The day your financial choices stopped being private

The Bank Secrecy Act of 1970 quietly flipped the switch on surveillance.

Published October 25, 2025 – By Naomi Brockwell

This week marks the 55th anniversary of the Bank Secrecy Act (BSA), a pivotal law that set us on the road to total financial surveillance. Last week I wrote about ways in which the Patriot Act eroded financial privacy, but the modern shift really began in 1970 with the BSA. Since its introduction, the BSA regime has grown staggeringly, and now touches basically every corner of the financial system. Financial privacy used to be assumed, but today the norm has flipped, and pervasive monitoring is treated as ordinary.

Let’s look back over five decades to see what changed, how much privacy we lost, and how this new baseline of surveillance became "just the way things are".

You can watch our video on the history of financial surveillance here.

The big shift

It appears that the collective memory has faded. We’ve forgotten that just a few decades ago, withdrawing one’s own funds was a straightforward right. There were no probing questions about the intended use of those funds or one’s occupation. The routine sharing of bulk transaction data with countless third parties was not the standard.

Today is a different story. We are required to justify our routine financial activities, authenticate our identity, and defend our choices at every financial turn. There has never been so much friction between us and our own money, with surveillance hurdles at every juncture just to pay for something online, and this new normal is an ingrained part of our expectations of using the financial ecosystem.

On top of that, behind the scenes, data pipelines spray a firehose of personal information to countless invisible players, and the data gets cycled from institutions, to brokers, to government entities, and back the other way.

How individuals interacted with the financial system 55 years ago versus today is night and day. Times really have changed, but they changed slowly, with a lot of these changes creeping in behind the scenes before the public ever realized what was going on.

The great privacy paradox

So we’ve established that financial privacy has never been worse. But here’s the confusing part about the situation: many people still go about their daily lives behaving as if what they do just stays between them and their bank, or between them and a given merchant.

A paradoxical situation has emerged, where most people continue to believe in a notion of financial privacy that has ceased to exist.

This widespread assumption that financial activities remain confidential, safeguarded by banks or credit unions, contrasts starkly with reality. In truth, financial privacy in the United States is more illusory than real.

How do we explain this mismatch between what people believe is true and the actual state of financial privacy?

First, privacy was the standard for so long, and then the systematic dismantling of our financial privacy occurred gradually over time without people really paying attention.

Second, the bulk of this increased surveillance has been intentionally kept hidden from the public.

This is the most insidious part of the situation, which I want to make very clear in this newsletter. The privacy we think we have and the privacy we actually have are very different things. Governments and banks would never have been able to get away with this shift if they hadn’t deliberately kept it out of view.

To explore the history of how financial privacy slowly disappeared, and to unveil the extensive financial surveillance apparatus that remains largely opaque to the general public, we have to go back through history and look carefully at how all of this surveillance crept in.

This analysis primarily focuses on developments within the United States, but the implications are global, thanks to the U.S. exporting its legislative and regulatory frameworks abroad. The trend toward financial surveillance is worldwide, with governments now monitoring payment systems across borders.

Where it all started

The year 1970 heralded a transformative period in financial privacy with the enactment of the Bank Secrecy Act. Its aim was to address concerns over secret foreign bank accounts by gathering more information on people’s financial activities, in order to combat the concealment of wealth in overseas accounts.

The BSA introduced a paradigm shift by requiring financial institutions to maintain records of customers’ transactions and personal information and to report significant transactions, specifically those exceeding $10,000, to the Treasury Department. This legislative move transformed financial professionals into de facto government informants, reporting on Americans for the mere act of engaging with their finances.

The law sparked considerable debate, drawing criticism from various quarters, including Congress, the banking sector, and civil liberties organizations. The New York Times even reported at the time that the law was unconstitutional. A legal challenge ensued, questioning the BSA’s compatibility with the First, Fourth, and Fifth Amendments.

Central to the legal debate was the Fourth Amendment, which safeguards individuals against unreasonable searches. The mandate for financial institutions to divulge personal financial information without a warrant was perceived as an infringement of this constitutional protection.

