1 min read

Proton Mail disclosed payment data to Swiss authorities, enabling FBI to unmask Stop Cop City protester

Privacy-focused email provider Proton Mail provided Swiss authorities with payment data that the FBI used to identify an anonymous account affiliated with the Stop Cop City movement in Atlanta, court records show.

What happened

According to court records reviewed by 404 Media, Proton Mail provided Swiss authorities with payment data that the FBI subsequently used to determine the identity behind an anonymous account affiliated with the Stop Cop City movement and Defend the Atlanta Forest (DTAF) group in Atlanta.

The disclosure reveals the operational limits of Proton Mail’s privacy model. While the service prides itself on end-to-end encryption and operation under Swiss privacy law, the case shows that payment metadata — information about who paid for the account and how — remains accessible to authorities through legal orders.

The underlying investigation targeted DTAF and Stop Cop City activists protesting a police training center planned next to Intrenchment Creek Park. Authorities investigated the group for alleged connections to arson, vandalism, and doxing. Charges against more than 60 people have since been dropped.

Why it matters

This case illustrates a critical gap between encryption promises and operational reality. Proton Mail cannot provide email content to authorities because of its end-to-end encryption architecture — but it can and does provide metadata, including payment information linked to account registration.

For users who assumed anonymity came from using Proton Mail, this is a stark reminder: encryption protects message content, not identity. If an account is registered with payment information that traces back to a real person (credit card, bank account), or if Swiss authorities receive a legal order, that linkage can be disclosed.

The case also signals a pattern: privacy-focused service providers face the same legal order compliance requirements as mainstream platforms. The difference is not immunity from disclosure, but what data they have available to disclose.

Assessment

The strongest signal here is not about Proton Mail’s competence or intentions, but about the legal and infrastructural constraints that affect all service providers. Proton Mail operates under Swiss law, which has different privacy standards than US law, but Swiss authorities still comply with requests from US law enforcement through mutual legal assistance treaties (MLATs) and bilateral agreements.

For anyone relying on Proton Mail for true anonymity, the lesson is structural: if your account is tied to a payment method that connects to your identity, that connection can be traced. True anonymity requires both encrypted communication and payment anonymity (cash, cryptocurrency, or prepaid methods).

  • If anonymity is a requirement, fund Proton Mail accounts with cash or cryptocurrency rather than payment cards or bank transfers
  • Understand that encryption protects message content, not metadata (sender, recipient, payment records, account creation patterns)
  • Review account creation and payment records for any privacy-sensitive accounts and evaluate whether payment linkage creates operational risk
  • Monitor how privacy-focused providers respond to legal orders and what data they retain, especially payment and billing information
  • Consider whether your threat model requires email encryption, payment anonymity, or both

Further reading