ACTUALLY! Android is more private than the iPhone!

The Hated One
19 Sept 202317:31

Summary

TLDREste guion expone cómo la tecnología, específicamente el iPhone, jugó un papel crucial en las protestas de Hong Kong, permitiendo comunicaciones encriptadas y organización. Sin embargo, la sumisión de Apple a las demandas del gobierno chino limitó el acceso a aplicaciones esenciales, convirtiendo los dispositivos en herramientas de vigilancia. Se destaca la flexibilidad de Android como una alternativa más privada, capaz de operar sin las restricciones impuestas por los ecosistemas cerrados de Apple. Este análisis subraya la importancia del control sobre la tecnología para la privacidad y cómo las elecciones de plataformas pueden impactar en la libertad de los usuarios.

Takeaways

  • 📱 La tecnología en las protestas modernas es una herramienta táctica clave para los ciudadanos, pero también puede ser utilizada para suprimir disturbios con precisión.
  • 🔒 Los usuarios de iPhone en Hong Kong perdieron el control sobre sus dispositivos cuando Apple comenzó a cumplir con las solicitudes del gobierno chino para censurar aplicaciones.
  • 🚨 La entrega de control de los datos de iCloud de los usuarios chinos a Beijing transformó al iPhone en una herramienta de vigilancia.
  • 🛡️ Android se presenta como una mejor opción para la privacidad, permitiendo a los usuarios instalar y ejecutar aplicaciones eliminadas de la Play Store.
  • 🗽 Android es un sistema operativo de código abierto bajo la Licencia Apache versión 2.0, ofreciendo mayor control sobre la privacidad sin depender de los servicios de Google.
  • 🍎 Apple controla estrictamente la instalación de aplicaciones a través de la App Store, recopilando grandes cantidades de datos, incluso si los usuarios optan por no compartir analíticas.
  • 🔐 La seguridad de los dispositivos es importante, pero la privacidad también implica control sobre la recopilación y vinculación de datos personales.
  • 🔍 Tanto Apple como Google realizan niveles similares de recopilación de datos en sus servicios, sugiriendo precaución al utilizar los servicios de ambas compañías.
  • 👤 GrapheneOS se destaca como una opción de sistema operativo basada en Android centrada en la privacidad, disponible solo para dispositivos Pixel.
  • 📊 Apple y Google han avanzado en seguridad, utilizando herramientas de aprendizaje automático y chips de seguridad para proteger los datos procesados en el dispositivo.

Q & A

  • ¿Cómo influye la tecnología en las protestas modernas según el guion?

    -La tecnología juega un papel crucial en las protestas modernas, sirviendo tanto como herramienta táctica para organizar, movilizar y documentar eventos por parte de los ciudadanos, como medio para que los gobiernos supriman el descontento público con precisión.

  • ¿Qué ventajas ofreció el iPhone a los manifestantes de Hong Kong?

    -El iPhone proporcionó herramientas para la comunicación cifrada, la monitorización de la presencia policial y la movilización de multitudes. A través de Airdrop, permitió compartir de manera anónima imágenes y archivos que serían censurados en otras plataformas en China.

  • ¿Cómo reaccionó Apple ante las solicitudes del gobierno chino respecto a las protestas de Hong Kong?

    -Apple comenzó a ceder ante las solicitudes del gobierno para censurar aplicaciones que habilitaban o apoyaban las protestas, limitando el acceso a mensajeros cifrados, aplicaciones VPN y una aplicación para monitorear a la policía llamada Hkmap.live.

  • ¿Qué consecuencia tuvo el control de Apple sobre los datos de iCloud de los usuarios chinos?

    -Al darle a Beijing control total sobre los datos de iCloud de los usuarios chinos, el iPhone, que una vez fue elogiado por respetar la privacidad, se convirtió en una herramienta de vigilancia.

  • ¿Por qué se considera que Android es una mejor opción para la privacidad que el iPhone?

    -Android permite mayor control sobre el dispositivo, incluida la instalación de aplicaciones de fuentes terceras incluso si son eliminadas de Google Play Store, ofreciendo una plataforma más abierta para la privacidad y la autonomía del usuario.

  • ¿Cuál es la principal crítica a las empresas de tecnología como Apple en el contexto de privacidad?

    -La crítica principal es que estas empresas buscan encerrar a los usuarios en sus ecosistemas, limitando el control sobre sus propios dispositivos y recopilando grandes cantidades de datos, lo cual atenta contra los derechos de privacidad de los usuarios.