Despite these concerns, the Supreme Court ultimately upheld the BSA, reasoning that information shared with banks constitutes business records rather than private data, thus not warranting the same expectation of privacy. This completely undermined the expectation of privacy that people had always had with their banks.

The Supreme Court at the time commented that the reporting requirements for the banks were not an undue burden, because they applied only to “abnormally large transactions.” $10,000 in 1970 was indeed seen as abnormally large, because the purchasing power of the U.S. dollar was so much higher back then.

To put this amount in context, in 1970 $10,000 would buy you a new house in some areas. From this perspective, if you were paying all cash for an entire, brand new house, it might be a suspicious enough and rare enough occurrence that it was not seen as a burden on financial institutions to report this, nor an unreasonable intrusion into people’s daily lives.

However, the BSA never included any adjustment for inflation. Year after year, the purchasing power of the US dollar disappears, which means that this financial surveillance has silently and insidiously crept further and further into our lives. Now this threshold has extended into everyday transactions.

Since 1970, the Bank Secrecy Act’s powers have not only expanded silently through inflation but explicitly through all kinds of amendments that increase its scope.

The Annunzio-Wylie Anti-Money Laundering Act

One subsequent expansion of the BSA worth noting was the Annunzio-Wylie Anti-Money Laundering Act of 1992. It broadened the scope of reportable activities through the introduction of Suspicious Activity Reports (SARs). This shift from reporting threshold-based transactions (of $10,000 or more) to any transaction considered “suspicious,” regardless of size, opened the floodgates to a firehose of financial reporting.

Another big change that the Annunzio-Wylie Anti–Money Laundering Act ushered in was around transparency of these surveillance programs. When the Bank Secrecy Act was first introduced, it was countered with something called the Right to Financial Privacy Act, that essentially said that if people’s finances are being looked into, they at least need to be told about it, and that way individuals would have the right to push back and hold overreaching entities accountable if they felt their rights were being violated.

The 1992 Annunzio-Wylie Anti–Money Laundering Act made it illegal for your bank to tell you if it filed a SAR. To this day, you’re not allowed to know if your bank filed a report to the government for you using your own money.

It also introduced “safe harbors” for banks who share information with law enforcement: under the Annunzio-Wylie Anti–Money Laundering Act banks can’t be sued or held liable for giving data to law enforcement. There were no longer repercussions, or accountability measures to protect citizens against overreach of reporting.

This really ushered in a new era of mass surveillance of the financial activity of innocent Americans. The banking sector’s role has evolved from safeguarding depositor privacy to facilitating government surveillance. It’s also a major reason why people have this illusion of financial privacy. They just don’t realize what’s been happening, by design, because the whole surveillance process has been made confidential.

The Patriot Act

Last week I did a deep dive into the Patriot Act and how it was a watershed moment for financial surveillance, but I’ll provide a quick recap of some of the major changes. Basically, the Patriot Act was the Bank Secrecy Act on steroids. Title III of the Patriot Act, The International Money Laundering Abatement and Financial Anti-Terrorism Act of 2001, aggressively cemented financial surveillance as a normalized part of everyday life.

First was the formalization of “Know Your Customer” (KYC) regulations, which have since become a staple in the arsenal of financial surveillance tools.

Before 2001, banks and institutions determined their own risk tolerance, and what customer information they needed to collect. The Patriot Act introduced minimum ID standards. It enforced a Customer Identification Program (CIP) for every bank, broker-dealers, mutual funds, and other similar institute in the US. These entities had to collect and verify government-issued IDs for every customer. They also had to cross-check identities against government watchlists.

This is when financial anonymity became illegal.

The Patriot Act also allowed unprecedented data sharing across agencies and borders. There used to be stringent rules about which government departments are allowed to share data with each other, again to protect citizens from overreach. Sections 351 and 358 broke down specific information-sharing barriers between the FBI, CIA, NSA, FinCEN, and foreign governments.

