Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

WRT to TLS, see here: https://transparencyreport.google.com/safer-email/overview?h...

It seems that Helm has no obligation or business need to log any metadata if they are providing each customer with a dedicated relay. Any abuse will come from that relay IP and can trivially be attributed to the correct customer.



> Helm has no obligation or business need to log any metadata

The point of Helm is to provide privacy (and end-user control) through technical means, if I understand correctly. If it's just a matter of trusting motives, I don't need a home server.


I disagree. Seizing data stored on a server in your house is much, much more difficult that seizing data stored on a cloud server.


I can see that going both ways.

The feds know that Apple (for example) are fully lawyered up, and that they need all their legally required paperwork with it's "i"s dotted and "t"s crossed before Apple will even look at their request for your data. While we know they _will_ hand over legally required data when they can and the paperwork is OKed by their legal department, they also very publicly go head to head with law enforcement when those requests are legally questionable or technically impossible.

I suspect an overly broad probable cause warrant to seize all the electronic devices in your house is gonna be much easier to slip past an leo friendly judge and whatever legal representation you can muster up when they dawn-raid you - than "slipping one past" Apple's legal team.

Having said that, if you've got the feds interested in your digital comms, you probably want to be getting your security advice from a much more private and trustworthy source than randoms on Hackernews...


Also, if the feds raide your home you will know that your data was compromised. Apple won/can't tell you..


> Also, if the feds raide your home you will know that your data was compromised.

Not necessarily: https://en.m.wikipedia.org/wiki/Sneak_and_peek_warrant


nope. it's only fractionally more difficult as "the man" has to physically come to your house.

additionally, email is more usefully between 2+ parties. For normal people, the other parties are very likely to be using a cloud email provider. I would not be surprised to learn that it is common to issue a warrant not for a specific recipient, but for anyone that has corresponded with a specific person, ie for the sender instead of the receiver -> google, give me all emails sent by user@foo to any user on your server.

this is actually a big problem of SMTP and a big weakness of helm. i didn't study the product but it seems that it would be difficult for a user to know (and prove) that another user is a helm'er. if data seizure is the issue you care about, protonmail and other such services are a better solution.


Not really. If you are under investigation, seizing your server is as simple as a search warrant. The challenge is accessing the data - if you've encrypted it well, it's impossible to access. However, on your own server, you may get complacent and allow some data leakage.

Major providers like Gmail and ICloud will have a longer and more convoluted process to provide your data to state actors, but analysing that data is going to be far easier since it will come in a standard format.

If your goal is to make your data difficult to seize, a better option is probably to self-host on either a cheap VPS or a corporate-grade cloud service. That keeps the data out of reach of a warrant on your home, and keeps it unreadable after they've actually jumped through the hoops to seize it from your provider.


On a VPS, full disk encryption is not effective because the keys can be dumped from the hypervisor.


Not to mention having to wake up in the middle of the night when the VPS provider decides to reboot your VM so you can decrypt the volume on boot. Been there, done that for years.


not a problem for SMTP, which is store-and-forward.


According to this page (https://thehelm.com/pages/technology), the following is logged.

* Name, address, payment information, domain, DNS records

* Device diagnostics (such as temperature), software versions, enabled services, connection status, connection type, serial number

* Anything related to customer support, including information customers provide

So plenty of information to uniquely identify a system. The last bullet is a little concerning as it seems to be a catch-all.


The last bullet isn't intended to be a catch-all but to reflect the fact that we can't control what customers provide us via customer support.


I don't see what the issue with uniquely identifying a system is. The main metadata of concern is what other mail servers are being interacted with.


If everything has to go through their relay, they can pretty easily see what mail servers are being interacted with.


Thanks.

Please see my other questions here. https://news.ycombinator.com/item?id=18243685


Yes, but they don't have to log that, and given the way the system is described there's no reason it would by default.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: