riseup.net likely compromised

Dear Fellow “Whonixens”,

Indeed this is an old thread. Please excuse me for resurrecting it simply because it can help allay any unintended FUD which might linger on in a person’s mind.

Nevertheless, MODs please feel free to re-allocate this post as you deem fit. TIA

Direct Reference to source of information (via the 3 URLs below)
@V3 onion
http://vww6ybal4bd7szmgncyruucpgfkqahzddi37ktceo3ah7ngmcopnpyyd.onion/about-us/press/canary-statement/index.en.html
@V2 onion
http://nzh3fv6jc6jskki3.onion/en/about-us/press/canary-statement
OR
Standard HTTP URL
https://riseup.net/en/about-us/press/canary-statement

I have reproduced the entire text of the post from Riseup below for your convenience -

Riseup moves to encrypted email in response to legal requests.

Feburary 16, 2017

After exhausting our legal options, Riseup recently chose to comply with two sealed warrants from the FBI, rather than facing contempt of court (which would have resulted in jail time for Riseup birds and/or termination of the Riseup organization). The first concerned the public contact address for an international DDoS extortion ring. The second concerned an account using ransomware to extort money from people.

Extortion activities clearly violate both the letter and the spirit of the social contract [1] we have with our users: We have your back so long as you are not pursuing exploitative, misogynist, racist, or bigoted agendas.

There was a “gag order” that prevented us from disclosing even the existence of these warrants until now. This was also the reason why we could not update our “Canary” [2].

We have taken action to ensure that Riseup never again has access to a user’s stored email in plaintext. Starting today, all new Riseup email accounts will feature personally encrypted storage on our servers, only accessible by you. In the near future, we will begin to migrate all existing accounts to use this new system (for technical details, see [3]).

To be absolutely clear, this type of encryption is not end-to-end message encryption. With Riseup’s new system, you still put faith in the server while you are logged in. For full end-to-end email encryption, as before, you must use a client that supports OpenPGP (and is not web-based).

We are working to roll out a more comprehensive end-to-end system in the coming year, but until that is ready, we are deploying personally encrypted storage in the mean time.

in solidarity,
The Riseup Birds

Questions

Q: Are you compromised by law enforcement?

A: No. We have never permitted installation of any hardware or software monitoring on any system that we control; law enforcement has not taken our servers; does not, and has never had access to them. We would rather stop being Riseup before we did that.

Q: Couldn’t the government just make you say that?

A: Forced speech is actually quite rare in the US legal context. It’s usually only in cases of consumer protection where the government has been successful in compelling speech (e.g. forced cigarette warnings). Nevertheless, no they aren’t forcing us to say anything.

Q: Why didn’t you update your canary?

A: In the Winter of 2016, the canary was not updated on time. The canary was so broad that any attempt to issue a new one would be a violation of a gag order related to an investigation into a DDoS extortion ring and ransomware operation. This is not desirable, because if any one of a number of minor things happen, it signals to users that a major thing has happened.

Q: Why does the new Canary not mention gag orders, FISA court orders, National Security Letters, etc?

A: Our initial Canary strategy was only harming users by freaking them out unnecessarily when minor events happened. A Canary is supposed to signal important risk information to users, but there is also danger in signaling the wrong thing to users or leading to general fear and confusion for no good reason. The current Canary is limited to significant events that could compromise the security of Riseup users.

[1]: https://riseup.net/tos
[2]: https://riseup.net/canary
[3]: https://0xacab.org/riseuplabs/trees
1 Like

I never read this thread until now.

Are there any reputable sources for aggregating warrant canary data? I was thinking a cool little app idea MVP could be something like

  1. aggregate active sites with warrant canary
  2. check daily for warrant canary changes
  3. post a tweet when a warrant canary is gone or has been modified
1 Like

The closest thing there was Canarywatch. Now only to be found on the web archive.

EFF blog post reasons why it was deprecated:

Other than that, I don’t think there is still a lot activity related to canaries.

1 Like

So, which email do you recommend using now, in 2023?

Source anonymousplanet

  • 2021, Proton, Proton logged IP address of French activist after an order by Swiss authorities
  • 2021, The Germany-based mail provider Tutanota was forced to monitor specific accounts for 3 months
  • 2020, The Germany-based mail provider Tutanota was forced to implement a backdoor to intercept and save copies of the unencrypted e-mails of one user (they did not decrypt the stored e-mail).

Use any email provider which allow you to use your own encryption, ALWAYS consider your emails will be logged on the server side, your metadata…

So riseup or danwin1210 are still good, yet there is no security design to make you believe they are better than just using gmail.

difference between them and gmail is only on one thing: which is the ability of using onion services for smtp/pop3

other than this i dont have something in mind that they are better than a gmail or any free email provider + your own GPG encryption.