GET https://kbin.spritesserver.nl/u/@ReversalHatchery@beehaw.org/active/2023-11-16::2023-11-16

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
0.26 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.07 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1571
  +user: Proxies\__CG__\App\Entity\User {#1729 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
  +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
  +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
  +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
  +body: """
    According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
    \n
    The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
    \n
    “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 12
  +favouriteCount: 14
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1700112316 {#1736
    date: 2023-11-16 06:25:16.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1689 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1705 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
  +badges: Doctrine\ORM\PersistentCollection {#2386 …}
  +children: [
    App\Entity\EntryComment {#1696
      +user: App\Entity\User {#265 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1571 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
      +body: """
        > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
        \n
        As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
        \n
        A few sources:\n
        \n
        [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
        \n
        > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
        \n
        [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
        \n
        […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
        \n
        > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
        \n
        Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
        If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1700100027 {#1428
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@throws_lemy@lemmy.nz"
        "@privacybro@lemmy.ninja"
        "@ReversalHatchery@beehaw.org"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1668 …}
      +nested: Doctrine\ORM\PersistentCollection {#1666 …}
      +votes: Doctrine\ORM\PersistentCollection {#1669 …}
      +reports: Doctrine\ORM\PersistentCollection {#1677 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
      -id: 128730
      -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://beehaw.org/comment/1654271"
      +editedAt: null
      +createdAt: DateTimeImmutable @1700100027 {#1440
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +"title": 128730
    }
  ]
  -id: 12172
  -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
  -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699828678
  +visibility: "visible             "
  +apId: "https://lemmy.nz/post/3276542"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699754178 {#1698
    date: 2023-11-12 02:56:18.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
Proxies\__CG__\App\Entity\Entry {#1571
  +user: Proxies\__CG__\App\Entity\User {#1729 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
  +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
  +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
  +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
  +body: """
    According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
    \n
    The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
    \n
    “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 12
  +favouriteCount: 14
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1700112316 {#1736
    date: 2023-11-16 06:25:16.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1689 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1705 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
  +badges: Doctrine\ORM\PersistentCollection {#2386 …}
  +children: [
    App\Entity\EntryComment {#1696
      +user: App\Entity\User {#265 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1571 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
      +body: """
        > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
        \n
        As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
        \n
        A few sources:\n
        \n
        [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
        \n
        > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
        \n
        [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
        \n
        […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
        \n
        > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
        \n
        Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
        If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1700100027 {#1428
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@throws_lemy@lemmy.nz"
        "@privacybro@lemmy.ninja"
        "@ReversalHatchery@beehaw.org"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1668 …}
      +nested: Doctrine\ORM\PersistentCollection {#1666 …}
      +votes: Doctrine\ORM\PersistentCollection {#1669 …}
      +reports: Doctrine\ORM\PersistentCollection {#1677 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
      -id: 128730
      -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://beehaw.org/comment/1654271"
      +editedAt: null
      +createdAt: DateTimeImmutable @1700100027 {#1440
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +"title": 128730
    }
  ]
  -id: 12172
  -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
  -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699828678
  +visibility: "visible             "
  +apId: "https://lemmy.nz/post/3276542"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699754178 {#1698
    date: 2023-11-12 02:56:18.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
Proxies\__CG__\App\Entity\Entry {#1571
  +user: Proxies\__CG__\App\Entity\User {#1729 …}
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
  +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
  +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
  +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
  +body: """
    According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
    \n
    The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
    \n
    “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
    """
  +type: "link"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 12
  +favouriteCount: 14
