The world is changing fast and your private data is at risk whenever you go online. Numerous entities, both public and private, are working hard to track, monitor, and record your digital activities. There are many reasons for this:
- Advertisers (including Google and Facebook) want to know everything about you, including your web browsing history, location data, contacts, and more. This makes it easier (and more profitable) to serve you targeted ads and influence your purchases.
- In an age of pandemics and lockdowns, many governments around the world are working hard to track movement and biometric data of their citizens.
- ISPs (internet service providers) are spying on their customers and feeding this data to various third parties, including advertisers and government agencies. In many countries, this is not only legal, but required. See for example in the United Kingdom (with the Investigatory Powers Act), United States (Senate Joint Resolution 34), and now also in Australia (mandatory data retention).
- The internet is also becoming less free due to censorship efforts and content blocking. Whether it is China, Germany, the UK, or the United States, various groups are working hard to censor content online.
But don’t get discouraged. Alternative technologies are experiencing a renaissance as awareness about these issues grows and people seek out solutions. Indeed, for all of the problems listed above, we find excellent solutions to give you more privacy, security, and freedom in your digital life. And that is the purpose of this guide: to give you solutions. Here’s what we’ll cover in this guide:
- Secure and privacy-focused browser
- Virtual Private Network
- Ad blocker
- Password manager
- Secure and encrypted messaging
- Private search engine
- Private email
- Operating system
- Antivirus software
- Data removal tools
But before we begin, one key consideration is your threat model. How much privacy and security do you need given your unique situation and the adversaries you may face?
Most people today are seeking protection against online tracking by advertising networks as well as a higher level of privacy and security. Others, such as investigative journalists working with sensitive information, would likely need an even higher level of protection. So keep this in mind as you proceed. Everyone is unique in their approach to privacy and security; there is no one-size-fits-all solution.
So here’s what you need:
1. Secure and privacy-friendly browser
Everyone needs to be using a secure and privacy-friendly browser for three important reasons:
- Browsers have a large attack surface and can be compromised in many ways.
- By default, most browsers contain lots of private information, including your browsing history, usernames, passwords, and autofill information, such as your name, address, etc.
- Browsers can reveal lots of identifying information about your location, system settings, hardware, and much more to third parties.
Secure Browsers: Based on my own tests and experience, here are the most secure browsers that also respect your privacy:
- Brave – Brave is a chromium-based browser that is very privacy-focused right out of the box. By default, it will block ads and trackers, and it’s also customizable, fast, and has built-in protection against browser fingerprinting.
- Firefox (modified) – Firefox is a great browser for both privacy and security after doing some modifications. It is highly customizable to give you the level of security and privacy you desire, while also being compatible with many browser extensions. See our guide on how to modify Firefox for more privacy.
- Tor browser – The Tor browser is hardened version of Firefox that also utilizes the Tor network by default (but this can be disabled).
- Ungoogled Chromium – As the name suggests, Ungoogled Chromium is a stripped-down Chromium browser that has been “Ungoogled” for more privacy. Source code is here.
- LibreWolf – This is a fork of Firefox that has been tweaked for more privacy and security.
Of course, there are many browsers on the market and choosing the best one all comes down to your own needs and tastes. Chrome, Opera, Safari, and Vivaldi also get some attention, but they’re not the best choices from a privacy standpoint.
2. Virtual Private Network (VPN)
Using a good VPN (virtual private network) is one of the simplest and most effective ways to protect your privacy, secure your devices, and also access blocked content online. A VPN is a critical tool to be using, especially with internet service providers spying on their users and logging all activity.
Here are some of the problems that VPNs can solve:
- ISP Spying – A VPN will encrypt and anonymize your internet connection. This makes your traffic completely unreadable to your ISP and other third parties.
- Blocked content – A VPN will let you easily get around blocked content and censorship. Simply connect to a VPN server in the region you need and access the website or stream as normal.
- IP and location tracking – Many websites and advertisers track users through their IP address. With a VPN, your IP address and location will be replaced by the VPN server’s IP address and location.
- Copyright issues – Torrenting and streaming media from third-party sources can come with some risk in the form of copyright issues. A VPN will anonymize your IP address and help keep you safe.
We’ve tested all of the popular VPN services and the results can really vary. Below are our current recommendations that are private, secure, fast, and reliable on many platforms.
- NordVPN – Best all-around VPN with secure apps for all major devices and very fast speeds (over 750 Mbps). Great for streaming plus extra security features (with a 74% off coupon).
