| ▲ | Switzerland: Data Protection Officers Impose Broad Cloud Ban for Authorities(heise.de) |
| 69 points by TechTechTech 4 hours ago | 31 comments |
| |
|
| ▲ | mrbluecoat an hour ago | parent | next [-] |
| This cracked me up: > a de facto ban on the use of these services as comprehensive Software-as-a-Service (SaaS) solutions whenever particularly sensitive or legally confidential personal data is involved. For the most part, authorities will likely only be able to use applications like the widespread Microsoft 365 as online storage Since when is Microsoft 365 the bastion of modern privacy? |
| |
| ▲ | mzajc an hour ago | parent [-] | | I get the impression that this is a temporary measure to ease the transition, not a statement about the privacy guarantees of M365. |
|
|
| ▲ | sschueller 2 hours ago | parent | prev | next [-] |
| A lot of Swiss government services do not need to be available 247 outside of the country. There is no need for the SBB (Swiss national railway) to use cloudflare or AWS when the same can be provided by a local provider that also has the ability to deal with large DDOS and cap off the outside when it comes down to the wire. It is more important for someone in Switzerland to be able to purchase a ticket than someone planning a trip from abroad. |
| |
| ▲ | whatevaa 2 minutes ago | parent | next [-] | | A swiss could be planning a trip from abroad. | |
| ▲ | sillyfluke an hour ago | parent | prev [-] | | >A lot of Swiss government services do not need to be available 247 outside of the country. Obviously without talking specifics it's hard to discuss, but I'd hate to be a Swiss who was traveling abroad and had to access the gov website deemed "not 24/7" in an emergency of some kind (planning travel for the next day for the railway for example), or to finish something due to a goverment imposed deadline. |
|
|
| ▲ | estebarb 2 hours ago | parent | prev | next [-] |
| It is funny that the article cannot be read without accepting marketing cookies |
|
| ▲ | neves 2 hours ago | parent | prev | next [-] |
| I'm impressed how USA companies became untrustful. Maybe this comes since Snowden whistle blowing, but it looks like the tendency is accelerating. |
| |
| ▲ | LaurensBER 2 hours ago | parent [-] | | The case of Nicolas Guillou was an eye opener for many. https://www.lemonde.fr/en/international/article/2025/11/19/n... | | |
| ▲ | einszwei an hour ago | parent | next [-] | | My first thought was that the sanctions are due to investigations into US presidents (like role of Bush in Second Gulf War or Obama/Clinton's role in Libyan Civil war) but it is due to Israel's PM. It's amazing how US admin is making their displeasure known in most destructive way (for their own and allies soft power) possible. | |
| ▲ | trimethylpurine an hour ago | parent | prev [-] | | You're implying that the Swiss government blames the American people for the decisions of the presidential seat, a seat with minimal actual power and three years left in office. I disagree with your guess. This judge was making a statement about how it's wrong for Netanyahu to judge the people of Gaza by its political leadership. It wouldn't make sense then for the Swiss government to judge the people of America by its political leadership. Such a hypocrisy would make the opposite political statement. I think it's most likely because of the recent AWS and Cloudflare outages having exposed the fragility of SaaS. I don't see any reason to project anti American sentiment onto the article where there was none. |
|
|
|
| ▲ | 7777777phil 4 hours ago | parent | prev | next [-] |
| The encryption requirement makes sense on paper, but it basically breaks the whole value proposition of SaaS. If you need true end-to-end encryption where the provider can't see plaintext, you lose search, real-time collaboration, most of the AI features everyone's been bolting on lately, etc. You're essentially left using these services as fancy file storage with your own crypto layer on top. Which is fine for IaaS use cases - spin up VMs, encrypt your disks, manage your own keys. But for productivity software like M365? The Swiss government is basically saying "yeah you can use it but only in a way that makes it almost pointless." The Cloud Act part is what really matters here though. US providers can be compelled to hand over data regardless of where it's physically stored, and they've been pretty clear they'll comply with US law over local data protection rules when push comes to shove. For a foreign government storing legally confidential citizen data, that's a real problem. I suspect this will get quietly ignored like the previous declarations, because the alternative is either building everything in-house or relying on local providers that frankly don't have the same feature set or reliability. |
| |
| ▲ | uallo 3 hours ago | parent | next [-] | | > If you need true end-to-end encryption where the provider can't see plaintext, you lose search, real-time collaboration, most of the AI features everyone's been bolting on lately, etc. Proton has all of these features, despite being end-to-end encrypted. Search works well with their Mail and Calendar solutions, real-time collaboration is a core offering of their Document editor. It surely is harder to implement, but not impossible for many use cases. | | |
| ▲ | elashri 3 hours ago | parent | next [-] | | And proton is a Swiss company operating under the Swiss Jurisdiction too. | | | |
| ▲ | mr_mitm 2 hours ago | parent | prev [-] | | How do they do that? Either they 1) transfer your entire data to your system before searching, 2) use shoddy cryptography, or 3) you have to expose your private key to them. I doubt it's 1). | | |
| ▲ | gethly 2 hours ago | parent | next [-] | | Based on link below: > Click Enable to confirm. Your messages will then be downloaded from Proton Mail’s servers, decrypted, and indexed locally in an encrypted state. They just download your emails into your browser and make them locally searchable. I battled the same issue, in the end I have unencrypted data for fulltext search. But none of these are sensitive. I was thinking that maybe with AES, which is just a XOR, you could do search if you have the key as you just need to know how to XOR the search query and which phrases you can include. So instead of "hello" the XOR would yield "arpe5," and you just look for that in the db. But this could only work with exact matches or prefixes, it would not allow elastic search or anything complex like that. | |
