• BCsven@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    ·
    5 hours ago

    Read it before, seem normal. It mentions info about who contacts the user, and elsewhere something about IP and logs. But if there business operating model is true they have no keys they can decrypt with. If they do them proton is no different tjam google