hgjvbgjhvv
Ok. First off let me apologize for coming across the way I did. If i sounded aggressive or critical consider it my curse that i have to live with. I totally understand where you are coming from and have been in your shoes, where i didnt have enough knowledge and did unnecessary things or went over the top or applied the wrong solution. So let me re express. I don't want to in anyway dissuade or unmotivate you from what you are doing. What you are doing is honorable and applaudable given the firm resistance you face from the rest of the world.
I might be wrong about some of the things im about to say, but hopefully others will correct me. Take it as my best attempt to sum things up for you.
With a normal google infested android phone google has access to:
- All contacts info
- All your text msgs
- Everything you type (in any app)
- all your saved wifi passwords
- All your browsing
- gives away your google identity to all websites you visit
- your phone log (call times, who you called, how long, etc.)
- full access to camera, microphone, and other sensors at any time
- all hardware IDs
-metadata or actual data of all your files or pictures
- sim data
- you location (constantly), and it uploads it even after you turn every option off and disable everything possible, collects it even when you dont have internet, and uploads later.
- theoretically allowing backdoor access to your system and installing hidden components or surveillance elements.
- application IDs
- inbuilt analytics collusion with many popular apps
- Inter-Process Communication (IPC)
- etc...
Apps like whatsapp and instagram have access to:
- Android ID and Advertising ID, which you cant evade
- your files (once they force you to accept their agreements)
- your full contact list (once they force you to give it to them or they wont work)
- etc.
Also carriers have the ability to install forced components onto your OS automatically using google services without you having any control over it. (Dont know how, but apparently they can)
By using GOS, basically almost all the above can be eliminated. Unless you go back and one by one re-enable access to those things by installing bad apps and giving them permissions.
On a phone with GOS you can do a few things you can't do on other phones:
- granular storage access control for apps
- granular contacts access
- block all internet access to individual apps
- block the usb port from being used to install trojans on your phone
- and more...
On gos each profile has a different Android ID, and fake advertising ID. So each profile can kind of look like a separate phone to naive apps. It also fully isolates apps and IPC.
On gos apps and GPServices have no access to your sim or identity info. They only see your country code.
In the case of foss app, you don't really need to isolate them because first off they are not doing anything bad and are not trying to gather identifying data on you. Secondly other apps cant see whats happening inside the foss apps. So.
The dangerous apps are things like facebook and WhatsApp and google maps. THEY are the ones that need to be isolated. They (the bad apps) need to be isolated from EACH OTHER so that they can collude less through IPC, google APIs, and mutual analytics.
For example installing a bunch of google apps in your main profile might be fine as long as you don't give access to identifying things. But if you also put google maps there then google now gets full access to you location as well, which it did not have access to before.
On GOS If you install google play services by itself with a new account behind a vpn, then you will have access to it without it knowing anything about you. But if you login from any app that knows who you are that colludes with GPservices now GPservices knows who you are and then if you also install google maps and give location access, now it knows your movement too. You'd be starting to venture pretty close to before GOS install times. Although still there are benefits.
So.
Do get a good understanding of what gos does and doesn't (by reading the pages i mentioned), then you can thing about a controlled action plan of what level of privacy you want to achieve and then prepare your steps and manage your installed apps so that you actually achieve your goal.
You can plan right only after you fully understand how GOS works.
I hope this has been helpful. If there is anything else i can help clarify, do please ask and me and others will do our best to clarify.