this post was submitted on 26 Oct 2025
592 points (98.7% liked)
Technology
76435 readers
3794 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Uneducated answer
Proofs? Their privacy policy, the fact that Google is an advertising company, the fact that the "data sharing" of iOS gets leaked regularly and they’re never sold basically
They collect data, but they either use it for recommendations if you’ve enabled (or rather not disabled) that, else they use it for insight and telemetry to get anonymous or pseudonymous with limited lifespan usage data
Obviously, anything non E2EE going to USA servers can be considered compromised and in this context, yea, it’s bad, but it’s not all of it and Google phones a lot more data home
let me ask you something simple. Do you trust apple with your data more than you trust google?
Depends what you mean by trust
If you mean trust that they won’t sell, then yes
If you purely mean security, then Google is better imo
But my beliefs aren’t just based on my preferences. I hate both.
To follow up, on your responses for me both boxes check off equally but not so much as selling as to who they give that information to. You have to setup so much shit and make sure your hardware is air tight to have true privacy. I bet every device you use all of them no matter who you buy it from or what OS it runs, will have a backdoor. It's futile to do all that work when you think using Tor or I2P or whatever protocol you use for network traffic and not use cellular and disable GPS and use only use secure comms when everything has a backdoor.