The Patriot Act also expanded safe harbor laws and allowed banking information to be shared with intelligence agencies. Mass data pipelines from private banks to the surveillance state were legalized overnight. Banks were encouraged to proactively share customer data with intelligence, without fear of being sued by the customer because they would have legal immunity.

It covered liability under “any contract or other legally enforceable agreement.” So if you had a contract with your bank that they’d keep your information private, the government said the bank now had immunity if they shared that information and broke the contract.

The intent of The Fourth Amendment was to stop the government getting your information without a warrant. But right now we have a system where the government has mandated that banks collect this information of their behalf, demanded they hand over the information, and then granted the banks legal immunity for this sharing or data, even if doing so broke “any contract or other legally enforceable agreement” of privacy between you and your bank.

On top of this, Section 314(b) created a safe harbor for financial institutions to share customer and activity information with other financial institutions, when they in good faith suspect money laundering or terrorist financing. It unleashed a torrent of data sharing, all legally protected.

Banks were now both required to report SARs and other information to the government, and they were legally shielded for aggressively and proactively doing so, and were also allowed to exchange intelligence with other banks. It fueled the private-sector surveillance grid that we have today, and deputized the financial system as investigatory agents in it.

The relationship between banks and Intelligence agencies was also formalized and made permanent. For example, it introduced something called government “broadcast lookups” where FinCEN can blast a query to thousands of financial institutions, and and banks must search their records quickly and report back. This shifted the relationship from passive reporting, to creating on-demand, system-wide queries, where banks have been deputized as active responders and participants.

Under the Patriot Act, FinCEN’s mission was also codified as financial intelligence, giving it a permanent mandate and making it a statutory intel hub.

The result is a permanent, legally protected data flow where financial institutions are effectively deputized, and customer information moves quickly to law enforcement and intelligence agencies.

Furthermore, we were told the Patriot Act would be a temporary measure, but it ended up lasting forever.

Omnibus bills for creeping surveillance

The trend of utilizing omnibus bills to quietly introduce or expand surveillance measures is ongoing. The American Rescue Plan Act of 2021, another omnibus bill, introduced surveillance to anything involving a payment transmitter (for example, PayPal, Venmo, or Cash App) that has $600 or more of transactions in a year.

In 2022, Congress floated the Special Measures to Fight Modern Threats Act, which aimed to eliminate some of the checks and balances placed on the Treasury. The Treasury Secretary has a special ability to sanction transactions and because this is such a powerful tool, there’s always been a check on this power — The Treasury Secretary has to report every time they do this in the Federal Register. The Fight Modern Threats Act tried to remove this reporting requirement, which would allow the Treasury to use these powers even more.

This bill hasn’t been passed, but it also hasn’t gone away either. Similar ideas keep resurfacing while Treasury continues to use existing Section 311 authorities through fresh 2025 actions.

There is an ongoing onslaught of bills that try to expand financial surveillance, and each time another one slips by, financial privacy in our lives is chiseled further and further away. It’s an offensive attack on the privacy expectations of innocent Americans.

Financial surveillance at the border

In September 2025, the Treasury’s Financial Crimes Enforcement Network (FinCEN) renewed and expanded a Geographic Targeting Order (GTO) that dramatically lowers the reporting threshold for cash transactions in certain areas, from $10,000 to transactions as low as $1,000.

This means that thousands of routine financial activities, like cashing a check or sending money to family, are now tracked and reported to federal authorities. The order compels businesses to collect personal information, file detailed reports, and retain records for five years.

Several lawsuits brought by the Institute for Justice have won preliminary injunctions, arguing that the GTO is unconstitutional, burdensome, and offers no proven crime-fighting benefit. Despite those court rulings, the government has appealed and continues to enforce the order in most affected areas.

CBDCs

The worst may be yet to come. Across the world, government officials have been increasingly considering central bank digital currencies, or CBDCs. A CBDC is a national currency that is a direct, digital liability of the central bank. You can think of it as a digital form of the dollar, but it’s much more than that. It would put the government in the middle of every financial transaction.

