I recently asked for recommendations elsewhere regarding a cost-effective phone with the best camera that’s a reasonable price. Almost unanimous recommendations for a Pixel a couple years old. I’m a total noob for privacy stuff but joining Lemmy under the dbzer0 instance, I’m feeling more motivated to learn more and get out from under the thumb of major corps as much as possible.

Can you have a Pixel and still de-google? It seems unlikely… Any advice?

  • CrypticCoffee@lemm.ee
    link
    fedilink
    English
    arrow-up
    4
    arrow-down
    1
    ·
    1 year ago

    “Baby’s first threat model” is a little patronising. The specifically asked about Pixel and de-googling and your response is virtually “you know nothing child, go with apple”.

    I don’t trust companies, generally. I tend to trust open source software that is quite well known, as security/privacy by obfuscation is a poor model. If people can see the code, and scrutinise it, they’ll find the nasties generally.

    By leading, you were asking weird question so only you could get the answer you wanted, and some were weird. Have to tie yourself in some real logical knots to get there.

    Finally, no one mentioned second hand hardware. A few years old point I suspect was intended to mean not the newest model. I bought a 6a pixel when the 7 was out. It was £299. It was a good price for quality hardware that could be de-googled.

    • bloodfart@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      1 year ago

      Lol “baby’s first threat model” was a joke. Not everything is an insult, even on the internet.

      What answer was I trying to get and what logical knots did I tie? I’m not trying to fight you, just to explain the logic of recommending a specific platform to someone who asked about getting into privacy and de-googling.

      I was using second hand hardware interchangeably with an older phone, but using a secondhand device does obfuscate the chain of ownership to anyone observing connections by imei (at least until you get a cell contract).

      I use lots of open source software and have for decades but some of the repository audits recently are alarming. Of course, any reader of the jwz blog knows that the open source community’s idea of security often isn’t.