  • ¿Qué ventajas de seguridad se mencionan del iPhone?

    -El iPhone es reconocido por recibir actualizaciones de seguridad durante un período prolongado, lo que es crucial para proteger la privacidad y seguridad de los usuarios.

  • ¿Cómo pueden los usuarios de Android evitar la recopilación de datos por parte de Google?

    -Los usuarios de Android pueden evitar la recopilación de datos no iniciando sesión en una cuenta de Google, usando aplicaciones y servicios alternativos a los de Google, e incluso instalando versiones de Android centradas en la privacidad como GrapheneOS.

  • ¿Qué significa que la privacidad es situacional y contextual?

    -Significa que el nivel de amenaza a la privacidad de una persona puede variar significativamente según la situación y el contexto, por lo que las necesidades de privacidad y seguridad pueden cambiar en diferentes entornos.

  • ¿Cuál es la lección principal sobre la privacidad y el control de la tecnología según el guion?

    -La lección principal es que la privacidad depende del control que los usuarios tienen sobre sus datos y dispositivos. La falta de control expone a los usuarios a riesgos, y es imperativo que puedan tomar decisiones informadas sobre su privacidad.

Outlines

00:00

📱 Tecnología en las Protestas: El Caso de Hong Kong y el iPhone

Este párrafo analiza cómo la tecnología, específicamente el iPhone, juega un papel crucial en las protestas modernas, permitiendo una comunicación encriptada y una organización rápida. Sin embargo, también se destaca cómo Apple cedió ante las demandas gubernamentales de China, limitando herramientas como mensajeros encriptados y aplicaciones para monitorizar la policía, lo que convirtió al iPhone en una herramienta de vigilancia en contra de los usuarios. La conclusión es que el control de Apple sobre el iPhone les quitó a los usuarios la privacidad y la autonomía, evidenciando la pérdida de control sobre sus propios dispositivos.

05:05

🔓 Android vs iPhone: Control y Privacidad

Este párrafo contrasta Android con iPhone en términos de privacidad y control. Señala que, mientras Apple restringe el uso del iPhone a su propio ecosistema, Android permite mayor flexibilidad y control al usuario, ofreciendo opciones como eliminar apps preinstaladas y usar sistemas operativos alternativos como GrapheneOS. Aunque Android no está exento de fallas, proporciona una experiencia más privada y personalizable en comparación con iPhone, que recoge datos extensivos y limita la capacidad del usuario de elegir aplicaciones y servicios fuera de su ecosistema cerrado.

10:08

🔒 La Ilusión de Privacidad en Apple y Google

En este párrafo, se critica la recolección de datos tanto de Apple como de Google, argumentando que ambas compañías tienen prácticas similares de recolección de datos en sus servicios, aunque Google accede a una gama más amplia de categorías de datos. También se cuestiona la efectividad de las características de privacidad de Apple, como la Transparencia de Rastreo de Aplicaciones y las Etiquetas de Privacidad, argumentando que estas son engañosas y no abordan el problema fundamental del rastreo de datos por parte de Apple. Se resalta que Android, a pesar de sus deficiencias, ofrece más transparencia y opciones de control a los usuarios en comparación con iPhone.

15:10

🔐 Android: Una Plataforma de Privacidad Personalizable

Este párrafo enfatiza la capacidad de personalización de Android en términos de privacidad y seguridad. Se discute cómo Android, al ser un sistema operativo de código abierto, permite a los usuarios eliminar apps de Google y otros bloatwares, y utilizar alternativas centradas en la privacidad. También se menciona a GrapheneOS como una opción de sistema operativo enfocado en la privacidad, disponible solo para dispositivos Pixel. La narrativa subraya que, aunque Apple y Google tienen sistemas operativos seguros, Android ofrece más opciones para adaptar el dispositivo a diferentes niveles de amenaza y necesidades de privacidad.

Mindmap

Keywords

💡Tecnología

La tecnología es descrita como una herramienta táctica clave en las protestas modernas, utilizada tanto para organizar masas rápidamente como para capturar momentos fuera del alcance de las cámaras de televisión. Este término resalta la doble fila de la tecnología, donde, aunque facilita la comunicación y la organización entre los ciudadanos, también puede ser aprovechada por los gobiernos para suprimir el descontento público con precisión. Un ejemplo claro es el uso del iPhone por los manifestantes de Hong Kong para compartir información y comunicarse de manera cifrada.