| ▲ | lima 2 hours ago | parent | prev [-] | | Apparently, it's (1): https://proton.me/support/search There are obvious UX/performance issues, but it's an honest approach. |
|
| |
| ▲ | TeMPOraL an hour ago | parent | prev | next [-] | | > The encryption requirement makes sense on paper, but it basically breaks the whole value proposition of SaaS. Good. It's high time to flip the status quo on its head - instead of data being something we ship to specific cloud services, for them to lock it away and charge for access, it should be code that should be a commodity, shipped to servers of our choosing and granted access to operate on our data without owning it. Just like regular, old-school desktop software, back in the day before SaaS was a thing. The provider didn't get to "see plaintext", because the software was operating on your hardware and not communicating with the provider. And if it tried to communicate back to the "mothership", we'd rightfully call it spyware, tell people not to use it, and wonder if there's legal action that could be taken. | |
| ▲ | squigz 2 hours ago | parent | prev | next [-] | | > because the alternative is either building everything in-house or relying on local providers that frankly don't have the same feature set or reliability. Neither of these seem like a terrible outcome. Relying on local providers would be better for privacy and would help the local economy. It would also push them to implement the remaining feature set and work on reliability - though I must sincerely question the idea that local providers cannot reach the same level of reliability - particularly when you throw in global network problems that affect the largest cloud providers but don't always affect the smaller guys. | | |
| ▲ | jeffbee an hour ago | parent [-] | | > Relying on local providers would be better for privacy This is a massive leap. Switching to local providers can eliminate a lot of imaginary threats, but opens the door to a lot of real ones, since most service providers outside of the big clouds have extremely weak or non-existent countermeasures against insider threats. | | |
| ▲ | squigz 9 minutes ago | parent [-] | | The threat profile changes, sure, but framing all the threats imposed by using large-scale foreign clouds as "imaginary", and every threat introduced by local providers as "real", is very disingenuous. > most service providers outside of the big clouds have extremely weak or non-existent countermeasures against insider threats. Another claim that needs some citations, please. Anyway, many of those concerns can be addressed by security regulations, hiring processes, etc - which, I would guess, is a pretty critical part of why the large-scale providers supposedly don't have such threats. Also, this thread is talking about the effects of US companies having access to sensitive data that they're more than willing to hand over to the US government. In other words... there are 2 major insider threats at every US cloud provider, from the perspective of a foreign government: the company, and the US government. That's mostly what I was referring to with the privacy bit. |
|
| |
| ▲ | PartiallyTyped 2 hours ago | parent | prev [-] | | whatsapp has e2e encrypted messages and searching works fine. Realtime collaboration — assuming you use CRDTs — can be achieved with e2e encryption as well, with backend acting like a mere router of requests. |
|
|
| ▲ | belter 3 hours ago | parent | prev [-] |
| I can already write the headline of what this will be in five years... "Swiss Government Moves Back to Cloud After Discovering Cleaning Staff Had More Physical Access Than IT Security Team" |
| |
| ▲ | lan321 2 hours ago | parent | next [-] | | This gets me wondering, who does the cleaning at data centers and such? Do you need to do background checks to swing the mop in there? Is there a market for high clearance cleaning personnel? (like with the extended PSP in CH) My hunch is telling me there could be a couple positions with decent money (by normal person standards) for little work in that direction. Wouldn't be the first time I've been wrong though. | | |
| ▲ | chuckadams 2 hours ago | parent | next [-] | | Yes, it's routine to hire background-checked cleaning crew, and some higher-security operations even require the company to put up an extra bond. One only needs a clean enough record, but I've known a few people in housekeeping with old drug convictions who still had no problem working in secure areas at defense contractors. When they would go into the secure area, there would literally be a flashing light with someone loudly announcing "INSECURE!", and everyone working there would lock their screens and basically go on coffee break. Obviously not a thing a server room has to do, but those have cameras watching the every move of the cleaner, the racks are in locked cages, and the cleaner has to leave any electronic devices they have in a bin at the door. It's not like they search them thoroughly, but there are severe consequences for getting caught, and they don't have or need much time to clean the server rooms anyway, let alone get away with espionage. There's still a lot of mischief you could pull off with a cleaning crew, but facilities maintenance beyond housekeeping has a lot more opportunities. | |
| ▲ | mr_mitm 2 hours ago | parent | prev | next [-] | | A good moment to point out that the infamous "cyber bunker", a data center catering to criminals, was infiltrated by a female police officer who managed to get hired as a cleaning lady. https://en.wikipedia.org/wiki/CyberBunker#Documentary | | |
| ▲ | chuckadams an hour ago | parent [-] | | Criminal organizations have the problem that they can't exactly run a background check. They need other criminals, and of course there's an obvious problem with that... | | |
| ▲ | netsharc 10 minutes ago | parent [-] | | A professional enough criminal organization probably has a few paid cops to do this... |
|
| |
| ▲ | jeffbee an hour ago | parent | prev [-] | | The direction the industry has taken is not to hire elite mop guys, but to make physical access threats less and less relevant. |
| |
| ▲ | palata 3 hours ago | parent | prev | next [-] | | You mean the cleaning staff of AWS, Google, or Microsoft? The goal is to avoid that, I believe. | |
| ▲ | sschueller 2 hours ago | parent | prev [-] | | I would be more concerned that many data centers in Switzerland are owned and operated by large foreign companies and some of their physical security is questionable. Not at all what you see in their ads and I would say you are only as secure as the least secure DC you have... |
|