There should be protocols and practices in place to stop our data from being owned and sold. Hence why I take the steps I do to help anonymize myself to a small degree. Ditch Facebook, ditch apple, ditch google, ditch Microsoft, ditch any provider that wants to claim your data that tou can to minimize this sort of behavior.
As MajorHavoc said, there are ways. I do in fact use GrapheneOS, have access to a reasonably secure VPN, I use Firefox as well as Vanadium, within Firefox I use Ublock Origin and a few other tools. Some argue that having as many layers of “protection” is counterintuitive because it makes your fingerprint on the web more unique.
Some argue that having as many layers of “protection” is counterintuitive because it makes your fingerprint on the web more unique.
That’s a great point.
I’m comforted that you listed largely the same controls as I use, so it seems like at least there’s a little cloud of us ‘deGoogle’ users out there providing eachother some anti-fingerprinting.
There should be protocols and practices in place to stop our data from being owned and sold. Hence why I take the steps I do to help anonymize myself to a small degree. Ditch Facebook, ditch apple, ditch google, ditch Microsoft, ditch any provider that wants to claim your data that tou can to minimize this sort of behavior.
Serious question: Do you browse this app, or similar sites, on an iPhone or Android device? If so, how are you getting away from those companies?
As MajorHavoc said, there are ways. I do in fact use GrapheneOS, have access to a reasonably secure VPN, I use Firefox as well as Vanadium, within Firefox I use Ublock Origin and a few other tools. Some argue that having as many layers of “protection” is counterintuitive because it makes your fingerprint on the web more unique.
That’s a great point.
I’m comforted that you listed largely the same controls as I use, so it seems like at least there’s a little cloud of us ‘deGoogle’ users out there providing eachother some anti-fingerprinting.
As someone wise once said to me, consider your threat model.