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1700112316 {#1736
    date: 2023-11-16 06:25:16.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1689 …}
  +votes: Doctrine\ORM\PersistentCollection {#1691 …}
  +reports: Doctrine\ORM\PersistentCollection {#1705 …}
  +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
  +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
  +badges: Doctrine\ORM\PersistentCollection {#2386 …}
  +children: [
    App\Entity\EntryComment {#1696
      +user: App\Entity\User {#265 …}
      +entry: Proxies\__CG__\App\Entity\Entry {#1571 …2}
      +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
      +image: null
      +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
      +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
      +body: """
        > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
        \n
        As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
        \n
        A few sources:\n
        \n
        [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
        \n
        > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
        \n
        [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
        \n
        […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
        \n
        > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
        \n
        Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
        If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
        """
      +lang: "en"
      +isAdult: false
      +favouriteCount: 0
      +score: 0
      +lastActive: DateTime @1700100027 {#1428
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +ip: null
      +tags: null
      +mentions: [
        "@throws_lemy@lemmy.nz"
        "@privacybro@lemmy.ninja"
        "@ReversalHatchery@beehaw.org"
      ]
      +children: Doctrine\ORM\PersistentCollection {#1668 …}
      +nested: Doctrine\ORM\PersistentCollection {#1666 …}
      +votes: Doctrine\ORM\PersistentCollection {#1669 …}
      +reports: Doctrine\ORM\PersistentCollection {#1677 …}
      +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
      +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
      -id: 128730
      -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
      +ranking: 0
      +commentCount: 0
      +upVotes: 0
      +downVotes: 0
      +visibility: "visible             "
      +apId: "https://beehaw.org/comment/1654271"
      +editedAt: null
      +createdAt: DateTimeImmutable @1700100027 {#1440
        date: 2023-11-16 03:00:27.0 +01:00
      }
      +"title": 128730
    }
  ]
  -id: 12172
  -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
  -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1699828678
  +visibility: "visible             "
  +apId: "https://lemmy.nz/post/3276542"
  +editedAt: null
  +createdAt: DateTimeImmutable @1699754178 {#1698
    date: 2023-11-12 02:56:18.0 +01:00
  }
  +__isInitialized__: true
   …2
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#1696
  +user: App\Entity\User {#265 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1571
    +user: Proxies\__CG__\App\Entity\User {#1729 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
    +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
    +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
    +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
    +body: """
      According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
      \n
      The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
      \n
      “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 12
    +favouriteCount: 14
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1700112316 {#1736
      date: 2023-11-16 06:25:16.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1689 …}
    +votes: Doctrine\ORM\PersistentCollection {#1691 …}
    +reports: Doctrine\ORM\PersistentCollection {#1705 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
    +badges: Doctrine\ORM\PersistentCollection {#2386 …}
    +children: [
      App\Entity\EntryComment {#1696}
    ]
    -id: 12172
    -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
    -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699828678
    +visibility: "visible             "
    +apId: "https://lemmy.nz/post/3276542"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699754178 {#1698
      date: 2023-11-12 02:56:18.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
  +body: """
    > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
    \n
    As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
    \n
    A few sources:\n
    \n
    [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
    \n
    > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
    \n
    [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
    \n
    […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
    \n
    > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
    \n
    Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
    If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1700100027 {#1428
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@throws_lemy@lemmy.nz"
    "@privacybro@lemmy.ninja"
    "@ReversalHatchery@beehaw.org"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1668 …}
  +nested: Doctrine\ORM\PersistentCollection {#1666 …}
  +votes: Doctrine\ORM\PersistentCollection {#1669 …}
  +reports: Doctrine\ORM\PersistentCollection {#1677 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
  -id: 128730
  -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1654271"
  +editedAt: null
  +createdAt: DateTimeImmutable @1700100027 {#1440
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +"title": 128730
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#1696
  +user: App\Entity\User {#265 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1571
    +user: Proxies\__CG__\App\Entity\User {#1729 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
    +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
    +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
    +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
    +body: """
      According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
      \n
      The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
      \n
      “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 12
    +favouriteCount: 14
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1700112316 {#1736
      date: 2023-11-16 06:25:16.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1689 …}
    +votes: Doctrine\ORM\PersistentCollection {#1691 …}
