Proton Mail: Privacy as Marketed vs. Privacy as Practiced

March 2026
Documented Exchange with Proton AG CEO Andy Yen

On March 5, 2026, 404 Media reported that Proton Mail handed over payment data for an anonymous email account linked to the Stop Cop City movement in Atlanta. Swiss authorities passed that data to the FBI via Mutual Legal Assistance Treaty. The payment trail was enough to identify the person behind the account. They do not appear to have been charged with a crime.

This is the third known instance of Proton providing data that led to the identification of an activist or protester. As a paying Proton customer, I wrote to CEO Andy Yen directly. He responded. What follows is the full exchange, annotated.

01 Opening Correspondence
02 Proton CEO Responds
Fair Point
"For 11 years of operating, 100 million users, just 3 cases, and all 3 no jail sentences, I'd say that's an astoundingly good track record."

He's right that the encryption held in all three cases. No email content was decrypted. That is a meaningful distinction from what would have happened with Gmail, Outlook, or any other major provider. Credit where it's due.

Reframing
"All 3 no jail sentences"

"Nobody went to jail" is not the metric. The person in the Atlanta case was identified to an FBI Domestic Terrorism squad, subjected to a federal search warrant, and had their anonymous identity burned. All of that happened because payment data from Proton provided the link between an anonymous account and a real person. "They weren't ultimately charged" doesn't undo that exposure. Activists, journalists, and dissidents don't evaluate privacy tools by whether they ultimately avoid prison. They evaluate them by whether they get identified at all. Proton knows this, because it's the exact threat model their marketing is built around.

Contested Framing
"The request the biden admin sent to switzerland wasn't just about protest activity, but an investigation into a shooting of a police officer where explosive devices were found"

This framing deserves scrutiny. The January 2023 shooting at the protest site resulted in police killing activist Manuel Paez Teran with 57 rounds. No officers were wearing body cameras. There is no video evidence of return fire. The FBI's own search warrant affidavit did not mention a shooting. The entire RICO prosecution that grew out of this investigation was dismissed by a Fulton County judge in December 2025 as procedurally illegitimate. The question isn't whether Swiss authorities found the allegations serious enough to approve the request. The question is whether Proton independently evaluated those claims or accepted a government's characterization at face value.

Legitimate
"Each time we defy a court order (and we do this regularly), as a director of the company, I take on personal criminal liability"

This is real. Proton's legal challenges to Swiss surveillance law are documented and meaningful. A 2022 Swiss court ruling that email services are not telecommunications providers, and therefore exempt from certain data retention requirements, came directly from Proton's litigation. The personal liability point is not rhetorical. This matters, and it would be dishonest not to acknowledge it.

Tell
"if you actually read the 404media piece, biased as it was"

404 Media reported from court records. Calling the piece "biased" without identifying a factual error is a deflection. If the reporting contained inaccuracies, the correction is simple: name them. Characterizing the source instead of contesting the facts is a tell, not a rebuttal.

Unanswered

The central question was not addressed. Why does Proton retain payment identifiers in a form that can deanonymize users? Every one of these three incidents traces back to metadata, not content. The encryption did its job. The payment architecture didn't. Proton already offers crypto and cash options, which means they understand that credit card payments create an identity link that sits entirely outside the encryption model. A prominent warning at checkout, something that tells users plainly that paying by credit card permanently ties their real identity to the account, would have prevented all three of these stories. That's a product decision, not a legal question.

Reply Sent
03 Follow-up
04 Proton CEO Responds Again
Background
05 Prior Incidents
Case 1 // France, 2021

French police requested, via Europol and Swiss authorities, that Proton log the IP address of a climate activist affiliated with Youth for Climate and a group opposing gentrification near Place Sainte-Marthe in Paris. Proton complied, providing the IP address and browser fingerprint. The activist was arrested. Proton's homepage, which had previously stated "we do not keep any IP logs which can be linked to your anonymous email account," was edited afterward. Proton's CEO stated the company was "deeply concerned" and that "legal tools for serious crimes are being used in this way." Proton's 2020 transparency report showed compliance with over 3,000 orders that year.

Case 2 // Spain, 2024

Proton provided a recovery email address to Spanish authorities, leading to the identification of a member of Democratic Tsunami, a Catalan independence organization. No email content was decrypted.

Case 3 // United States, 2024–2026

The FBI filed an MLAT request through Swiss authorities for payment data associated with defendtheatlantaforest@proton.me, an account linked to the Defend the Atlanta Forest group and Stop Cop City movement. Proton provided a credit card payment identifier, which investigators used to identify the account holder. The person does not appear to have been charged. All RICO charges against 61 Stop Cop City defendants were dismissed in December 2025. The FBI search warrant affidavit was authored by a Domestic Terrorism squad special agent. The Georgia Attorney General has appealed the dismissal.

Pattern

In all three cases, the mechanism is the same: a foreign government routes a request through Swiss legal channels via MLAT or Europol, Swiss authorities approve it, and Proton complies. In all three cases, the target was an activist or protester. In all three cases, encrypted email content was protected, but metadata or payment data was not. The gap is not in the encryption. It is in everything around the encryption.