• 1985MustangCobra@lemmy.ca
    link
    fedilink
    English
    arrow-up
    1
    arrow-down
    1
    ·
    15 hours ago

    you don’t think apple doesn’t data mine? lol. iphones are overpriced fashion statements. sure they work fine and have good performance but there’s no difference in privacy and security between iOS and Android.

    • Electricd@lemmybefree.net
      link
      fedilink
      English
      arrow-up
      1
      ·
      edit-2
      15 hours ago

      Uneducated answer

      Proofs? Their privacy policy, the fact that Google is an advertising company, the fact that the “data sharing” of iOS gets leaked regularly and they’re never sold basically

      They collect data, but they either use it for recommendations if you’ve enabled (or rather not disabled) that, else they use it for insight and telemetry to get anonymous or pseudonymous with limited lifespan usage data

      Obviously, anything non E2EE going to USA servers can be considered compromised and in this context, yea, it’s bad, but it’s not all of it and Google phones a lot more data home

        • Electricd@lemmybefree.net
          link
          fedilink
          English
          arrow-up
          1
          ·
          edit-2
          14 hours ago

          Depends what you mean by trust

          If you mean trust that they won’t sell, then yes

          If you purely mean security, then Google is better imo

          But my beliefs aren’t just based on my preferences. I hate both.

          • 1985MustangCobra@lemmy.ca
            link
            fedilink
            English
            arrow-up
            1
            ·
            14 hours ago

            To follow up, on your responses for me both boxes check off equally but not so much as selling as to who they give that information to. You have to setup so much shit and make sure your hardware is air tight to have true privacy. I bet every device you use all of them no matter who you buy it from or what OS it runs, will have a backdoor. It’s futile to do all that work when you think using Tor or I2P or whatever protocol you use for network traffic and not use cellular and disable GPS and use only use secure comms when everything has a backdoor.