    +reports: Doctrine\ORM\PersistentCollection {#1705 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
    +badges: Doctrine\ORM\PersistentCollection {#2386 …}
    +children: [
      App\Entity\EntryComment {#1696}
    ]
    -id: 12172
    -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
    -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699828678
    +visibility: "visible             "
    +apId: "https://lemmy.nz/post/3276542"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699754178 {#1698
      date: 2023-11-12 02:56:18.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
  +body: """
    > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
    \n
    As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
    \n
    A few sources:\n
    \n
    [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
    \n
    > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
    \n
    [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
    \n
    […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
    \n
    > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
    \n
    Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
    If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1700100027 {#1428
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@throws_lemy@lemmy.nz"
    "@privacybro@lemmy.ninja"
    "@ReversalHatchery@beehaw.org"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1668 …}
  +nested: Doctrine\ORM\PersistentCollection {#1666 …}
  +votes: Doctrine\ORM\PersistentCollection {#1669 …}
  +reports: Doctrine\ORM\PersistentCollection {#1677 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
  -id: 128730
  -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1654271"
  +editedAt: null
  +createdAt: DateTimeImmutable @1700100027 {#1440
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +"title": 128730
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#1696
  +user: App\Entity\User {#265 …}
  +entry: Proxies\__CG__\App\Entity\Entry {#1571
    +user: Proxies\__CG__\App\Entity\User {#1729 …}
    +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1680 …}
    +slug: "Alleged-RCMP-leaker-says-he-was-tipped-off-that-police"
    +title: "Alleged RCMP leaker says he was tipped off that police targets had 'moles' in law enforcement"
    +url: "https://www.cbc.ca/news/politics/ortis-testimony-transcripts-1.7026011"
    +body: """
      According to Ortis, briefed him about a “storefront” that was being created to attract criminal targets to an online encryption service. A storefront, said Ortis, is a fake business or entity, either online or bricks-and-mortar, set up by police or intelligence agencies.\n
      \n
      The plan was to have criminals use the storefront — an online end-to-end encryption service called Tutanota — to allow authorities to collect intelligence about them.\n
      \n
      “So if targets begin to use that service, the agency that’s collecting that information would be able to feed it back, that information, into the Five Eyes system, and then back into the RCMP,” Ortis said.
      """
    +type: "link"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 12
    +favouriteCount: 14
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1700112316 {#1736
      date: 2023-11-16 06:25:16.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1689 …}
    +votes: Doctrine\ORM\PersistentCollection {#1691 …}
    +reports: Doctrine\ORM\PersistentCollection {#1705 …}
    +favourites: Doctrine\ORM\PersistentCollection {#2457 …}
    +notifications: Doctrine\ORM\PersistentCollection {#2453 …}
    +badges: Doctrine\ORM\PersistentCollection {#2386 …}
    +children: [
      App\Entity\EntryComment {#1696}
    ]
    -id: 12172
    -titleTs: "'alleg':1 'enforc':16 'law':15 'leaker':3 'mole':13 'polic':10 'rcmp':2 'say':4 'target':11 'tip':7"
    -bodyTs: "'abl':90 'accord':1 'agenc':45,82 'allow':66 'attract':14 'author':67 'back':94,104 'begin':76 'brick':36 'bricks-and-mortar':35 'brief':4 'busi':29 'call':63 'collect':69,85 'creat':12 'crimin':15,51 'either':32 'encrypt':20,61 'end':58,60 'end-to-end':57 'entiti':31 'eye':100 'fake':28 'feed':92 'five':99 'inform':87,96 'intellig':44,70 'mortar':38 'onlin':19,33,56 'orti':3,25,108 'plan':47 'polic':42 'rcmp':107 'said':24,109 'servic':21,62,80 'set':39 'storefront':8,23,54 'system':101 'target':16,75 'tutanota':64 'use':52,78 'would':88"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1699828678
    +visibility: "visible             "
    +apId: "https://lemmy.nz/post/3276542"
    +editedAt: null
    +createdAt: DateTimeImmutable @1699754178 {#1698
      date: 2023-11-12 02:56:18.0 +01:00
    }
    +__isInitialized__: true
     …2
  }
  +magazine: Proxies\__CG__\App\Entity\Magazine {#1572 …}
  +image: null
  +parent: Proxies\__CG__\App\Entity\EntryComment {#1650 …}
  +root: Proxies\__CG__\App\Entity\EntryComment {#1679 …}
  +body: """
    > on the proton encryption, i did know about this but does that apply to proton-to-proton, proton-to-NonProton, or both? if you have details on this let me know.\n
    \n
    As I know it applies to both. Formerly they were asking (among other things) about the titles of your latest emails for account recovery. (after I have put all the links here I realized that these don’t give a details on whether this also applies to inter-proton messages…)\n
    \n
    A few sources:\n
    \n
    [proton.me/…/proton-mail-encryption-explained](https://proton.me/support/proton-mail-encryption-explained)\n
    \n
    > Subject lines and recipient/sender email addresses are encrypted but not end-to-end encrypted.\n
    \n
    [www.reddit.com/r/ProtonMail/comments/…/eiphhs7/?c…](https://www.reddit.com/r/ProtonMail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)\n
    \n
    […stackexchange.com/…/why-is-some-meta-data-not-en…](https://security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)\n
    \n
    > either way the fact that they dont makes me feel that proton is a similar honeypot to signal and telegram, where they make a compromise with the five eyes, to give them metadata even if actual contents are safe. metadata can be much more powerful than contents often times\n
    \n
    Yeah, might as well be. But if it is, I’m afraid we won’t get to know for a few decades, if ever. And I think it’s still better than the alternatives… the alternative email providers, that is.  \n
    If it comforts you, in their reddit comment I linked they mention (in 2019…) that there’s a proposal they support for openpgp to be able to have an encrypted subject line.
