( Boston, MA,05/30/14) Andy Yen, cofounder of ProtonMail. (see Jordan Graham story) (Staff photo ... [+] by Stuart Cahill) (Photo by Stuart Cahill/MediaNews Group/Boston Herald via Getty Images)
Proton CEO Andy Yen once worked at CERN before deciding to kickstart his encryption-focused company ProtonMail out of beta through a crowdfunding campaign. Since then, ProtonMail has expanded into a variety of privacy-preserving technologies, from rolling out a drive product and calendar product with enough intuitive access features that it could be a very real competitor to Googles GOOG suite of products to allowing for organizational control of different emails and releasing its own VPN product.
The company has been renamed to Proton, to adjust for its broader focus on privacy-enhancing tools outside of email. What follows are excerpts from my interview with Andy on his thoughts about encryption, bitcoin and the enduring importance of privacy. The questions and responses have been excerpted from a larger interview, and written out in a way that is more reader-friendly and focused, though the substance is there: the content of the answers matches almost exactly those in the full interview save a few formatting edits and changing the order of one question.
Proton is structured in an interesting way from ProtonMail to ProtonVPN what do you see as the full privacy stack of tools which can maximize encryption and minimize surveillance? How do you see Proton interacting with other privacy tools such as bitcoin and Signal?
As a business, were shifting from a single privacy product, ProtonMail to Proton as a privacy platform, privacy ecosystem as a privacy infrastructure for the future. Obviously when you think about privacy online, email is an important part because it is an identity many people say that it is the only identity that matters today, but it is still limited and that is why we introduced ProtonVPN to allow facility and access to ProtonMail services, thats why were doing a calendar and drive. Well be expanding on that ecosystem of course.
The way to really consider this is, in fact, all services that Google offers today are built and designed in a way to maximize the data they can collect in order to sell better advertising. You could take all of those products and services and rebuild them in a way that is centred around making privacy the default and being as private and as secure as possible. In fact, theres nothing that Google offers that couldnt be rebuilt in a better way, and that whole ecosystem could in fact be recreated in a privacy-first way.
And what you do see is different companies, different startups starting to pick up different pieces of that. Obviously, we have the email, VPN, file storage and calendar piece that were working on. DuckDuckGo is doing that on search. Signal and Telegram are adjusting this when it comes to chat. I think its a very healthy and vibrant fact that we have an ecosystem today where theres many companies in the space, and it becomes increasingly possible to replace more and more pieces of your online life with private versions of [products].
Blockchain is another element there. Weve been long-time supporters of bitcoin from the very beginning. [...] Its a means of independence. For the space to survive, for privacy to thrive, you need to be able to be independent. You need to be not under the control of lets say, big tech or even the banking system. This level of independence really needs to be there to be in order for you to really do what is best for users at all times. This is why we also support cryptocurrencies and we support it as a payment method.
I personally would like to see more adoption of cryptocurrencies, because I think thats something that leads us to a world where things are less centralized. Centralization is a very very big risk because it means a single company can essentially cut you off and kill you. Resilient systems must be decentralized. We are building a platform or an ecosystem, but we are working as much as possible to be part of a broader ecosystem because we know we cant do it alone.
(Paypal once restricted ProtonMails account, with one representative questioning if the service was even legal).
Youve spoken and written often about the negative effects of big tech monopolies. What are your thoughts on the acquisitions in the space something Ive been seeing in the space for example with Zoom acquiring Keybase.
There are acquisitions within the privacy space the Zoom/Keybase acquisition was a very specific one it was to try to repair the security and privacy reputation [of Zoom] that took quite a big hit last year. From the perspective of Proton, our business model doesnt allow us to be acquired by Google and become part of big tech. It simply isnt possible, it would undermine our value proposition and I think if you are building businesses in privacy that is something to keep in mind.
Very so often, a lot of people start companies solely for the purpose of selling them, and the usual buyers in the past were big tech. That avenue isnt possible for privacy companies and I think that is a good thing, because if it were possible, then big tech would just own everything and you would have a competition issue.
What about the pricing (for example app store fees) and talent effects of big tech monopolies?
