Read it before, seem normal. It mentions info about who contacts the user, and elsewhere something about IP and logs. But if there business operating model is true they have no keys they can decrypt with. If they do them proton is no different tjam google
First of all, that doesn’t matter to us, from the EU.
Secondly, read this.
Read it before, seem normal. It mentions info about who contacts the user, and elsewhere something about IP and logs. But if there business operating model is true they have no keys they can decrypt with. If they do them proton is no different tjam google