From 5.1.1;An Analysis of the ProtonMail Cryptographic Architecture. - Nadim Kobeissi, 21Nov2018.
"However, even if A has used the ProtonMail smartphone applications for the entire lifetime of her ProtonMail account thus far and then logs into ProtonMail via the web application just once, P still obtains A's PGP secret key and is therefore able to not only impersonate A going forward but also to retroactively decrypt all of A's previous communications.
Jason Evangelho reviews the $99 Pinebook (running KDE neon) on Forbes: "For now I have to say I’m seriously impressed."
Support Specialist for EDI Transaction
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!