The things that Apple and Google are doing on the app store clearly are anti-competitive in many ways. You cannot have a fair competition if you are mandated by your competitor to pay them 30% of your revenue. There is no market, historical or future, where fair competition can exist under those circumstances. This should be very obvious [...], its very obvious to us. It took quite a long time for lawmakers to realize that this is an issue and theyre starting to realize its a problem now and thats why were seeing action on both sides of the Atlantic to pursue that.
[...]
Its also very bad for privacy, because if you look at the advertising business model, they dont charge for their product. The way that they work is that you get the product for free and theyll monetize you off of your data and using your most intimate and sensitive information to basically sell you ads.
A service like Facebook, honestly, would never have the payback fee but assume there was a more responsible version of Facebook that was going to subsist off of subscriptions instead of massive data abuse. That service would because of app store policies be put at a competitive disadvantage. Theyd have to pay fees that the bad business models dont have to pay. What the app store fees are essentially doing is strongly favouring ads-based business models which are bad for privacy and through that way, consumers around the world are harmed as a result of this.
[...]On talent, its an interesting question big tech because of their size sucks up a lot of the talent in the tech sector. But I believe what weve been seeing in the last year or last two years has been the rise of employee activism in that employees care of course about making a paycheck [...] but theres also more and more people [...] who also care about what theyre doing in their life. [...] If you care about those things, and there are bigger and bigger proportion of people these days, especially young people, then you ask yourself the question: do I want to spend my life working at the worlds biggest ad company, and abuse data to optimize ad returns? Or do I actually want to build the Internet of the future that defends democracy, defends human rights and ensures freedom for all?
-
It has been an interesting year for Proton, which has seen it launch new products, and continue building as part of a privacy ecosystem a place where parts of the Internet, including cryptocurrencies, Bitcoin and the broader encryption ecosystem are gradually building towards.
View original post here:
An Interview With Proton CEO Andy Yen On Big Tech, Bitcoin And The Enduring Importance Of Privacy - Forbes
- Report: NSA building comp to crack encryption types [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Report: NSA looking to crack all encryption with quantum computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Sound Advice: Explaining Comcast cable encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA Building Encryption-Busting Super Computer [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- NSA researches quantum computing to crack most encryption [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Advanced Encryption Standard - Wikipedia, the free encyclopedia [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- How Encryption Works - HowStuffWorks "Computer" [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - MB Technology Solutions - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Email Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Reversible Data Hiding in Encrypted Images by Reserving Room Before Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Toshiba WT8 Full Disk Encryption, Miracast, Easy Stand - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- Australian Encryption | Text encryption software for the protection of your privacy - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- njRAT v0 6 4 server Clean Encryption - Video [Last Updated On: January 5th, 2014] [Originally Added On: January 5th, 2014]
- AlertBoot New Encryption Compliance Reports Prepare Covered Entities For HIPAA Audits [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- BlackBerry denies using backdoor-enabled encryption code [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- What Is Encryption? (with pictures) - wiseGEEK [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- HowStuffWorks "How Encryption Works" [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Gambling with Secrets Part 5 8 Encryption Machines - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- The Benefits of Hosted Disk Encryption - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quill Encryption - what's that? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- WhatsApp Encryption - Shmoocon 2014 by @segofensiva @psaneme - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo2 - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- encryption demo - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Seven - Encryption Official Lyric Visual - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Quantum Computers - The Ultimate Encryption Backdoor? - Video [Last Updated On: January 23rd, 2014] [Originally Added On: January 23rd, 2014]
- Eric Schmidt: Encryption will break through the Great Firewall of China [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- From NSA to Gmail: Ex-spy launches free email encryption service [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Tennessee bill takes on NSA encryption-breaking facility at Oak Ridge/SHUT. IT. DOWN. - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Substitute for:Measurements. 1 Episode. Strength of the encryption algorithm - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- RSA Encryption Checkpoint - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Gambling with Secrets 8 8 RSA Encryption 1 - Video [Last Updated On: January 24th, 2014] [Originally Added On: January 24th, 2014]