💡Privacidad

La privacidad se enfoca en el control sobre los datos personales y cómo su pérdida expone a los individuos a riesgos. La narrativa del vídeo subraya que la privacidad es fundamentalmente sobre tomar control sobre lo que sucede con nuestros datos, ilustrado por la situación de los usuarios de iPhone en Hong Kong, quienes perdieron este control y, por ende, su privacidad frente al gobierno.

💡Censura

La censura se refiere a la práctica de suprimir información considerada sensible o no deseada por ciertos poderes, como gobiernos o corporaciones. En el contexto del vídeo, Apple censura aplicaciones que permiten la comunicación cifrada y el acceso a información no filtrada, limitando así la capacidad de los ciudadanos de Hong Kong para organizarse y proteger su privacidad.

💡Android

Android es presentado como una alternativa a iOS de Apple, con un enfoque en la privacidad gracias a su naturaleza de código abierto. Permite a los usuarios instalar aplicaciones desde fuentes externas al Play Store de Google, ofreciendo así una mayor flexibilidad y control sobre la privacidad y los datos personales. Esta característica de Android se contrapone a la naturaleza cerrada de iOS, que restringe las aplicaciones a las disponibles en la App Store de Apple.

💡Ecosistema cerrado

Un ecosistema cerrado se refiere a un entorno de software y hardware donde el control sobre aplicaciones, servicios y funcionalidades está limitado por el proveedor del sistema, como Apple con iOS. Este concepto es crucial para entender cómo las restricciones impuestas por estos ecosistemas afectan la privacidad y el control del usuario sobre sus dispositivos, destacado en el vídeo por las limitaciones de Apple en cuanto a aplicaciones y servicios.

💡Recopilación de datos

La recopilación de datos se menciona en el contexto de cómo tanto Google como Apple recopilan información sobre sus usuarios, incluso si estos optan por no compartir análisis. Este concepto subraya la importancia de la transparencia y el consentimiento en la gestión de datos personales, así como los riesgos asociados a la privacidad cuando las empresas no respetan estas normas.

💡Seguridad

La seguridad es destacada como una característica importante de los dispositivos móviles, especialmente en términos de actualizaciones que protegen contra vulnerabilidades. Sin embargo, el vídeo argumenta que, aunque es una condición necesaria para la privacidad, no es la única consideración. Este balance entre seguridad y privacidad es crucial para entender las diferencias en cómo Android e iOS abordan ambos aspectos.

💡Libertad de elección

La libertad de elección se refiere a la capacidad de los usuarios para tomar decisiones sobre sus dispositivos y servicios, como instalar aplicaciones de fuentes no oficiales o cambiar aplicaciones predeterminadas. En el vídeo, esta libertad es contrastada entre los usuarios de Android, que tienen más opciones, y los de iPhone, cuyas elecciones están más restringidas por las políticas de Apple.

💡Identificabilidad

La identificabilidad se relaciona con la capacidad de vincular información a individuos específicos, aumentando así el riesgo de privacidad. El vídeo discute cómo las políticas de Apple y Google en cuanto a la recopilación de datos pueden comprometer la anonimidad de los usuarios, destacando la importancia de sistemas que permitan el uso sin necesidad de identificación personal.

💡ROMs personalizadas

Las ROMs personalizadas son versiones del sistema operativo Android modificadas por terceros para ofrecer características o configuraciones distintas. El vídeo menciona estas ROMs como una opción para aquellos que buscan una experiencia más privada y segura, ilustrando la flexibilidad y apertura de Android frente a la naturaleza cerrada de iOS.

Highlights

Technology plays a dual role in protests, aiding organization and suppression.

iPhones were used in Hong Kong protests for encrypted communication and monitoring.

Apple complied with government requests to censor apps supporting Hong Kong protests.

Chinese users' iCloud data control was given to Beijing, undermining privacy.

Tech companies lock users into ecosystems, limiting control over their devices.

Android offers more privacy than iPhone due to its open-source nature.

Android allows installation of apps from third-party sources, bypassing official app stores.

Apple's strict control over app installation and data collection exposes users to surveillance.

Android's flexibility enables users to de-Google their devices for privacy.

Privacy-focused Android versions like GrapheneOS offer enhanced security.

Apple's privacy marketing contrasts with its extensive data collection practices.

