I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)
I know there are plenty of software missing from here. This is just a fun infographic I made, no need to take it seriously :)
It’s right there in your copy-paste my dude, “BY DEFAULT”.
The jackass(es) who actually was at risk went the extra step to enable IP address logging, which means that when Proton had to comply with a lawful court order, they actually had data to give.
Proton is a company like any other that has to comply with laws in the country they operate in, but unlike a lot of other companies, they don’t log data UNLESS YOU ASK THEM TO.
Moral of the story is, like has oft been repeated, know your threat model and plan appropriately.