Rather than having to get our financial information from banks, the government would have access to every transaction directly. While right now, cash still affords people a private means of payment, a CBDC would eventually take the place of digital cash and eliminate that final privacy safeguard.

Furthermore, CBDCs aren’t just a digital form of money. They represent what’s known as programmable money. Rules can be coded directly into the money itself, dictating how it can be used. Money could instantly be frozen, savings seized, or certain transactions could automatically be prohibited according to predetermined rules about how money is allowed to move. Politicians are already salivating over such potential use cases.

It’s possible that the government could even do things like erase money that’s not spent fast enough, if they wanted to stimulate the economy.

Unfortunately, CBDCs are not simply theoretical. Basically every country in the world is currently exploring them. You can take a look at the Human Rights Foundation’s CBDC Tracker to see exactly where each country stands, and who has already launched one.

Those who champion CBDCs talk about how it will make our financial system more efficient, and bring it into the new age. Attention is focused on the shiny rhetoric, while yet another financial surveillance tool is slipped silently into our lives, making financial freedom just that little bit harder.

The cost of a zero-crime society

The legislative journey from the Bank Secrecy Act to the present day reflects a steady expansion of financial surveillance, driven by various rationales from combating crime to national security. When you erode financial privacy, critical questions need to be raised about the balance between security measures and individual rights.

Namely, to what extent should we as a society permit pervasive surveillance in the name of stopping crime?

To answer this question, it’s important to first recognize that the optimal crime rate is not zero. It’s a spicy take, but stick with me.

While a world with zero crime may intuitively seem better than a world with some crime, it depends on the costs of getting to that zero-crime world. We can’t bring the world to a halt to stop someone jaywalking, because the cost is too high. You can’t burn down a city to stop someone stealing a pack of gum. The cost is just too high.

We as a society need to have a conversation about which costs we’re willing to bear, and the balance we want between surveillance and privacy.

Traditionally that balance has been the Constitution, and in particular the Fourth Amendment. But the Fourth Amendment has been decimated in the digital age, and we’ve lost sight of that original Schelling point. We’ve tipped the balance scales in the complete opposite direction of the individual by stripping people of their right to privacy and allowing omnipotent surveillance of every financial activity, in the name of stopping anyone from ever committing a crime. And this cost is far too high.

Privacy is essential for a free society. If you eliminate this very thing that makes a free society possible, no matter what righteous cause you profess to be advancing, it’s a cost we can’t afford to bear.

It’s through surveillance that our freedoms are limited. Every totalitarian regime in existence maintained power through pervasive surveillance. Our financial activities reveal intimate details about us, including our religious beliefs, daily habits, and the causes we support that might hold powerful people accountable or challenge political authority.

Without financial privacy, all of these aspects become vulnerable to exploitation, and those involved are susceptible to being targeted. We must be vigilant against creeping surveillance that shifts the balance of power away from the individual.

And don’t get me wrong, removing the mass-surveillance apparatus we’ve created doesn’t mean ending the fight on crime. It just means respecting Fourth Amendment protections. If the government wants your information, they can get a warrant and prove probable cause. It’s not supposed to be absurdly easy for the government to dive into people’s private information. The purpose of the Constitution is to restrict the powers of government and protect the people.

Yet over the past few decades, we have slowly built a system of unchecked financial surveillance that makes it trivial for the government to search your affairs with impunity, and with almost no oversight or accountability. It’s time to question whether this is the world we want to live in.

I was invited to speak last week on a panel in DC about the history of Financial Surveillance. You can watch the whole talk here.

In summary: This is the new normal, and we need to push back.

The landscape of financial interaction was markedly different fifty years ago. Customers enjoyed greater autonomy in opening accounts and managing their money, often choosing to engage with banks based solely on the cash they possessed. The era was characterized by less scrutinized transactions and, occasionally, the absence of ID requirements for account setup. The discretion once afforded to banks in determining necessary information for account creation has been supplanted by federal mandates, with customer information no longer confined to the private domain of the bank-customer relationship.

