Regarding password managers:
All password managers keep data unencrypted in memory. You can’t encrypt the data in memory because then the application cannot use the data while it is running. It’s an universal issue for password managers, and not something that can be fixed.
While you can obfuscate the data, this is really security theater, because it is trivial to reverse engineer the obfuscation. In the future, Proton Pass may also obfuscate, but it doesn’t actually add any security.
If you enable PIN lock, the data is encrypted locally and cleared from memory when the PIN lock is activated. The security benefit of this in the case of a compromised device is likely marginal, as malware on a device would be able to key log the pin and bypass it in that manner. However, PIN lock can be desirable on a shared device (although somebody with access to the shared device could also install a keylogger…).
In the previous version of Proton Pass, after the PIN lock, it can take up to 30 minutes to clear data from memory, while the new version clears it immediately. It was previously immediate, but a code regression set it back to up to 30 minutes, but this has now been fixed. In general, for the reasons previously explained, we would not advise people to rely upon the PIN to secure against malware or shared devices, and that’s why PIN is not enabled by default, as the security benefit is likely marginal.
By the way, to even take advantage of this, somebody would need to have access to the device and the ability to access the device memory, in which case the PIN is not going to be effective because the device is already compromised. Unfortunately protecting against this type of device compromise is beyond the scope of Proton Pass (or any other password manager).
Yes, as long as you’'re not above the Duo plan limitations (e.g storage or custom domains)
For those asking about Stealth on Linux, quote from the team:
With Wireguard for Linux about to come out of beta and we are planning to bring Stealth to Linux as well.
Yes
Teams answer:
Our business audience was the most interested in a writing assistant, this is why we started gradually rolling it out starting with Business and Visionary plans. We will look into making it available to more users at a later date!
The team states the following regarding Firefox:
Support for running language models locally is currently only available in the Firefox Nightly builds. In our testing with Firefox, we haven’t been able to get Proton Scribe to run reliably on a variety of devices. We will see how the situation evolves before adding support.
Just a note to add, this is just the re-confirmation of this year, the two previous years they have had no-logs policy audits as well :)
There is also this support article explaining the link security:
Just to answer here in the thread also, as answered on reddit:
IKEv2 has been discontinued on iOS for security reasons:
https://protonvpn.com/support/discontinuing-ikev2-openvpn-macos-ios/
You’ll have to use an app, whether that is the Proton VPN app, Open VPN app, WireGuard app or something like Passepartout.
The OpenVPN app works with the OpenVPN protocol and thus with the OpenVPN configuration files.
The WireGuard app works with WireGuard configuration files.
Passepartout works with both, OpenVPN and WireGuard configuration files.
The team states on reddit:
By cursor movements we don’t mean mouse movement, but only the typing indicator. Mouse movement is not recorded. It is only shown when you choose to collaborate with someone by sharing access to view or edit the document to make the collaboration possible. Moreover, the contents of your documents including these movements, comments, and replies are end-to-end encrypted, so that no one, not even Proton, can see the contents of your documents.
I’d assume that is coming later on… Step by step.
Different teams, different products. One thing doesn’t exclude the other.
EDIT: We’re aware of an issue trying with trying to install both Proton Mail and Proton Pass desktop applications on Linux, thanks for your patience! In the meantime, this can be resolved with the following:
sudo rpm -i --force ProtonPass_1.17.5.rpm
Doesn’t help to post that to every thread which is something different than drive though. Separate teams working on separate products and platforms.
We’ll be working on a new CLI based on the new v4 app, but we’re currently working on WireGuard, so it might take some time until we get the CLI out.
This is the status from the team.
I‘d suggest a privacy foil on your device for usage in public transports.
Thanks for the further information and participation in the thread here.
Only because of the bridge, which is handling the encryption part. That works on Mac as well as on Linux also.
However an integration to 3rd party clients without such an encryption layer (Bridge) doesn’t work.
There is a reason this works and why another provider with static portfowarding removed portforwarding :)