I recently asked for recommendations elsewhere regarding a cost-effective phone with the best camera that’s a reasonable price. Almost unanimous recommendations for a Pixel a couple years old. I’m a total noob for privacy stuff but joining Lemmy under the dbzer0 instance, I’m feeling more motivated to learn more and get out from under the thumb of major corps as much as possible.

Can you have a Pixel and still de-google? It seems unlikely… Any advice?

  • CrypticCoffee@lemm.ee
    link
    fedilink
    arrow-up
    3
    ·
    1 year ago

    They ended up not doing it after the anger. If they could get away with it, they would have. If they didn’t go ahead with it anyway, then the legal argument looking really shaky.

    The last part of your post was a little weird to comprehend, a lot of weird leading the witness sort of questions. You can throw hundreds at me, but I’ll give you the only ones that matters…

    Do I trust them? No. Do I want to give them my money and activity? No.

    • bloodfart@lemmy.ml
      link
      fedilink
      arrow-up
      2
      ·
      1 year ago

      That’s kind of a silly answer to any of the questions I asked. No one gets to have a cell phone without trusting some company. Even the beloved fairphone is manufactured in a factory and has a supply chain that requires trust.

      I was trying to “lead” you towards discussing what company or kind of company you do trust. I didn’t suggest the apple stuff to the op out of love for that company, but recognition that for someone whose new to privacy it’s a platform that has a very good history of respecting privacy and providing tools that allow users to take control over it.

      So no “leading” (some folks would just call it having a conversation…): what company do you trust? Do you recognize that given a lack of zero trust architecture in the hardware, software and infrastructure of cell phones you can’t get one without putting your trust in some company or group of companies? What do you look for in a company to trust?

      Part of this discussion is why I didn’t suggest a secondhand pixel dead dropped and configured with anonymous credentials on a private network. A person who is new to privacy cant be expected to do that and understand it, they need to begin to see all the different ways their data, metadata, biometrics and analytics are tracked and start to decide what they want to protect. That’s how they get to baby’s first threat model and figure out how to respond to it.

      • CrypticCoffee@lemm.ee
        link
        fedilink
        arrow-up
        4
        ·
        1 year ago

        “Baby’s first threat model” is a little patronising. The specifically asked about Pixel and de-googling and your response is virtually “you know nothing child, go with apple”.

        I don’t trust companies, generally. I tend to trust open source software that is quite well known, as security/privacy by obfuscation is a poor model. If people can see the code, and scrutinise it, they’ll find the nasties generally.

        By leading, you were asking weird question so only you could get the answer you wanted, and some were weird. Have to tie yourself in some real logical knots to get there.

        Finally, no one mentioned second hand hardware. A few years old point I suspect was intended to mean not the newest model. I bought a 6a pixel when the 7 was out. It was £299. It was a good price for quality hardware that could be de-googled.

        • bloodfart@lemmy.ml
          link
          fedilink
          arrow-up
          2
          ·
          1 year ago

          Lol “baby’s first threat model” was a joke. Not everything is an insult, even on the internet.

          What answer was I trying to get and what logical knots did I tie? I’m not trying to fight you, just to explain the logic of recommending a specific platform to someone who asked about getting into privacy and de-googling.

          I was using second hand hardware interchangeably with an older phone, but using a secondhand device does obfuscate the chain of ownership to anyone observing connections by imei (at least until you get a cell contract).

          I use lots of open source software and have for decades but some of the repository audits recently are alarming. Of course, any reader of the jwz blog knows that the open source community’s idea of security often isn’t.