- Surfshark – Best VPN for many devices (unlimited)
- ExpressVPN – Secure and reliable VPN service
- Proton VPN – User-friendly and private VPN in Switzerland
We have other recommendations and providers in our guide on the best VPN services.
And if you are new to VPNs, we also have a guide on how to use a VPN.
3. Advertisement, tracker, and malware blocker
A good ad blocker is essential for privacy and security reasons. From a privacy perspective, it’s important to block ads because they also function as tracking by recording your online activity to create an intimate user profile. This data is then used for targeted ads and/or sold to other parties.
Ads are also risky from a security perspective because they can contain malicious code that can infect your device when a web page loads – no clicks required.
Effectively blocking all ads is the only way to go. Here are a few different options from our guide on the best ad blockers:
- Browser ad blocker extensions – Browser-based ad blocker extensions, such as uBlock Origin are quite popular, but they also come with some tradeoffs. Online ads may still be using up resources and tracking you, even if the ads are not being displayed. Choose your ad blocker carefully – some ad blockers will collect user data for profit and/or show you “approved” ads.
- VPN ad blocker – There are now many VPNs with ad blocking built in. With this method, the VPN can effectively block ads, trackers, and malware at the VPN server, thereby protecting your devices.
- Ad blocker apps – A dedicated app will most likely do a very good job blocking ads on your device. One popular and well-regarded option is AdGuard.
- Ad blocking on a router – Ad blocking on a router can be accomplished various ways – from using ad blocking DNS to loading custom filter lists onto your router.
- Pi-hole – Pi-hole is a network-wide ad blocker that functions as a DNS server and can be deployed in various ways. It is most often used on a Raspberry Pi, connected to your home router (but there are many other different setup options).
The best ad blocking setup will depend on your situation and needs. If you have numerous devices you use at home, setting up a network-wide ad blocker would be a good solution for blanket protection. uBlock Origin remains a popular option for browser-based ad blockers. However, I like NordVPN with the Threat Protection feature as a simple, all-in-one solution for VPN and ad-blocking.
4. Password manager
The topic of passwords is actually quite large, encompassing password strength, password management, and password storage. In this section we’ll focus on password management and storage. Many people store passwords directly in the web browser — but this can be risky.
A more secure method is to use a dedicated password manager app. And note that a dedicated password manager can also offer browser extensions that are convenient and secure. Here’s a screenshot of Bitwarden, which is one of our favorites:
Here are the best password managers we have tested:
- NordPass – From the makers of NordVPN and NordLocker, NordPass is a secure, user-friendly password manager that has also passed a third-party audit. (See the NordPass review here.)
- Bitwarden – A free and open source password manager that is user-friendly and secure. (See our Bitwarden review.)
- 1Password – Another great option is 1Password, with many features and strong security standards for all types of devices (our 1Password review has more info).
- KeePassXC – As a locally-hosted password solution, KeePassXC differs from the others on our list. See the pros and cons of this password manager in our KeePass review.
Start using a good password manager today. See also our guide on how to create strong passwords.
5. Secure and encrypted messaging apps
Many people are turning to secure and encrypted messaging apps over concerns with privacy and security of other popular messengers. For example, WhatsApp collects and shares data from your phone with Facebook, the parent company of WhatsApp. If you find this concerning (and you should), then consider some of the secure alternatives below.
Additionally, with the inherent limitations of email, we recommend a secure messaging app for those wanting the most secure messaging platform possible. The secure messaging apps below utilize strong encryption standards and work well for teams or individual use on various operating systems and devices.
- Signal – This is probably the most popular secure messenger with a rapidly-growing user base. It is free, open source, and very secure. We really liked how it performed in our Signal review — but also noted some drawbacks, such as the need to use your phone number for verification.
- Wire – Based in Switzerland, Wire is another great option that is secure, user-friendly, and fully featured. While there is a free version for personal use, it is hard to find, as described in our Wire messenger review.
- Threema – This is one of the few paid encrypted messengers, but it’s only $3.09 for a lifetime license. Threema is also based in Switzerland and is open source. See our Threema review here.
- Telegram – Telegram is a very popular encrypted messaging app out of Russia, but it also is not encrypted by default. See the pros and cons in our Telegram review.
With all of the people abandoning WhatsApp and going over to Signal, there’s a better chance to connect with people you know on a secure platform. This trend kicked off early last year and we hope to see it continue!
Note: Also keep in mind that standard SMS text messages are not secure or private. They can be read by your phone service provider and are susceptible to man-in-the-middle attacks and also eavesdropping by Stingray devices. When privacy matters, use a good secure messaging app.
