±Forensic Focus Partners

Become an advertising partner

±Your Account


Username
Password

Forgotten password/username?

Site Members:

New Today: 0 Overall: 36115
New Yesterday: 5 Visitors: 113

±Follow Forensic Focus

Forensic Focus Facebook PageForensic Focus on TwitterForensic Focus LinkedIn GroupForensic Focus YouTube Channel

RSS feeds: News Forums Articles

±Latest Articles

±Latest Videos

±Latest Jobs

Proton Mail Acquisition

Computer forensics discussion. Please ensure that your post is not better suited to one of the forums below (if it is, please post it there instead!)
Reply to topicReply to topic Printer Friendly Page
Forum FAQSearchView unanswered posts
Page Previous  1, 2, 3 
  

passcodeunlock
Senior Member
 

Re: Proton Mail Acquisition

Post Posted: Jul 30, 19 14:45

Whichever you like Smile
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 
 
  

deeFIR
Member
 

Re: Proton Mail Acquisition

Post Posted: Aug 05, 19 05:37

- passcodeunlock
That is just another sample of bureaucracy and bad judgement Smile

Let's say there is a child abusing case, with proof in a free protonmail account, without an acquisition possibility in a forensic way. The LE can't do nothing, because the account owner is not giving his consent ?! What a joke, no ?!


If you want to live in a lawless society, go for it.

You can still perform an acquisition in at least two methods - 1) visual examination, or 2) manual exporting of each mail message. Those are still valid acquisition methods. It would also be documented as to why you weren't able to perform an acquisition of the emails with a specific tool.  
 
  

passcodeunlock
Senior Member
 

Re: Proton Mail Acquisition

Post Posted: Aug 05, 19 13:31

- deeFIR
If you want to live in a lawless society, go for it.

You can still perform an acquisition in at least two methods - 1) visual examination, or 2) manual exporting of each mail message. Those are still valid acquisition methods. It would also be documented as to why you weren't able to perform an acquisition of the emails with a specific tool.


@deeFIR: No, I want to live in a society with laws, but not stupid ones.

As for visual examination or manual exporting of each message, how can you do it if the user didn't give his / her consent for it ?! What would that be different to the first proposal I made - to upgrade the account to a payed version and use FEC method ?!
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 
 
  

deeFIR
Member
 

Re: Proton Mail Acquisition

Post Posted: Aug 06, 19 01:18

- passcodeunlock
- deeFIR
If you want to live in a lawless society, go for it.

You can still perform an acquisition in at least two methods - 1) visual examination, or 2) manual exporting of each mail message. Those are still valid acquisition methods. It would also be documented as to why you weren't able to perform an acquisition of the emails with a specific tool.


@deeFIR: No, I want to live in a society with laws, but not stupid ones.

As for visual examination or manual exporting of each message, how can you do it if the user didn't give his / her consent for it ?! What would that be different to the first proposal I made - to upgrade the account to a payed version and use FEC method ?!


If you have a valid authority for search/seizure and the account is already signed in - then you can perform a manual acquisition/visual examination. Same as live forensics on a desktop/laptop which is already signed in. That authority doesn't necessarily extend to modifying the underlying account data and changing payment methods etc. It's up to you to determine the lawful actions within your authorities, not to debate the legitimacy of legislation or regulations.  
 
  

passcodeunlock
Senior Member
 

Re: Proton Mail Acquisition

Post Posted: Aug 06, 19 08:03

- passcodeunlock
I never said that a prosecutor or a judge should not allow the access.


It looks like we should close the topic, you get back almost to where we started Smile

Of course all the legal background is needed for a task to be done right, otherwise the work done is void, but if there is an easy and legit method, I don't see any reasons why somebody should choose to deal with the harder way.
_________________
Apple passcode unlock + decrypted filesystem dump, Android user locks unlock + physical dump with decrypted userdata partition. We provide our services world-wide, but we reserve the right for choosing which tasks we take and which we deny! 
 

Page 3 of 3
Page Previous  1, 2, 3