Google and Apple both exempt themselves from third-party ad tracking rules.

Android's permission system provides more transparent app data access than Apple's.

Privacy is contextual and situational, with different threat models for different scenarios.

Regulatory scrutiny in Europe may force Apple to allow alternative app installation sources.

Transcripts

play00:00

In any modern-day protest, technology defines the battleground. For the citizens in the

play00:05

streets, it's a key tactical tool that can organize masses quickly and capture moments

play00:10

outside of the view of TV camera lenses. But the very same technology can be leveraged

play00:15

to suppress public unrest with surgical precision. Whoever is in control of the technology gets

play00:21

to determine the outcomes. As a case study, take Hong Kong protesters

play00:25

and the iPhone. [0] As a weapon of choice, the iPhone provided

play00:28

the citizens with a plethora of tools for encrypted communication, monitoring police

play00:33

presence or mobilizing crowds. With Airdrop, Apple users could swiftly and anonymously

play00:39

share images and files that would otherwise be censored on other platforms in China. [1]

play00:44

Unfortunately, it didn't take long for Apple to start submitting to government requests

play00:48

to censor apps enabling or supporting the protests. Slowly but surely, Hongkongers were

play00:54

losing access  to encrypted messengers, VPN apps, and a police monitoring app Hkmap.live.

play00:59

[2 - 4] Since Apple gave Beijing total control over

play01:03

all iCloud data of Chinese users, the once hailed privacy-respecting iPhone was retrofitted

play01:09

into the most inimical surveillance machine. [5]

play01:13

The main takeaway from the Hong Kong story is that iPhone users were never in control

play01:18

of their devices. Apple took that control away from them and gave it to the government

play01:23

in order to stay in business. When Hongkongers lost their privacy, it was easy for the government

play01:28

to crack down on them one by one. [6 - 8]

play01:32

Privacy is ultimately about taking control over what happens to your data. The less control

play01:37

you have,  the more exposed you are. This is in defiance with the trend in almost all

play01:43

consumer electronics today.  Most companies, much like Apple, are trying

play01:47

to lock users into their ecosystems. And in doing so they are stripping users away from

play01:52

more and more controls over their own devices. It's as simple as restricting where users

play01:57

can download apps from to an only place controlled by the platform. Or not allowing users to

play02:03

change default apps for messaging or browsing. Or not giving users an option to fully utilize

play02:08

their devices without self-identification to the company. All of these restrictions

play02:12

are legally protected by licenses that pay no regard to end-user rights. 

play02:18

This is why Android, despite all of the flaws of Google that develops it, is today a fundamentally

play02:23

better choice for your privacy. If Hong Kong protesters leveraged the full capability of

play02:28

the open source operating system, they still would have been able to install and run apps

play02:33

even if Google deleted them from Play Store. It is perhaps this realization that can explain

play02:38

why over the course of the Hong Kong Protests, the iPhone has been dethroned from its dominant

play02:42

market share in the city. [9] Android is not perfect. But for most any person

play02:47

today, from the most vulnerable dissidents to any regular Internet user, Android is more

play02:53

private than the iPhone. And here's how.

play02:56

For most users, this is the everyday Android experience. In many ways, it is a perfect

play03:01

emulation of the iPhone experience. You have your Play Store where you download apps from,

play03:06

you have your email app, the Chrome browser, Google Drive, your search assistant, and perhaps

play03:12

some other pre-installed apps. But this is not what Android actually is.

play03:16

In its main form, Android is just a blank operating system. It is fully functional.

play03:21

Capable  of connecting to the Internet, browsing the web, downloading apps, making calls and

play03:25

sending messages. But there is no Google. No Play Store, no Google Search, nothing proprietary.

play03:32

Android is licensed under the Apache License version 2.0. It is an open source license

play03:37

that allows anyone to take Android's code for free, make modifications to it and redistribute

play03:43

it. It is why there are so many different "skins" made by different manufacturers. [10,

play03:47

11] But what it means for privacy-conscious users

play03:50

is that they can fully use Android without being signed into a Google account or even

play03:55

having any Google apps and services installed. They would still be able to download apps

play04:00

from third party sources, just not from Google Play Store. They could still do cloud backups,

play04:06

change the default messaging app, or do anything else they just wouldn't do it through Google's

play04:11

products. If Google decided to restrict some essential privacy apps from the Play Store,

play04:16

users could still get them directly from the developers. 