Financial institutions now file 30 million reports annually under the BSA, often erring on the side of over-reporting to avoid potential penalties. This practice underscores the pervasive nature of financial surveillance, with significant costs borne by both the industry and consumers.

The BSA marked a fundamental shift in the confidentiality dynamics between individuals and financial institutions, effectively involving the government in financial interactions instead of allowing people the dignity of privacy.

As surveillance mechanisms become increasingly embedded within the financial system, the safeguards of freedom are slowly chipped away, and the worst part is that nobody really recognizes that this is what is happening. Most people continue to hold on to the illusion of privacy, because what’s actually going on has been both hidden from view and normalized.

Changing this is an uphill battle, but it’s one that’s worth fighting. The first step is just making people aware of how far financial surveillance norms have shifted in just a few decades. The narrative of combating terrorism and serious crimes, while compelling, must be weighed against the potential for overreach and the erosion of fundamental liberties. It is through ongoing dialogue, rigorous oversight, and a commitment to upholding individual rights that society can navigate these challenges, especially in today’s increasingly interconnected world.

You should be able to use your own money without being tracked, profiled, and stored forever in a government database, and without banks being allowed to trade your financial data with each other. Let’s fight to bring back dignity to the financial landscape.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

TNT is truly independent!

We don’t have a billionaire owner, and our unique reader-funded model keeps us free from political or corporate influence. This means we can fearlessly report the facts and shine a light on the misdeeds of those in power.

Consider a donation to keep our independent journalism running…

Watch as Russia’s AI robot falls on stage

Published yesterday 11:54 am – By Editorial staff

Russia's first humanoid AI robot fell on stage during its official launch in Moscow this week. Staff rushed forward to shield the damaged robot while attempting to fix the malfunction.

What was meant to be a grand launch of Russia's venture into humanoid robotics ended in embarrassment. To the sounds from the Rocky film, the robot AIdol was led onto the stage by two staff members at a technology event in the Russian capital.

But the presentation ended in chaos when the robot lost its balance and crashed to the ground. Several parts came loose and staff hurried to pull the machine away and hide it behind a screen.

Behind the project is the Russian robotics company Idol, led by Vladimir Vitukhin. According to the company, AIdol is an advanced robot built mostly from domestic components.

Vitukhin explained the fall as a calibration problem and emphasized that the robot is still in the testing phase.

This is real-time learning, when a good mistake turns into knowledge, and a bad mistake turns into experience, Vitukhin said, according to Newsweek.

Despite the company's attempts to downplay the incident, criticism has been massive on Russian tech forums and social media. Many question the decision to showcase an obviously unfinished prototype.

AIdol is powered by a 48-volt battery that provides up to six hours of operation. The machine is equipped with 19 servo motors and a silicon skin designed to recreate human facial expressions.

The robot can smile, think, and be surprised – just like a person, Vitukhin said.

According to reports, AIdol consists of 77 percent Russian-produced components. After the fall, developers have withdrawn the machine while engineers examine the balance systems.

Italian political consultant became victim of spyware program

Totalitarianism

Published November 11, 2025 – By Editorial staff
Francesco Nicodemo.

An Italian political advisor who worked for center-left parties has gone public about being hacked through an advanced Israeli-developed spyware program. Francesco Nicodemo is the latest in a growing list of victims in a spyware scandal that is shaking Italy and raising questions about how intelligence services use surveillance technology.

Francesco Nicodemo, who works as a consultant for left-leaning politicians in Italy, waited ten months before publicly disclosing that he had been targeted by the Paragon spyware program. On Thursday, he chose to break his silence in a post on Facebook.

Nicodemo explained that he had previously not wanted to publicize his case because he "didn't want to be used for political propaganda," but that "the time has now come".

"It's time to ask a very simple question: Why? Why me? How is it possible that such a sophisticated and complex tool was used to spy on a private citizen, as if he were a drug dealer or a subversive threat to the country?", Nicodemo wrote. "I have nothing more to say. More people must speak out. Others must explain what happened".

