The “Proton is fully compromised” take is just noise. Nothin...

d4ad3b6eeaff13fe...

npub16jknkmh2luflurx2epkj99qyj7v2ut3ew7t2mfd7xxt9jtjku2nsj2gqp0

hex

a74596424c45c7bfb15e104a329a5c97dd733a4ad0d0f8a21af4f7533bfd2f29

nevent

nevent1qqs2w3vkgfxyt3alk90pqj3jnfwf0htn8f9dp58c5gd0fa6n807j72gprpmhxue69uhhyetvv9ujuem4d36kwatvw5hx6mm9qgsdftfmdm407yl7pn9vsmfzjszf0x9w9cuh094d5klrr9je9etw9fc3hvlpr

Kind-1 (TextNote)

2026-03-06T04:34:12Z

↳ 回复 4d784205... (npub1f4uyypghstsd8l4sxng4ptwzk6awfm3mf9ux0yallfrgkm6mj6es50r407)

⚡️🚨 NEW - Protonmail is now fully compromized Proton Mail Helped FBI Unmask Anonymous ‘Stop Cop City’ Protester https://blossom.primal.net/0ab08c266...

The “Proton is fully compromised” take is just noise. Nothing got hacked, nothing got backdoored. Swiss courts did what Swiss courts do: they forced Proton to hand over metadata tied to an account — payment info, login timestamps, IP logs. The encrypted inbox stayed encrypted.

The real issue is people mixing up encryption with anonymity. Proton protects your messages. It does not protect your identity. If your account is tied to a normal, traceable payment method, that breadcrumb exists — and a court can demand it. That’s not a breach, that’s jurisdiction.

And yeah, if the account had been funded with non‑linkable Bitcoin, there wouldn’t have been payment metadata to hand over. Not because of anything shady — just because you can’t leak what you never collected. That’s the whole point of minimizing data exhaust.

So the TL;DR for Nostr:

ProtonMail = good encryption, zero anonymity

Metadata = the real snitch

Bitcoin = privacy depends on how you use it

Threat models = not optional

Use the right tool for the job, or the job will use you.

原始 JSON

{
  "kind": 1,
  "id": "a74596424c45c7bfb15e104a329a5c97dd733a4ad0d0f8a21af4f7533bfd2f29",
  "pubkey": "d4ad3b6eeaff13fe0ccac86d2294049798ae2e397796ada5be3196592e56e2a7",
  "created_at": 1772771652,
  "tags": [
    [
      "e",
      "3c2c334d4cd81e3b6a937954cf4bda50db440e9e0a61ec1175f9d4311db79169",
      "wss://relay.ditto.pub/",
      "root",
      "4d7842051782e0d3feb034d150adc2b6bae4ee3b49786793bffa468b6f5b96b3"
    ],
    [
      "p",
      "4d7842051782e0d3feb034d150adc2b6bae4ee3b49786793bffa468b6f5b96b3"
    ],
    [
      "client",
      "Ditto"
    ]
  ],
  "content": "The “Proton is fully compromised” take is just noise. Nothing got hacked, nothing got backdoored. Swiss courts did what Swiss courts do: they forced Proton to hand over metadata tied to an account — payment info, login timestamps, IP logs. The encrypted inbox stayed encrypted.\n\nThe real issue is people mixing up encryption with anonymity. Proton protects your messages. It does not protect your identity. If your account is tied to a normal, traceable payment method, that breadcrumb exists — and a court can demand it. That’s not a breach, that’s jurisdiction.\n\nAnd yeah, if the account had been funded with non‑linkable Bitcoin, there wouldn’t have been payment metadata to hand over. Not because of anything shady — just because you can’t leak what you never collected. That’s the whole point of minimizing data exhaust.\n\nSo the TL;DR for Nostr:\n\n    ProtonMail = good encryption, zero anonymity\n\n    Metadata = the real snitch\n\n    Bitcoin = privacy depends on how you use it\n\n    Threat models = not optional\n\nUse the right tool for the job, or the job will use you.",
  "sig": "ac47cbedc07cff37809fcdc8d273df19b413a69472732cef83d6e0dd149adf5bc9d20fc07387217c3f79746efeff2a86e9611d7aa3117b7a5501cdabeb3c5492"
}