Комментарии:
Thanks for the video!
ОтветитьThe best way is to not use a phone 👍
ОтветитьMAN its not hard for google to,like you said," upload data they collected in a secret way"(on the lvl of hardware spying) COZ THEY CAN HIDE IT IN ONE OF MANY CONNECTIONS TO GOOGLE APP STORE or other google connections shenanigans.
Ответить❤
Ответитьyour examples are garbage man
ОтветитьWithin Googles extensive database and AI integration can generally pinpoint you as an individual by your habits, hardware or profile building by the 3rd to 5th website visited. The best thing offered against google is Disinformation rather than no information or an alternative with better policies and practices.. Pardon my intrusion, but I thought it was one thing to not send data, but was another to prevent data collection. Even if an unknown machine, from the first web query, your profile begins.
ОтветитьAnother privacy advocate said that he signed into Gmail on a DeGoogleed phone from the web and Google started tracking that deGoogleed phone based upon that sign in
Ответитьthe hardware spying comments are absolutely false. the bootloader of the phone could initialize part of the board for active data communications while having android being completely oblivious that the chips or part of chip even exists. the ONLY way to test it is a signal analyzer for whatever freq the tower u connect to is and also being able to decipher what it is, which is next to impossible. its the perfect spy vector. Intel does this with ME but it isnt nearly as bad a threat as an android phone because the bios ecosystem is standardized with x86, ARM is a whole different breed. 99% are locked bootloaders, require signed binaries for updates, you can't flash custom roms, and i dont think the bootloaders for AOSP roms are even open source, so it pretty much nullifies any relevancy for spying protection if it is at the hardware level.
Ответитьyes or no?
ОтветитьWell made points, thx a lot! Can u pls compare Graphene with the /e ROM?
ОтветитьGoogle doesn't have to spy on anyone, everyone is giving their sensitive information whether they know it or not. You can block everything but if you're logging in WITH. YOUR. GMAIL. ACCOUNT. you're giving yourself away.
Ответитьhardware spying not reasonable , but intel can do it (remote access anytime) ;)
so if everybody can do wireshark analysis.. why didnt you do it?
Excellent video and thought experiment analysis! Very helpful to clarify to the semi tech literate like me 😂
ОтветитьOne trend I've noticed is Google (following Apple) are making it harder for 3rd party tracking. Why? Because limits on 3rd party tracking give an advantage to 1st party tracking. Granted Google is also trying to make 1st party tracking more private well continuing to advertise whether their plans to achieve that goal actually works or not is another story.
ОтветитьGreat! very valuable your information here, I had a brief experience with LineageOs 19.1 in my POCO F1, and soon after seeing that GApps is a choice to analyze well, recently encouraged by the /e/Os Project and I couldn't help but invest a little I took the time to test it and I realized from the beginning the depth of the focus on security and privacy. But... I have to agree with you that even in the face of this focus, in order to achieve the maximum that all these projects suggest, it depends a lot on each user, because we are part of it, it is necessary to follow certain precautions that are the responsibility of each user. . Thank you very much for your cooperation and your brilliant clarifications.
ОтветитьThat's what a google employee would say
ОтветитьGreat video thanks excellent points. Re: Reputation, I think we have reached a saturation point where the number of people who care enough to base a purchase of a product on privacy is so low. I.e. spying and collection of data is expected. That all Google would need do if "caught in the act" of collection of data via AOSP or any other means (outside Gservices) would easily be brushed aside by siting "improved user experience". Only those watching videos like this one care sadly. We are very few and do not have the power to stop them at this time in history.
ОтветитьSo im gonna guess backdoor in chips are discovered on 9 28 26. Oh and as much as they are pumping out i wouldnt be surprised if they know when you have cancer, are preggo, have to poo, and your girl is cheating even tho shes ios.
ОтветитьYes, if you install gapps
Otherwise no
He has never heard of Intels management engine on all x86 CPUs or ring negative 1.
ОтветитьGoogle will still track you using apps using some sort of Android development APIs, as well as those who have ads in them (mostly are Double Click which is a Google product)
ОтветитьWhy are you doubtful google would put Spyware in their chips when intel and AMD do it, and everyone knows this, but cannot negate it
ОтветитьNo mention of GrapheneOS? Unsubing TechLore. Adios...
Ответитьmaybe they do it like like AMD and Intel
ОтветитьHi bro, grapheneos safe or not
Ответитьabsolutely rubbish
ОтветитьWhat is the alternative for play services? does micro g works? isn't that open source? also, Loved the channel and subscribed❤️
ОтветитьReplicant os
ОтветитьIs using ORBOT TOR GOOD
I'm using AOSP
Wait, so Android really ís fully open source?
I was under the impression that there's a small piece that's not. Supposedly dealing with low level system stuff.
You just answred my question about the new google chips . thanks
ОтветитьHave you tried BraX2 privacy phone using BraxOS?
Ответитьtoo much echo in the audio. Great content though!
ОтветитьHey so would an iPhone or Android be more privacy friendly? I would say I’m quite techy so I can definitely do hardening.
ОтветитьCensorship of risk of your affiliate. My comment keeps instantly disapearing! I'll try one more time.....
Here goes:
Dude, please inform us of the risks when you advertise!
"
We Share Personal Data Under Controlled Circumstances:
With third parties, within the United States and in other countries, who may access data about you to perform functions on our behalf;
With financial institutions, processors, payment card associations and other entities that are involved in the payment process;
With government and law enforcement where reasonably necessary to comply with applicable law, regulation, legal process, governmental request;
With others where reasonably necessary to protect the security or integrity of our Services or user safety;
In Connection with, or during the negotiation of, ANY merger, sale of company stock or assets, financing, acquisition, divestiture or dissolution of all or a portion of our business;
With your consent." <-lol
I changed some stuff, deleted the link. Don't killy comment YT, the people deserve to know!
And Henry, turn auto-curration off. It's broken
did you go to UH???
Ответитьcan you explain what wickr shredder does?
ОтветитьI got one question, where is your mic for these videos, so no echo happens and so there's higher quality sound
ОтветитьGreat video concept! This channel is sooooo valuable.
ОтветитьThe radio software is the most likely location of any backdoor.
ОтветитьI call them the G Men for well-founded reasons
ОтветитьJust a comment to boost the video
ОтветитьThis is a very good and clear analysis. Thank You.
Ответитьlol, the problem is Google is at the protocol level. Phones are network devices so is anti-private by definition. The device has to identify uniquely to the network to work. Minimal disclosure is the best that can be done.
ОтветитьCheck if your "degoogled"Rom does not have a Backdoor/spyware...but if you wanna get rid off it install linux on your Smartphone...
ОтветитьLmao at this point, y'all should just get iPhones. Pretty damn simple solution.
Ответить