertentieblokkering, en meer."],"Easily share your calendar with your family, friends or colleagues, and view external calendars.":["Deel uw agenda eenvoudig met uw familie, vrienden of collega's, en bekijk externe agenda's."],"Includes support for 1 custom email domain, 10 email addresses, 10 hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 1 aangepast e-maildomein, 10 e-mailadressen, 10 hide-my-email-aliassen, gedeelde agenda's en meer."],"Includes support for 3 custom email domains, 15 email addresses, unlimited hide-my-email aliases, calendar sharing, and more.":["Ondersteuning voor 3 aangepaste e-maildomeinen, 15 e-mailadressen, onbeperkt hide-my-email-aliassen, gedeelde agenda's en meer."],"Manage up to 25 calendars, mobile apps, secured with end-to-end encryption, 1-click calendar import from Google, and more.":["Beheer tot 25 agenda's, mobiele apps, beveiligd met end-to-end versleuteling, agenda's van Google importeren met 1 klik, en meer."]},"Status Banner":{"At the moment we are experiencing issues with the Proton VPN service":["Momenteel werkt de dienst van Proton VPN niet naar behoren"],"Learn more":["Meer informatie"]},"Status banner":{"Learn more":["Meer informatie"],"Please note that at the moment we are experiencing issues with the ${ issues[0] } service.":["We ondervinden op dit moment problemen met de ${ issues[0] }service."],"We are experiencing issues with one or more services at the moment.":["We ondervinden momenteel problemen met een of meer services."]},"suggestions":{"Suggestions":["Suggesties"]},"Support":{"Sub category":["Subcategorie","Subcategorieën"]},"Support article":{"${ readingTime } min":["${ readingTime } min","${ readingTime } min"],"Category":["Categorie","Categorieën"],"Didn’t find what you were looking for?":["Niet gevonden wat u zocht?"],"General contact":["Algemene contactgegevens"],"Get help":["Krijg hulp"],"Legal contact":["Contactgegevens voor juridische zaken"],"Media contact":["Contactgegevens voor media"],"Partnerships contact":["Contactgegevens voor partnerschappen"],"Reading":["Lezen"]},"Support categories":{"Browse Proton product support":["Zoeken in Proton-productondersteuning"]},"Support category":{"There is no article in this category yet.":["Er zijn nog geen artikelen in deze categorie."]},"Support troubleshooting":{"--- Select ---":["--- Selecteren ---"],"App version":["App-versie"],"Browser":["Browser"],"Check if this helps":["Kijk of dit helpt"],"Choose a category for your question":["Kies een categorie voor uw vraag"],"Choose a product":["Kies een product"],"Did this solve your issue ?":["Heeft dit uw probleem opgelost?"],"Faster assistance is just a few clicks away — please make your selections":["Snellere ondersteuning binnen een paar klikken — maak uw keuze"],"No, contact support":["Nee, contact opnemen met ondersteuning"],"Proton account":["Proton-account"],"Proton Bridge":["Proton Bridge"],"Proton Calendar":["Proton Calendar"],"Proton Drive":["Proton Drive"],"Proton for Business":["Proton for Business"],"Proton Mail":["Proton Mail"],"Proton Pass":["Proton Pass"],"Proton VPN":["Proton VPN"],"Thank you for your feedback":["Bedankt voor uw feedback"],"Troubleshooting":["Probleemoplossing"],"What can we help with ?":["Waar mogen we u bij helpen?"],"Yes":["Ja"]},"support_modal_search_query":{"Search query":["Zoekopdracht"]},"support_search_button":{"Search":["Zoeken"]},"support_search_i_am_looking_for":{"I'm looking for":["Ik ben op zoek naar"]},"SupportForm":{"For a faster resolution, please report the issue from the Bridge app: Help > Report a problem.":["Om problemen sneller op te lossen, meldt u het via de Bridge-app: Help > Een probleem melden."],"Information":["Informatie"]},"SupportForm:option":{"Account Security":["Accountbeveiliging"],"Contacts":["Contactpersonen"],"Custom email domain":["Aangepast e-maildomein"],"Email delivery and Spam":["E-maillevering en spam"],"Encryption":["Versleuteling"],"Login and password":["Inlognaam en wachtwoord"],"Merge aliases and accounts":["Aliassen en accounts samenvoegen"],"Migrate to Proton":["Migreren naar Proton"],"Notifications":["Meldingen"],"Other":["Overig"],"Plans and billing":["Abonnementen en facturering"],"Proton for Business":["Proton for Business"],"Sign up":["Inschrijven"],"Storage":["Opslag"],"Users, addresses, and identities":["Gebruikers, adressen en identiteiten"]},"SupportForm:optionIntro":{"Select a topic":["Kies een onderwerp"]},"swiss_baseed_feature":{"Swiss based":["Gevestigd in Zwitserland"]},"Testimonial":{"Awards":["Awards"],"Customers":["Klanten"],"Featured":["Featured"],"Go to testimonial source":["Naar bron van testimonial"],"Reviews":["Reviews"],"Videos":["Video's"]},"Text":{"Find the plan that's right for you":["Vind het abonnement dat bij u past"],"If you need help, check out our ${ supportLink }.":["Bekijk onze ${ supportLink } als u hulp nodig hebt."],"The page you’re looking for might have been removed, or it could be an\nold link.":["De pagina waarnaar u op zoek bent, is mogelijk verwijderd, of u gebruikt een oude koppeling."]