this post was submitted on 12 Apr 2024
0 points (50.0% liked)
DeGoogle Yourself
8807 readers
42 users here now
A community for those that would like to get away from Google.
Here you may post anything related to DeGoogling, why we should do it or good software alternatives!
Rules
-
Be respectful even in disagreement
-
No advertising unless it is very relevent and justified. Do not do this excessively.
-
No low value posts / memes. We or you need to learn, or discuss something.
Related communities
!privacyguides@lemmy.one !privacy@lemmy.ml !privatelife@lemmy.ml !linuxphones@lemmy.ml !fossdroid@social.fossware.space !fdroid@lemmy.ml
founded 4 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
No, they don't care about privacy. It is just marketing buzz. They give Google and Facebook access to internal data for money. They give governments access to iCloud data for market share.
They then design the OS full of dark patterns to trick you into enabling iCloud. They have telemetry on every aspect of the operating system from a timeline down to the millisecond as to when and where you opened and closed browser tabs, to what application was consuming power at a given time, to where you go and what bluetooth and wifi devices you saw along the way. Metadata scrapers index the contents of your devices under the guise of making it "smart and helpful." The health monitor is ostensibly capable of dead reckoning location tracking, and you have to jump through hoops to even shut off BTLE when the phone is off.
Their communications platforms log all sorts of metadata, (this can easily be seen by requesting a GDPR data dump) and if one believes they don't tee every iMessage conversation off to three letter agencies and who knows where else, one would be sorely mistaken. (This, I don't know of direct evidence of, so it is more inferred based on how the messaging technologies work and how the government(s) wouldn't truly allow privacy to exist.)
One can't even stop their Apple product from talking to Apple servers, as they run access to their own systems on a layer of abstraction above the user's userspace network layer. If they so choose, they can brick your phone at a moment's notice using their "activation" infrastructure.
Nothing they do is privacy-oriented, beyond making it slightly difficult for Johnny the bicycle thief to gain access.
All without any of the code being available for inspection.