Extensive scandal grows

Nicodemo's revelation once again expands the scope of the ongoing spyware scandal in Italy. Among those affected are several journalists, migration activists, prominent business leaders, and now a political consultant with a history of working for the center-left party Partito Democratico and its politicians.

The online publication Fanpage reported first that Nicodemo was among the people who received a notification from WhatsApp in January that they had been targeted by the spyware program.

Questions about usage

Governments and spyware manufacturers have long claimed that their surveillance products are used against serious criminals and terrorists, but recent cases show that this is not always the case.

— The Italian government has provided certain spyware victims with clarity and explained the cases. But others remain disturbingly unclear, says John Scott-Railton, a senior researcher at The Citizen Lab who has investigated spyware companies and their abuses for years.

None of this looks good for Paragon, or for Italy. That's why clarity from the Italian government is so essential. I believe that if they wanted to, Paragon could give everyone much more clarity about what's going on. Until they do, these cases will remain a burden on their shoulders, adds Scott-Railton, who confirmed that Nicodemo received the notification from WhatsApp.

Intelligence services' involvement

It is still unclear which of Paragon's customers hacked Nicodemo, but an Italian parliamentary committee confirmed in June that some of the victims in Italy were hacked by Italian intelligence services, which report to Prime Minister Giorgia Meloni's government.

In February, following revelations about the first victims in Italy, Paragon severed ties with its government customers in the country, specifically the intelligence services AISE and AISI.

The parliamentary committee COPASIR later concluded in June that some of the publicly identified Paragon victims, namely the migration activists, had been legally hacked by Italian intelligence services. However, the committee found no evidence that Francesco Cancellato, editor of the news site Fanpage.it which had investigated the youth organization of Meloni's governing party, had been hacked by the intelligence services.

Paragon, which has an active contract with the U.S. Immigration and Customs Enforcement agency, states that the U.S. government is one of its customers.

FACTS: Paragon

Paragon Solutions is an Israeli cybersecurity company that develops advanced spyware for intelligence services and law enforcement agencies. The software can be used to monitor smartphones and other digital devices.

The company was acquired by American private equity giant AE Industrial and has since been merged with cybersecurity firm REDLattice. Paragon's clients include the US government, including the Immigration and Customs Enforcement (ICE) agency.

In February 2024, Paragon terminated its contracts with Italian intelligence services AISE and AISI after several Italian citizens, including journalists and activists, were identified as victims of the company's spyware.

Paragon is marketed as a tool against serious crime and terrorism, but its use in Italy has raised questions about whether the spyware is also being used against political opponents and journalists.

Email was never built for privacy

Mass surveillance

How Proton makes email privacy simple.

Published November 8, 2025 – By Naomi Brockwell

Email was never built for privacy. It’s closer to a digital postcard than a sealed letter, bouncing through and sitting on servers you don’t control, and mainstream providers like Gmail read and analyze everything that is inside.

Email isn’t going anywhere in our society, it’s baked into how the digital world communicates. But luckily there are ways to make your emails more private. One tool that you can use is PGP, which stands for “Pretty Good Privacy”.

PGP is one of the oldest and most powerful tools for email privacy. It takes your message and locks it with the recipient’s public key, so only they can unlock it with their private key. That means even if someone intercepts the email, whether it’s a hacker, your ISP, or a government agency, they see only scrambled text.

Unfortunately it is notoriously complicated. Normally, you’d have to install command-line tools, generate keys manually, and run cryptic commands just to send an encrypted email.

But Proton Mail makes all of that easy, and builds PGP right into your inbox.

How Proton makes PGP simple

Proton is a great, privacy-focused email provider (and no they’re not sponsoring this newsletter, they’re simply an email provider that I like to use).

If you email someone within the Proton ecosystem (ie send an email from one Proton user to another Proton user), your email is automatically end-to-end encrypted using PGP.

But what if you email someone outside of the Proton ecosystem?

Here’s where it would usually get tricky.