play04:19

This simply isn't possible on the iPhone. The only way to install apps on any iOS device

play04:24

is through the App Store, which Apple solely controls and collects tremendous amounts of

play04:29

data from. Users have to be signed in with their Apple ID which is tied to their real

play04:34

life identity, which means any download or purchase through the App Store is surveilled

play04:39

by Apple and tied to specific individuals.  Latest security research found that Apple

play04:44

does this detailed data collection even if users opt out of sharing analytics. [12]

play04:49

For many regular users in a non-threatening situation, downloading apps from an official

play04:54

app repository is going to be the most secure option. But when the threat level changes,

play04:59

such as during a protest or for vulnerable individuals, other options should be open.

play05:04

On the iPhone, it isn't the case. Users cannot make that choice.

play05:08

The only way to restrict Apple from collecting your data is to remove your Apple ID from

play05:13

the iPhone. And you have the option to do that. But you can no longer do anything on

play05:18

that phone. You won't be able to download apps, send messages or use cloud backups.

play05:23

[13] On Android, you do need a Google account to

play05:25

use Google apps. But if you don't want to do that, you can find an alternative for any

play05:30

Google service out there and use it without any major issues on your Android phone.

play05:35

Both Google and Apple are ecosystems. Google's ecosystem is their services. Apple's ecosystem

play05:42

is their services, their devices, their apps and their operating systems. Apple controls

play05:47

everything on the iPhone. On Android, users are allowed to take  that control back from

play05:53

Google.

play05:54

The biggest advantage of the iPhone are security updates. Their phones have had the longest

play05:59

support for security patches and Android phones are only now slowly catching up. This is a

play06:05

major issue and while Google does match Apple's update practice with Android and Google's

play06:10

own hardware, most Android vendors are falling behind quite drastically. [14, 15]

play06:15

Security, is an important privacy prerequisite. However, it isn't the only one, nor the major

play06:20

one. [16] Most people's immediate privacy exposure is

play06:23

linkability and identifiability. Getting hacked is on the list, but probably not at the top

play06:29

for most people. [17] Linkability is connecting any two data pieces

play06:33

together based on relevant categories. It can be as minor as connecting the dots between

play06:37

people sharing common interests, or it can be as excessive as identifying individuals

play06:43

by different data points. Likewise, most online services require that

play06:47

users out themselves to the providers, surrendering any trust to the companies behind them. No

play06:52

system that doesn't give users the freedom to use it without identifying themselves should

play06:57

be considered a private system. [18] Both Apple and Google engage in very similar

play07:02

levels of data collection in their respective services. Google does have a search engine

play07:06

and YouTube which Apple doesn't have, and overall, Google has access to more categories

play07:11

of data. But one to one, Google Services and Apple equivalents should be both avoided with

play07:19

the same level of precaution. [19, 20]

play07:21

Here is a practical example that brings this issue home for everyone. Geofence warrants

play07:26

are a frequent policing tool whereby a local law enforcement can go to Google and Apple

play07:31

and request information on all devices or accounts that were present in a specific place

play07:35

and time. It isn't uncommon for hundreds or even thousands of devices to be swept up under

play07:41

one such request. [21 – 24] But these requests easily lead to abuse, profiling

play07:46

and unjust police overreach. Innocent people are often accused of crimes they never committed

play07:51

simply because they ended up in these dragnet surveillance requests. [25]

play07:55

The only way to avoid this on the iPhone is to have the phone in airplane mode and have

play07:59

location services disabled. You can also do that on Android and it would be sufficient.

play08:04

But at that point your phone would just be a very expensive brick in your pocket. On

play08:08

Android though, you have more options. One way is to remove Google account from your

play08:14

phone and use privacy-respecting alternatives in its place. [26]

play08:17

A more certain method would be to entirely delete pre-installed Google and other bloatware

play08:21

apps from your Android phone and then use privacy-preserving alternatives. [27, 28]

play08:25

The third option is to use a privacy-focused offshoot of Android such as GrapheneOS. This

play08:30

is in fact, the most private and secure option. [29]

play08:33

But it is only available to Pixel devices. None of these options are too difficult even

play08:38

for the most non-technical user. You might have to learn a thing or two, but at least

play08:43

you have options. The point is, both Apple and Google data collection

play08:47

should be equally avoided. But only Android is open enough to allow for the user to decouple

play08:52

their phone from the company that made it. 