6. Private search engine
The big search engines (Google, Yahoo, Bing) record and track your searches, which helps them to build a user profile for their advertising partners.
Consider these privacy-friendly search engines instead:
- MetaGer – An open source metasearch engine with good features, based in Germany.
- Searx – A privacy-friendly and versatile metasearch engine that’s also open source.
- SwissCows – A zero-tracking private search engine based in Switzerland, hosted on secure Swiss infrastructure.
- Qwant – A private search engine based in France.
- DuckDuckGo – A private search engine based in the US.
- Mojeek – The only true search engine (rather than metasearch engine) that has its own crawler and index (based in the UK).
- YaCy – A decentralized, open source, peer-to-peer search engine.
There are also a few “private search engines” that are now owned by advertising companies. For example, Startpage was bought out by System1, a pay-per-click ad company. For more information, see our guide on private search engines.
7. Private email
Many of the popular email providers, such as Gmail, Yahoo, and iCloud are not good choices when it comes to privacy. Would you want random people having full access to your emails, collecting data for targeted ads, or passing the information on to third parties? This actually happens.
- Gmail gives third parties full access to emails and also tracks all of your purchases by reading the receipts in your inbox.
- Advertisers are allowed to scan Yahoo and AOL accounts to “identify and segment potential customers by picking up on contextual buying signals, and past purchases.”
- Yahoo was found to be scanning emails in real-time for US surveillance agencies.
And while Gmail remains the most popular service in the world, you pay with your privacy. Consequently, as awareness about these issues grows, many people are seeking alternatives to Gmail.
If you care about privacy and the security of your data, consider these secure email services. Here are some excellent options:
- Proton Mail – Best for strong encryption (33% off coupon)
- StartMail – Private email hosted in The Netherlands (50% off coupon)
- Mailfence – A secure and customizable email service
- Tuta Mail – Secure Email for Any Device
- Mailbox.org – Affordable private German email service
- Posteo – Reliable anonymous email service
- Runbox – Private email in Norway
- CounterMail – Swedish email with strong security features
- Kolab Now: Swiss email, compliant with GDPR, HIPAA, and PCI
- Soverin – Basic private email service
And if you want to learn more, check out these reviews:
- ProtonMail Review
- StartMail Review
- Tutanota Review
- Mailfence Review
- Mailbox.org Review
- Hushmail Review
- Posteo Review
- Fastmail Review
- Runbox Review
Note: We also have a guide on encrypting email.
8. Operating system
Consider using the free and open source Linux operating system. There are many different versions of the Linux operating system designed for different types of users:
- If you want the look and feel of Mac OS or Windows, check out Elementary OS.
- Ubuntu, Mint, and Debian are other popular options.
Tails is another privacy-focused operating system that can be run live on a USB drive, CD, or SD card.
Problems with Windows and Mac OS
Windows – The latest version of Windows (Windows 10) is a platform built for total surveillance – giving corporations and governments complete access to everything you do on your machine. Aside from data collection concerns, most malware targets Windows users – another serious drawback and security risk.
Mac OS – While Apple may be slightly better in terms of privacy, it too has problems. Just like Microsoft, Apple has configured its operating systems to collect vast amounts of your private data, whether it is browsing history through Safari, connection data, location services, and more.
9. Antivirus software
While not necessarily a “privacy” tool, using good antivirus software may be wise depending on your situation. The problem, however, is that many antivirus solutions abuse your privacy and may come with some invasive and “unwanted” additions.
Just like with sketchy free VPN services, free antivirus software can also be problematic. In testing eight popular free antivirus suites, Emsisoft discovered that seven of them were bundled with PUPs (potentially unwanted programs), which can be harmful and very annoying. Tip: avoid free antivirus software!
Another major issue is privacy. Many popular antivirus suites utilize invasive data collection, to include browsing history, “suspicious” files, metadata, and more. Carefully read through the privacy policy of your antivirus before installing.
Although RestorePrivacy does not devote much attention to antivirus software, one solution that offers the highest levels of security while also respecting user privacy is Emsisoft. Another potentially good option, which is entirely FOSS, is Clam AV.
See also the antivirus privacy guide.
10. Data removal tools
As regular readers of this site know, personal data is valuable. In fact, there massive companies working behind the scenes to collect, compile, and sell your private data to third parties.
While there are good solutions for how to delete your digital footprint, there are also tools that take an active approach in targeting these data brokers. These types of tools and services are becoming increasingly popular, especially as the data collection problem becomes increasingly worse.