First, you’d need to install a PGP client, which is a program that lets you generate and manage your encryption keys.

Then you’d run command-line prompts, choosing the key type, size, expiration, associating the email you want to use the key with, and you’d export your public key. It’s complicated.

But if you use Proton, they make using PGP super easy.

Let’s go through how to use it.

Automatic search for public PGP key

First of all, when you type an email address into the “To” field in Proton Mail, it automatically searches for a public PGP key associated with that address. Proton checks its own network, your contact list, and Web Key Directory (WKD) on the associated email domain.

WKD is a small web‑standard that allows someone to publish their public key at their domain in a way that makes it easily findable for an email app. For example if Proton finds a key for a certain address at the associated domain, Proton will automatically encrypt a message with it.

If they find a key, you’ll see a green lock next to the recipient in the ‘To’ field, indicating the message will be encrypted.

You don’t need to copy, paste, or import anything. It just works.

Great, your email has been automatically encrypted using PGP, and only the recipient of the email will be able to use their private key to decrypt it.

Manually uploading someone’s PGP key

What if Proton doesn’t automatically find someone’s PGP key? You can hunt down the key manually and import it. Some people will have their key available on their website, either in plain text, or as a .asc file. Proton allows you to save this PGP key in your contacts.

To add one manually, first you type their email address in the “to” field.

Then right-click on that address, and select “view contact details”

Then click the settings wheel to go to email settings, and select “show advanced PGP settings”

Under “public keys”, select “upload” and upload their public key in an .asc format.

Once the key is uploaded, the “encrypt emails” toggle will automatically switch on, and all future emails to that contact will automatically be protected with PGP. You can turn that off at any time, and also remove or replace the public key.

How do others secure emails to you using PGP?

Super! So you’ve sent an encrypted email to someone using their PGP key. What if they want to send you an email back, will that be automatically end-to-end encrypted (E2EE) using PGP? Not necessarily.

In order for someone to send you an end-to-end encrypted email, they need your public PGP key.

Download your public-private key pair inside Proton

Proton automatically generates a public-private key pair for each address that you have configured inside Proton Mail, and manages encryption inside its own network.

If you want people outside Proton to be able to encrypt messages to you, the first step is to export your public key from your Proton account so you can share it with them.

To do this:

  • Go to Setting
  • Click “All settings”
  • Select “encryption and keys”
  • Under “email encryption keys” you’ll have a dropdown menu of all your email addresses associated with your Proton account. Select the address that you want to export the public key for.
  • Under the “action” column, click “export public key”

It will download as an .asc file, and ask you where you want to save the file.

Normally a PGP key is written in 1s and 0s that your computer can read. The .asc file takes that key and wraps it in readable characters, and it ends up in a format that looks something like this:

Sharing your public key

Now that you’ve downloaded the public key, how do you share it with people so that they can contact you privately? There are several ways.

For @proton.me and @protonmail.com addresses, Proton publishes your public key in its WKD automatically. You don’t have to do anything.

For custom domains configured in Proton Mail, Proton doesn’t host WKD for you. You can publish WKD yourself on your own domain by serving it at a special path on your website. Or you can delegate WKD to a managed service. Or if you don’t want to use WKD at all, you can upload your key to a public keyserver like keys.openpgp.org, which provides another way for mail apps to discover it.

We’re not going to cover those setups in this article. Instead here are simpler ways to share your public key:

1) You can send people your .asc file directly if you want them to be able to encrypt emails to you (be sure to let them know which email address is associated with this key), or you can host this .asc file on your website for people to download.

2) You can open the .asc file in a text editor and copy and paste the key, and then send people this text, or upload the text on your website. This is what I have done:

This way if anyone wants to send me an email more privately, they can do so.

But Proton makes it even easier to share your PGP key: you can opt to automatically attach your public key to every email.

To turn this on:

  1. Go to Settings → Encryption & keys → External PGP settings
  2. Enable
    • Sign external messages
    • Attach public key

Once this is on, every email you send will automatically include your public key file, as a small .asc text file.