- Google chairman says 'encrypting everything' could end China's censorship, stop NSA snooping [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Ex-spy launches free email encryption service [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- 3 2 The Data Encryption Standard 22 min - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 3 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- RSA Encryption step 2 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197 - Video [Last Updated On: January 26th, 2014] [Originally Added On: January 26th, 2014]
- Townsend Security Release First Encryption Key Management Module for Drupal [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- RSA Encryption step 5 - Video [Last Updated On: January 27th, 2014] [Originally Added On: January 27th, 2014]
- Lavabit case highlights legal fuzziness around encryption rules [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- A Beginner's Guide To Encryption: What It Is And How To Set It Up [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- How App Developers Leave the Door Open to NSA Surveillance [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- Intro to RSA Encryption step 1 - Video [Last Updated On: January 28th, 2014] [Originally Added On: January 28th, 2014]
- “Honey Encryption” Will Bamboozle Attackers with Fake Secrets [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Encryption - A Life Unlived (DEMO) - Video [Last Updated On: January 30th, 2014] [Originally Added On: January 30th, 2014]
- Baffle thy enemy: The case for Honey Encryption [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- New AlertBoot Encryption Reports Make Dental HIPAA Compliance Easier [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - The Protest - Video [Last Updated On: January 31st, 2014] [Originally Added On: January 31st, 2014]
- Encryption - New Life - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Intro - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Encryption - Blank Canvas - Video [Last Updated On: February 1st, 2014] [Originally Added On: February 1st, 2014]
- Security First SPxBitFiler-IPA encryption pattern for the IBM PureApplication System - Video [Last Updated On: February 3rd, 2014] [Originally Added On: February 3rd, 2014]
- Revolutionary new cryptography tool could make software unhackable [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- viaForensics webinar: Mobile encryption - the good, bad, and broken - Aug 2013 - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- K.OStream 0.2 File Encryption Test - Video [Last Updated On: February 4th, 2014] [Originally Added On: February 4th, 2014]
- Tumblr adds SSL encryption option, but not as the default [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Latest Java Project Source Code on Chaotic Image Encryption Techniques - Video [Last Updated On: February 5th, 2014] [Originally Added On: February 5th, 2014]
- Encryption - University of Illinois at Urbana–Champaign [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- A Beginner's Guide to Encryption: What It Is and How to ... [Last Updated On: February 6th, 2014] [Originally Added On: February 6th, 2014]
- Real Data Encryption Software is More Important than Ever ... [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Caesar Cipher Encryption method With example in C Language - Video [Last Updated On: February 8th, 2014] [Originally Added On: February 8th, 2014]
- Hytera DMR 256 bit encryption - Video [Last Updated On: February 9th, 2014] [Originally Added On: February 9th, 2014]
- Townsend Security Releases Encryption Key Management Virtual Machine for Windows Azure [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Unitrends Data Backup Webinar: Utilizing The Cloud, Deduplication, and Encryption - Video [Last Updated On: February 10th, 2014] [Originally Added On: February 10th, 2014]
- Main menu [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Use of encryption growing but businesses struggle with it – study [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- SlingSecure Mobile Voice Encryption Installation Video for Android - Video [Last Updated On: February 12th, 2014] [Originally Added On: February 12th, 2014]
- Data breaches drive growth in use of encryption, global study finds [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 2 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Darren Moffat: ZFS Encryption - Part 1 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- How do I configure User Local Recovery in Endpoint Encryption Manager 276 - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Symmetric Cipher (Private-key) Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- SafeGuard File Encryption for Mac - Installation and Configuration - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Fundamentals of Next Generation Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- Tutorial: Einrichten der EgoSecure Endpoint Removable Device Encryption - Video [Last Updated On: February 14th, 2014] [Originally Added On: February 14th, 2014]
- 'PGP' encryption has had stay-powering but does it meet today's enterprise demands? [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Fact or Fiction: Encryption Prevents Digital Eavesdropping [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- RHCSA PREP:answer to question 20 (Central Authentication Using LDAP with TLS/SSL Encryption) - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]
- Protect+ Voice Recorder with Encryption - Video [Last Updated On: February 15th, 2014] [Originally Added On: February 15th, 2014]