play08:55

Which brings me to another point. Privacy is fluid. You are never gonna find two people

play09:00

with the exact same threat model. You are not even gonna find one person with the same

play09:04

threat model in all different situations. Your privacy threat level is gonna vastly

play09:09

differ from when you are with your family versus when you are at your workplace. Even

play09:12

at your workplace, your privacy risk will likely change if you decide to join a union.

play09:18

Privacy is situational and contextual. For some situations, it might be reasonable to

play09:23

use an Apple device. But it is by no means a private experience and you have to operate

play09:28

under that realization. [30, 20, 31] On Android, you have the option to adjust

play09:32

your privacy level in any direction and at any point. You can do this by deleting Google

play09:36

from your phone, removing pre-installed apps or changing your defaults. Or you can install

play09:41

a custom version of Android like GrapheneOS or something else according to your needs. 

play09:45

On the iPhone, you are pretty much stuck to one threat model dictated by Apple's enforced

play09:50

defaults. Recently, Apple came up with the Lockdown mode, which is a very convenient

play09:55

feature that significantly enhances your security. It's useful for targets of advanced persistent

play10:01

threats like nation state hacking groups. [32, 33]

play10:03

None of the Lockdown security features do anything about the data collection conducted

play10:08

by Apple. You are still forced into Apple's default services, all usage data is still

play10:13

being collected. [30, 13, 34, 35] Lockdown makes your iPhone more secure. But

play10:18

if you need to have a phone with that level of security, you are much better of with GrapheneOS.

play10:22

I have talked about GrapheneOS in the past many times so I won't repeat myself here but

play10:27

GrapheneOS trumps iPhone in all security features and unlike the iPhone, GrapheneOS is also

play10:33

anonymous. [29, 36]

play10:34

Apple has been really great at marketing themselves as a privacy company. And much of that is

play10:39

just a ruse, but that's for another time. With respect to the iPhone though, Apple has

play10:44

marketed the living hell out of the two best selling privacy features they have - the app

play10:49

tracking transparency and privacy nutrition labels. But none of these are actually achieving

play10:53

anything what they claim to be. [37] The App Tracking Transparency is the popup

play10:57

prompt with the "Ask app not to track you". This is a powerful statement because how can

play11:03

you ask someone not to track you? The way the iPhone does it is actually very simple.

play11:08

Too simple in fact. All it does is it removes the ability for the app to use your advertiser

play11:12

ID, which Apple built into everyone of its devices by default. Saying that this limits

play11:18

tracking is incredibly deceitful in the common understanding of the word. [38]

play11:22

Tracking is whenever someone collects information about your activities, behavior, or usage

play11:27

over a period of time. Tracking can be done solely within a service or even outside and

play11:32

across multiple third parties. But this is not how Apple defines tracking. In their terms,

play11:38

tracking is only when a developer links the data they collect from you with the data they

play11:41

obtain from data brokers. That's such a specific case that it wouldn't apply to the vast majority

play11:46

of tracking that's occurring to most people. But this definition does immunize a lot of

play11:51

what Apple is doing. Because Apple is 100% tracking everything you do on their services.

play11:56

They just don't use the standard definition of tracking.

play11:58

[34] On Android, you can also limit this kind of

play12:01

"ad tracking" by simply disabling your advertiser ID in the settings. And it would do exactly

play12:06

the same - developers will still collect the same amount of data about you, they just won't

play12:11

be able to use your ad ID. That's all. [39] What's most important to say about this ad

play12:15

tracking on both Android and the iPhone, it's that none of that applies to Google's and

play12:20

Apple's own advertising networks. For that, you have to go to the settings in your Google

play12:24

account and Apple ID. [40, 34] It is very misleading from both of these companies

play12:28

to exclude themselves from the rules they apply to third parties. But that's what it

play12:33

is -  a market consolidation sold to you as a privacy feature. [41, 30]

play12:37

Apple has been celebrated into high heavens for its "nutrition labels". And it's great

play12:42

and all except Apple will never actually tell you what any of the apps you install have

play12:46

technical access to. [42] On Android, you can see this technical info

play12:49

in the permission manifest, as it is mandatory for all developers to declare what permissions

play12:54

they require before a user installs their app. It is a far more precise method of telling

play12:59

you what the app will be able to collect than letting developers arbitrarily explain those

play13:03

parameters in "nutrition labels". [43] Google has jumped on the trend and started

play13:08

doing the labels too. But if you actually want to know what the app does, you want to

play13:12

look for the permission list. You can only do this on Android, not the iPhone. 