This means anyone using a PGP-capable mail client (like Thunderbird, Mailvelope, etc.) can import it immediately, with no manual steps required.

Password-protected emails

Proton also lets you send password-protected emails, so even if the other person doesn’t use PGP you can still keep the contents private. This isn’t PGP -- Proton encrypts the message and attachments in your browser and the recipient gets a link to a secure viewing page. They enter a password you share separately to open it. Their provider (like Gmail) only sees a notification email with a link, not the message itself. You can add a password hint, and the message expires after a set time (28 days by default).

The bottom line

Email privacy doesn’t have to be painful. Proton hides the complexity by adding a password option, or automating a lot of the PGP process for you: it automatically looks up recipients’ keys, encrypts your messages, and makes your key easy for others to use when they reply.

As Phil Zimmermann, the creator of PGP, explained in Why I Wrote PGP:

“PGP empowers people to take their privacy into their own hands. There has been a growing social need for it. That’s why I wrote it".

We’re honored to have Mr. Zimmermann on our board of advisors at Ludlow Institute.

Pioneers like him fought hard so we could protect our privacy. It’s on us to use the tools they gave us.

 

Yours in privacy,
Naomi

Naomi Brockwell is a privacy advocacy and professional speaker, MC, interviewer, producer, podcaster, specialising in blockchain, cryptocurrency and economics. She runs the NBTV channel on Rumble.

Swedish police secretly using Palantir’s surveillance system for years

Mass surveillance

Published November 4, 2025 – By Editorial staff
Palantir Technologies headquarters in Silicon Valley.

The Swedish Police Authority has for at least five years been using an AI-based analysis tool from the notorious American security company Palantir.

The program, which has been specially adapted for Swedish conditions, can within seconds compile comprehensive profiles of individuals by combining data from various registers.

Behind the system stands the American tech company Palantir, which is internationally controversial and has been accused of involvement in surveillance activities. This summer, the company was identified in a UN report as complicit in genocide in Gaza.

The Swedish version of Palantir's Gotham platform is called Acus and uses artificial intelligence to compile, analyze and visualize large amounts of information. According to an investigation by the left-wing newspaper Dagens ETC, investigators using the system can quickly obtain detailed personal profiles that combine data from surveillance and criminal registers with information from Bank-id (Sweden's national digital identification system), mobile operators and social media.

A former analyst employed by the police, who chooses to remain anonymous, describes to the newspaper how the system was surrounded by great secrecy:

— There was very much hush-hush around that program.

Rejection of document requests

When the newspaper requested information about the system and how it is used, they were met with rejection. The Swedish Police Authority cited confidentiality and stated that they can neither "confirm nor deny relationships with Palantir" citing "danger to national security".

This is not the first time Palantir's tools have been used in Swedish law enforcement. In the high-profile Operation Trojan Shield, the FBI, with support from Palantir's technology, managed to infiltrate and intercept the encrypted messaging app Anom.

The operation led to the arrest of a large number of people connected to serious crime, both in Sweden and internationally. The FBI called the operation "a shining example of innovative law enforcement".

But the method has also received criticism. Attorney Johan Grahn, who has represented defendants in several Anom-related cases, is critical of the approach.

— In these cases, it has been indiscriminate mass surveillance, he states.

Mapping dissidents

Palantir has long sparked debate due to its assignments and methods. The company works with both American agencies and foreign security services.

In the United States, the surveillance company's systems are used to map undocumented immigrants. In the United Kingdom, British police have been criticized for using the company's technology to build registers of citizens' sex lives, political views, religious affiliation, ethnicity and union involvement – information that according to observers violates fundamental privacy principles.

This summer, a UN report also identified Palantir as co-responsible for acts of genocide in Gaza, after the company's analysis tools were allegedly used in attacks where Palestinian civilians were killed.

How extensive the Swedish police's use of the system is, and what legal frameworks govern the handling of Swedish citizens' personal data in the platform, remains unclear as long as the Swedish Police Authority chooses to keep the information classified.