},"Tooltip":{"More information":["Meer informatie"]},"tooltip_calendar":{"Create up to 20 custom & shareable encrypted calendars. On top of that, add up to 5 calendars from friends, family, colleagues, and organizations.":["Maak tot 20 aangepaste en deelbare versleutelde agenda's aan. Voeg daar bovenop tot 5 agenda's toe van vrienden, familie, collega's en organisaties."]},"tooltip_vpn":{"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, ${ TOTAL_VPN_CONNECTIONS } VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, ${ TOTAL_VPN_CONNECTIONS } VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."],"Access blocked content and browse privately. Includes ${ TOTAL_SERVERS }+ servers in ${ TOTAL_COUNTRIES }+ countries, highest VPN speed, 10 VPN connections, worldwide streaming services, malware and ad-blocker, and more.":["Bekijk geblokkeerde inhoud en surf privé. Met meer dan ${ TOTAL_SERVERS } servers in meer dan ${ TOTAL_COUNTRIES } landen, de hoogste VPN-snelheid, 10 VPN-verbindingen, wereldwijde streamingdiensten, malware- en advertentieblokkering, en meer."]},"version_history_label":{"Version history":["Versiegeschiedenis"]},"version_history_tooltip":{"Store up to ${ versionHistoryNumber } versions of each file for up to ${ years } years":["Bewaar tot ${ versionHistoryNumber } versies van elk bestand tot wel ${ years } jaar"]},"vpn_features_link":{"View VPN plans":["VPN-abonnementen bekijken"]},"vpn_features_useCase":{"Access blocked content and browse privately":["Bekijk geblokkeerde inhoud en surf privé"]}}},"unleashApi":"https://account.proton.me/api"};
// We need to import data (the framework context) from the server
// This Astro feature with define:vars works well but creates an inline script
// So we can't directly import the initFramework helper, we have to store the context
window.frameworkContext = frameworkContext;
})();
Why client-side scanning isn’t the answer | Proton
Law enforcement agencies generally don’t like end-to-end encryption because it blocks them from accessing the private communications of individual citizens. After decades of trying to make tech companies add a “backdoor” to encryption, they’re now shifting strategies and focusing on other technological solutions that they claim would allow for scanning in end-to-end encrypted environments without breaking encryption.
One of the technologies they refer to is called “client-side scanning”. However, client-side scanning does not preserve privacy in the way its proponents claim. In fact, it could enable new and powerful forms of mass surveillance and censorship. Client-side scanning would put free speech and everyone’s security at great risk without producing any great benefits for law enforcement.
Client-side scanning doesn’t technically break encryption because it doesn’t need to: By the time your data is encrypted, authorities have already seen it.
Why authorities came up with client-side scanning
To understand client-side scanning, you need to understand end-to-end encryption.
Privacy-focused tech companies like Proton use end-to-end encryption to make your data inaccessible to anybody but you. Not even Proton can see your information because it’s encrypted before ever leaving your device. Only you or the person you’re talking to can decrypt the data. This prevents Proton’s servers from accessing your data, but it also blocks out hackers and governments.
End-to-end encryption technology was developed in part by the US government to increase security online. It enables the internet as we know it, used for everything from online banking to protecting dissidents from oppressive regimes. But law enforcement agencies claim that it’s preventing them from doing their jobs.
The FBI and other agencies have called this “going dark” to suggest that they’re blind to criminal activity because of encryption. In the past, they have advocated requiring tech companies to purposely create a vulnerability in their encryption — a so-called backdoor for law enforcement. But as Proton and other privacy advocates have pointed out, there is no such thing as a backdoor that only lets the good guys in. If there is a key that opens the private communications of millions of people, hackers will steal it.
Policymakers in most countries have generally sided with the privacy advocates, and there is no backdoor law.
So lately, authorities that want more access have begun to focus on client-side scanning as a new silver bullet, an alternative they say will protect user privacy and does not undermine end-to-end encryption. But if you know how client-side scanning works, it’s easy to understand why it’s potentially worse than a backdoor.
What is client-side scanning, and how does it work
The term client-side scanning refers to several technical methods to analyze the contents of a person’s messages on their device. This can include images, videos, and text messages. Typically, the content is checked against a database of prohibited content and flagged for moderation if there’s a match.
