Why we support e-evidence reforms - ProtonMail Blog


just linking here for anyone who might be interested …

what stands out to me :

properly authenticate data requests to ensure they are not replying to a malicious actor


Also, since we do not collect data on our users, we would have very little information to share if we were ever served one of these foreign orders

yes but there is still SOME information …


There has to be some. It’s very hard to troubleshoot issues if you don’t know what happened prior, or don’t know where the DDOS is coming from, for example.


But what if you WANT to reply to a malicious actor? And what if you’re both malicious actors?

(And does malicious acting still earn you hours to qualify for the Screen Actors Guild?)