    """
  +lang: "en"
  +isAdult: false
  +favouriteCount: 0
  +score: 0
  +lastActive: DateTime @1700100027 {#1428
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@throws_lemy@lemmy.nz"
    "@privacybro@lemmy.ninja"
    "@ReversalHatchery@beehaw.org"
  ]
  +children: Doctrine\ORM\PersistentCollection {#1668 …}
  +nested: Doctrine\ORM\PersistentCollection {#1666 …}
  +votes: Doctrine\ORM\PersistentCollection {#1669 …}
  +reports: Doctrine\ORM\PersistentCollection {#1677 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1576 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1587 …}
  -id: 128730
  -bodyTs: "'/eiphhs7':111 '/proton-mail-encryption-explained':89 '/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':120 '/r/protonmail/comments/':110 '/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':115 '/support/proton-mail-encryption-explained)':92 '/why-is-some-meta-data-not-en':117 '2019':223 'abl':235 'account':56 'actual':156 'address':98 'afraid':181 'also':78 'altern':203,205 'among':45 'appli':13,38,79 'ask':44 'better':200 'c':112 'comfort':212 'comment':217 'compromis':145 'content':157,167 'decad':191 'detail':28,74 'dont':127 'either':121 'email':54,97,206 'encrypt':4,100,107,239 'end':104,106 'end-to-end':103 'even':154 'ever':193 'eye':149 'fact':124 'feel':130 'five':148 'former':41 'get':185 'give':72,151 'honeypot':136 'inter':82 'inter-proton':81 'know':7,33,36,187 'latest':53 'let':31 'line':94,241 'link':64,219 'm':180 'make':128,143 'mention':221 'messag':84 'metadata':153,160 'might':171 'much':163 'nonproton':22 'often':168 'openpgp':232 'power':165 'propos':228 'proton':3,16,18,20,83,132 'proton-to-nonproton':19 'proton-to-proton':15 'proton.me':88,91 'proton.me/support/proton-mail-encryption-explained)':90 'provid':207 'put':61 'realiz':67 'recipient/sender':96 'recoveri':57 'reddit':216 'safe':159 'security.stackexchange.com':119 'security.stackexchange.com/questions/196265/why-is-some-meta-data-not-encrypted-in-proton-mail)':118 'signal':138 'similar':135 'sourc':87 'stackexchange.com':116 'still':199 'subject':93,240 'support':230 'telegram':140 'thing':47 'think':196 'time':169 'titl':50 'way':122 'well':173 'whether':76 'won':183 'www.reddit.com':109,114 'www.reddit.com/r/protonmail/comments/':108 'www.reddit.com/r/protonmail/comments/b1ect2/a_question_about_encryption_metadata_subject/eiphhs7/?context=3)':113 'yeah':170"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://beehaw.org/comment/1654271"
  +editedAt: null
  +createdAt: DateTimeImmutable @1700100027 {#1440
    date: 2023-11-16 03:00:27.0 +01:00
  }
  +"title": 128730
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED ROLE_ADMIN
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
10 DENIED ROLE_MODERATOR
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details