Here at RestorePrivacy, we have tested many different market leaders, such as DeleteMe and Incogni. Based on our tests and analysis, these are some of the top options:
- Incogni – Developed by the team behind the popular VPN service Surfshark, Incogni is a simple-to-use solution that focuses on efficient data removal across a wide network of platforms.
- DeleteMe – A popular choice that offers a wide variety of features and services designed to protect your privacy and keep your personal data away from data brokers and people search sites.
- Optery – A comprehensive tool that prioritizes the secure erasure of data from various databases, helping users regain control of their online information.
See the best data removal services here.
Conclusion: Restore your privacy and take control of your data
That’s all for now, although this guide will continue to be updated with more privacy tools and information. We’re also keeping an eye on discussions surrounding privacy tools on various forums, such as Reddit.
If you have any feedback, tips, or suggestions based on privacy and security tools you are using, feel free to drop a comment below!
This article was last updated on May 31, 2024.
Privacy o-o Hunter
These examples illustrate how states are using surveillance technology to spy on the public, often without warrants or adequate oversight. The use of these technologies raises concerns about privacy, civil liberties, and the potential for abuse of power.
– Warrantless Wiretapping: The US government uses Section 702 of the Foreign Intelligence Surveillance Act (FISA) to conduct warrantless wiretapping of communications between foreign targets and US persons. This allows the government to collect massive amounts of data on Americans’ communications, including emails, messages, and internet activity.
– PRISM Program: The PRISM program, revealed by Edward Snowden, enables the NSA to directly access communications data from major tech companies like Google, Facebook, and Apple, without a warrant. This program collects data on international communications, including those of ordinary Americans.
– National Security Letters (NSLs): The FBI uses NSLs to demand that financial institutions and other organizations provide customer data without a warrant. This has led to the surveillance of millions of Americans, including those with conservative viewpoints or Second Amendment interests.
– Big Data Analytics: The government uses big data analytics tools to analyze and filter transactions, targeting terms like “MAGA” and “TRUMP,” as well as purchases of books, religious texts, firearms-related items, and recreational stores. This surveillance extends beyond criminal suspicion, likely encompassing millions of Americans.
– Surveillance of Financial Data: The government has accessed financial data from institutions like Citigroup, Bank of America, and JPMorgan Chase, using warrantless searches and NSLs. This has raised concerns about the government’s ability to monitor Americans’ financial activities without a warrant.
– Biometric Surveillance: The government uses biometric technologies, such as facial recognition and iris scanning, to monitor individuals. This includes the use of surveillance cameras, drones, and other technologies to track people’s movements and activities.
– Total Information Awareness (TIA) Program: The TIA program, although defunct, aimed to collect and analyze vast amounts of data on Americans’ activities, including financial transactions, travel patterns, and internet activity.
– Surveillance of Public Spaces: The government uses aerial surveillance, such as drones and spy planes, to monitor public spaces, including shopping malls and industrial parks. This blurs the line between public and private spaces, allowing for increased surveillance of individuals.
Some US AI Surveillance Used
______________________
– Mass Surveillance: Section 702 of the Foreign Intelligence Surveillance Act permits the US government to engage in warrantless surveillance of Americans’ international communications, including phone calls, texts, emails, social media messages, and web browsing. This surveillance is conducted using AI-powered systems to analyze and filter vast amounts of data.
– Algorithmic Personalized Pricing: The Federal Trade Commission (FTC) is investigating how companies use AI to tailor prices to individual consumers based on their data, including demographics, behavior, and browsing history. This practice, dubbed “surveillance pricing,” raises concerns about privacy and potential anticompetitive practices.
– Drone Surveillance: Insurance companies, like Travelers, are using AI-powered drones to monitor homeowners’ properties, potentially collecting data on residents’ activities and habits. While the company denies using this data for underwriting decisions, the practice raises privacy concerns.
– Public Surveillance Systems: AI-powered public surveillance systems, such as facial recognition technologies (FRT) and contact tracing applications, are being deployed in public spaces. These systems can track individual movements, monitor behavior, and predict social patterns, potentially infringing on privacy and human rights.
– Government Surveillance Infrastructure: Governments are investing in AI-powered surveillance infrastructure, including millions of cameras, to monitor and track citizens. AI can process every frame and provide real-time analysis, enabling authorities to identify and respond to potential threats.
When SmartTech has more liberties than the public where are our public Bill Of Rights liberties gone? You know that condition of being free from confinement, oppressive restriction or control by a government or other power, free to engage in certain actions without control or interference by a government or other power as the publics BOR liberties spelled out and is protected by the Bill of Rights.
