First of all, to anyone downvoting my Comments about /e/ being a piece of shit, because…

  • they advertise themselves as degoogled, but instead let you connect to Google/Microsoft/etc services

  • replace all the propriatery not at all Secure Services from Google, with… Drumroll please… Propriatery and not at all Secure Services from themselves and actively encourage it.

  • They are For-profit

  • and being MORE out of date then even Fairphones stock roms.

… I told you so. Dm your Instance admin, pay them to send the DB entries of your Downvotes on a Thumb drive (or anything else from SSD to 3.5 inchHDD, depending on your preferences), and shove it up your rectum.

But a TL;DR:

/E/ is not Private. They just switch one bad comany to another one.

  • CitricBase@lemmy.world
    link
    fedilink
    arrow-up
    1
    ·
    2 days ago

    You need to provide actual evidence that it is.

    How do you expect me, or anyone else, to provide you with the inner working details of Google’s surreptitiously closed-as-fuck custom SoCs? That’s the entire basis of the problem, it’s closed-as-fuck and there is nothing that you or I or anyone else can do to verify that it isn’t malicious.

    At this point, you have to choose whether or not to trust the manufacturer. Given that the manufacturer is the most notoriously data-hungry surveillance corporation in the history of the entire world, I choose not to trust them. I wouldn’t trust them, even if they were to claim not to spy on us with these phones. (Incidentally, that is not something they claim.)

    • Skorp@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      2 days ago

      Open source or source availability is not a requirement for auditing a system. There would be evidence that would have almost certainly been found by now if this was the case. It is up to you, or the claimant, to prove their claims. I can say that there has not been any evidence of data collection by hardware components found, despite years of Pixel devices being tested by security researchers and mobile forensics companies. Not only that, the actual technical capabilities of the hardware (isolated component without networking capabilities) backs that up.

      What do you have except fearmongering?