play13:18

Recently, Apple expanded end-to-end encryption in iCloud backups to finally include messages,

play13:23

notes and photos. This isn't enabled by default, and it doesn't include all sensitive data.

play13:28

Contacts and calendar data still remain open. But it's at least better than what it was

play13:33

before. It is in fact better than Google Drive. However, iCloud is still hardly a privacy

play13:39

solution, because Apple doesn't encrypt any metadata and requires user authentication

play13:46

with identifiable credentials - which is the Apple ID. While encryption makes the content

play13:51

of the data secure, the metadata surveillance still leaves the user exposed to indetifiability,

play13:57

linkability, non-repudiation and detectability threats. These threats expose hoards of usage

play14:03

data for Apple to monetize, analyze and profile. All of which Apple does with the data they

play14:08

collect and they already laid out plans to expand this practice even further in the future.

play14:14

[44, 13] The best course of action to take is to disable

play14:16

any proprietary cloud integration on your device and opt for a privacy-preserving cloud

play14:21

service that also protects or at least doesn't process your metadata. Only then can you have

play14:27

full control.

play14:28

Android's biggest strength is that it's not just one operating system. It's a platform

play14:33

on top of which anyone can build their spin-off. Android has many so-called "custom ROMs",

play14:40

which are simply different iterations of the operating system focused on different goals.

play14:44

Naturally, this spawned privacy-focused Androids that offer a private-out-of-the-box experience.

play14:51

GrapheneOS has for the longest time been the one carrying the crown and it seems like it

play14:55

will remain so far-off into the future. The OS comes with significantly enhanced privacy

play15:00

and security features with a clear goal of making a perfectly anonymous device with security

play15:06

parameters able to withstand 0-day exploits. [29]

play15:09

These options are nonexistent on the closed-source iPhone. Your iPhone will never be anonymous

play15:14

because Apple will always collect your hardware identifiers and tie them to your Apple ID.

play15:21

On Android, you can permanently remove Google from accessing those identifiers with GrapheneOS. 

play15:27

It is important to mention that both Google and Apple have built two of some of the most

play15:32

secure consumer-grade operating systems one can get. They are both far beyond their desktop

play15:37

competition in terms of security. There have been trends in the recent years

play15:41

to keep more and more data processing on the device. Apple and Google are both leveraging

play15:45

AI learning tools such as federated learning or differential privacy to protect some user

play15:50

data. Google Pixel phones and iPhones are shipped with security chips that make it impossible

play15:55

for anyone in the world to unlock a phone without user authentication. Google and Apple

play16:00

have essentially made impenetrable devices. Your stock Android and iOS experience is becoming

play16:06

more secure year by year. [45 – 48] But little of that matters for your privacy

play16:10

the moment you go online. Apple and Google are both are in the business of monetizing

play16:15

the customer's use of their devices. And that's where both platforms tend to abuse their position

play16:19

to dictate what apps and services Android and iPhone users default to. But only one

play16:24

platform allows for divergence from that model.

play16:28

This is the reason why only Android has NewPipe, an app that allows you to watch YouTube videos

play16:32

without ads and tracking. Or multiple repositories of free and open source apps and many privacy

play16:37

tools that would be banned from the App Store and Google Play store for violating their

play16:41

policies. This is why only Android has the option to install apps without the platform

play16:46

knowing about your identity and usage. This is a level of control that simply cannot

play16:50

be replicated on the iPhone. Apple has been in a hot water recently as dinosaur regulators

play16:56

are finally realizing iPhone users are the only ones not allowed to install apps from

play17:01

sources other than the App Store. So maybe in Europe, Apple could be forced to open up

play17:06

the iPhone a little bit. And that would be great. But they will fight tooth and nail

play17:11

to make sure that doesn't happen. 

play17:13

Control does not guarantee privacy. But it is an absolute imperative. Privacy cannot

play17:18

be given. It can only be taken. It's a sad lesson to learn from the real world. Whether

play17:24

it's Hong Kong, China, or anywhere else in the world - history is written by those in

play17:28

control. 

Rate This

5.0 / 5 (0 votes)

Related Tags
TecnologíaProtestasPrivacidadHong KongiPhoneAndroidSeguridadLibertad DigitalControl de DatosEcosistema Abierto
Do you need a summary in English?