Have people noticed how much popretary java code ProtonMail requires when using a web browser for email?
Also, why the required login on their free VPN service if they are all about privacy and encryption? Why do they want someone's network traffic in order to use their free VPN?
Over the past 6 months my suspicion grows bigger and bigger of who is behind Proton, the agenda behind starting the service, and how it caught on? Why don't free encrypted anti-government services catch on?
Until ProtonVPN removes login requirement and release VPN server code under open source license like RiseupVPN or CalyxVPN which are anonymous VPN's, no account, I will choose to treat Proton like a spy agency.
Also, why the required login on their free VPN service if they are all about privacy and encryption?
Because they need to limit how many instances of the VPN you're concurrently accessing somehow.
Why do they want someone’s network traffic in order to use their free VPN?
To use a VPN, you by definition are giving someone your network traffic.
Over the past 6 months my suspicion grows bigger and bigger of who is behind Proton, the agenda behind starting the service, and how it caught on? Why don’t free encrypted anti-government services catch on?
I'm not even touching this...
Until ProtonVPN removes login requirement and release VPN server code under open source license like RiseupVPN or CalyxVPN
That would be meaningless. You login to a protonmail account, which you can create anonymously. The server code can also never be verified to be what's running on the servers.
You did a good job to rebutt everything I said, props!
I'm good with letting all of your counterpoints stand on their merits.
I still do wonder how Proton caught on over other encrypted emails and why American government has not gone after Proton like they did with Lavabit, which I did use and then one day all my emails don't exist anymore.
why American government has not gone after Proton like they did with Lavabit
Lavabit was based in the United States. Proton AG operates entirely in Switzerland. Ostensibly the US government would have to go through the Swiss court system to get anything out of Proton.
Others have already touched on the jurisdiction issue.
I'm also going to note, in the last 10 years a lot has changed. E2EE has gone from something that's fringe, to something integrated integrated into lots of products. Signal, Proton, and others launched in the wake of the Snowden revelations. Lavamail was Snowden's email provider.
It's kind of like being the "hipster nerd" playing D&D before D&D was popular vs playing D&D post popularity... It's pretty obvious to most people in 2023 that D&D isn't for demon worshiper, as it's pretty obvious in 2023 that E2EE isn't just for criminals. In other words, the value proposition of ProtonMail isn't as "sinister."
I personally suspect the US Govt (in terms of federal agencies) is adapting to the presence of encryption vs trying to kill or weaken it at every turn (similar to how Microsoft stopped trying to stomp out open source code). 9-11 was a very very very bad thing (and arguably why the US is one of the worst countries to host a privacy service). However, the "big one" when it comes to cyber attacks could be even worse (and I'm pretty sure there are people at NSA that understand how E2EE plays a role in securing the nation -- they're not dumb people after all).
Proton is also a larger company than Lavabit (I suspect), and with that comes lawyers, and money to feed them.
So long as ProtonMail isn't primarily acting to serve organized crime... I suspect "there are bigger fish to fry."
Lavabit was formed and located in the US, while Protonmail was not. As a result, the US had jurisdiction over Lavabit, while it does not have the same level of jurisdiction over Protonmail.
I've come to have my own suspicions of Proton as well, but I've also leaned that's not an accepted point of view in most social media privacy communities.
Nothing is perfect. Everything is this world is about trust even if they open source everything is practically impossible for you to verify all the code and then verified if it really been used on the final product . And that is only the VPN , what about the email provider, your ISP , your phone carrier? , the apps you daily use. Are you going to check the source code of every single thing you use? And make sure it is been using correctly? Also even if you can do all that , how do you know the encryption being used hasnt been broken by a government already? Come on man be more realistic.