The European Commission published a legislative proposal(new window) in May 2022 that would mandate companies to actively search for child sexual abuse material on their services. While tech companies would be given some latitude to choose how to comply with this requirement, client-side scanning is often presented as the best technology available by law enforcement officials.
The problem with that, as the Electronic Frontier Foundation pointed out(new window), is that the most privacy-preserving methods of client-side scanning are almost impossible to implement.
So the most likely solution would be local hash matching, in which the digital fingerprints of your messages are compared against the digital fingerprints of prohibited content stored in a database on your device. In theory, the database would contain the hashes for child sexual abuse material or materials related to terrorism, but in practice the database could contain anything. And you would have no way of knowing.
That means whenever you download an app, even if it’s end-to-end encrypted like Signal or WhatsApp, you would be downloading a toolkit designed to inspect all your pictures and text messages and potentially report that data to the developer or the government.
This is why client-side scanning is even worse than a backdoor. Law enforcement wants to use backdoors in encryption to scan the content shared with others, but client-side scanning would allow them to look at the content you store on your device, whether you share it or not.
Ways client-side scanning can go wrong
Client-side scanning for the purpose of monitoring people’s communications is tailor-made for abuse. Here are just a few of the ways it can go wrong:
Increased attack surface for hackers
Widespread adoption of client-side scanning would open up new opportunities for hackers to monitor people’s communications. And because the attacks would most likely take place on individual users’ devices, app developers would be less able to intervene to protect their users.
In 2021, a group of well-known computer scientists released a paper(new window) describing the technical failings of client-side scanning as a law enforcement solution. One of their key findings is that client-side scanning destroys trust: “The software provider, the infrastructure operator, and the targeting curator must all be trusted. If any of them — or their key employees — misbehave, or are corrupted, hacked or coerced, the security of the system may fail. We can never know when the system is working correctly and when it is not.”
Government censorship and persecution
If regulators begin requiring client-side scanning for the world’s tech companies, there is nothing that prevents it from a technical standpoint from being used to monitor any type of content. Though it may be initially used to look for child abuse or terrorism, a successive government could use it to target broader categories of content, raising a greater risk of false positives and attacks on freedom.
It’s easy to see how some governments could use this technology to target political opponents, journalists, and anyone else they deem objectionable. It would be left to private app developers to either comply with such orders or shut down their service.
Either way, as soon as client-side scanning is deployed, users who rely on private and secure apps would have no way to trust their communications are protected.
False positives
Even in the best-case scenario, in which responsible governments and well-meaning developers implement a narrow form of client-side scanning, the technology is simply not sophisticated enough to identify only the targeted material. There are already cases of false positives that have ruined people’s lives, such as the father who sent a picture of his son to their doctor and was flagged as a predator(new window) and reported to the police.
In a letter(new window) opposing the European proposal, over 100 privacy advocacy organizations expressed specific concerns about client-side scanning. Child-abuse survivors describing their trauma to a trusted adult could be flagged for monitoring and reported. Anyone who sends an intimate picture could have that picture mistakenly flagged and examined by a third party.
Conclusion
Despite the way client-side scanning is optimistically portrayed as a magical solution, it’s not a privacy-preserving alternative to encryption backdoors. And in many ways, it’s worse. Authorities would gain the technical ability to scan everyone’s unencrypted data at all times. Using any chat app or social media platform would mean installing spyware on your device.
Meanwhile, the flood of false positives would likely overwhelm app developers and law enforcement agencies alike. Suddenly tasked with combing through people’s private pictures and messages, resources will be diverted away from actually preventing criminal activity.
Google is one of the biggest obstacles to privacy. The Big Tech giant may offer
quick access to information online, but it also controls vast amounts of your
personal or business data.
Recently, more people are becoming aware of the actual price you
If you’re a United States citizen or permanent resident, you have a Social
Security number (SSN). This number is the linchpin of much of your existence,
linked to everything from your tax records to your credit cards. Theft is a
massive problem, whic
Compromised passwords are a common issue and probably one of the biggest
cybersecurity threats for regular people. How do passwords get compromised, and
is there anything you can do to prevent it?
* What does compromised password mean?
* How do pa
WeTransfer is a popular service used by millions worldwide to send large files.
You may have wondered if it’s safe or whether you should use it to share
sensitive files. We answer these questions below and present a WeTransfer
alternative that may su
Dictionary attacks are a common method hackers use to try to crack passwords and
break into online accounts.
While these attacks may be effective against people with poor account security,
it’s extremely easy to protect yourself against them by usi
Data breaches are increasingly common. Whenever you sign up for an online
service, you provide it with personal information that’s valuable to hackers,
such as email addresses, passwords, phone numbers, and more. Unfortunately, many
online services f