That was our wild card in life before any surveillance technology landed, got established and being twisted now with AI…ever came along!
These liberties have been lost due to the government’s adoption of surveillance technologies without adequate safeguards and oversight. The lack of transparency and accountability has enabled the government to engage in widespread surveillance, often without a clear legal framework or judicial oversight.
To restore these lost liberties, it is essential to:
– Implement robust privacy protections and safeguards for surveillance technologies.
– Establish clear legal frameworks and judicial oversight for government surveillance.
– Increase transparency and accountability for government surveillance activities.
– Enact reforms to protect journalists’ sources and whistleblowers.
– Promote online anonymity and encryption to protect individuals’ free speech and association rights.
– Increase transparency and accountability for the use, storage, tranfer and monetary sale/profit in public PII Data, in the US territories and Mainland. Forbid the transfers of the publics PII Data outside of the US governments control.
Only by addressing these issues can we ensure that the Bill of Rights is upheld in the digital age and that individuals’ fundamental liberties are protected from the encroachment of surveillance technology.
9o5
EMFs Linked to Cancer, Autoimmunity, Immune Dysfunction
A meta-analysis of 42 studies found an association between ELF-EMFs and cancer risk, particularly in the United States and residential exposed populations.
https://drleonardcoldwell.com/2024/05/28/emfs-linked-to-cancer-autoimmunity-immune-dysfunction/
9o5
Alex, I ran across this-
Instagram AI bots are software programs designed to automate tasks on the Instagram platform, leveraging artificial intelligence (AI) and machine learning (ML) algorithms.
Types of Instagram AI Bots
1. Growthbeast: A browser extension that automates following, liking, commenting, and unfollowing, with advanced filters and customization options.
2. Axiom: A no-code bot builder that allows users to create custom bots for automating Instagram actions, including posting, liking, commenting, and more.
3. Instagram Bots: General-purpose bots that can be customized for various tasks, such as mass following, mass liking, and mass commenting.
Concerns
Bots may violate Instagram’s policies of their own Instagram’s Terms of Service leading to account suspension or termination.
Fake accounts and spam.
Misinformation and propaganda.
Aggressive or intrusive bot behavior can negatively impact user experience and engagement, which can harm the platform’s integrity.
A study estimates that up to 95 million bot accounts may be active on the platform, highlighting the need for improved detection and mitigation strategies.
9o5
In an Executive Summary, 35 news organizations in the United States, the United Kingdom, and Germany.
36 international experts from industry, academia, technology, and policy.
This report – How AI Retools, Rationalizes, and Reshapes Journalism and the Public Arena. Examines the use of AI across editorial, commercial, and technological domains with an eye to the structural implications of AI in news organizations for the public arena.
There is much debate about how artificial intelligence should be defined and what should and should not count as true AI. While it is beyond the scope of this report to explore this debate in detail, it cannot be ignored. It is fair to say there is no consensus about what constitutes AI, nor is there a generally accepted definition of AI.
There is, however, agreement around what AI is not: namely, a conscious, general intelligence that understands and works across domains.
CREDIT
https://www.cjr.org/tow_center_reports/artificial-intelligence-in-the-news.php
***- – – – – ***
THURSDAY SEPT 12TH / one-hour TV show. ABC Television has an AI special with Oprah Winfrey.
CREDIT
https://m.slashdot.org/story/432692
Soon after the announcement, some AI critics began questioning the guest list and the framing of the show in general.
https://arstechnica.com/information-technology/2024/09/oprahs-upcoming-ai-television-special-sparks-outrage-among-tech-critics/
Critics of generative AI … question the utility of the technology, its perceived environmental impact, and what they see as blatant copyright infringement.
“Sure is nice of Oprah to host this extended sales pitch for the generative AI industry at a moment when its fortunes are flagging and the AI bubble is threatening to burst,” tweeted author Brian Merchant, who frequently criticizes generative AI technology in op-eds, social media, and through his “Blood in the Machine” AI newsletter. “The way the experts who are not experts are presented as such what a train wreck,” replied artist Karla Ortiz, who is a plaintiff in a lawsuit against several AI companies. “There’s still PLENTY of time to get actual experts and have a better discussion on this because yikes.” On Friday, Ortiz created a lengthy viral thread on X that detailed her potential issues with the program, writing, “This event will be the first time many people will get info on Generative AI. However it is shaping up to be a misinformed marketing event starring vested interests (some who are under a litany of lawsuits) who ignore the harms GenAi inflicts on communities NOW.”
BITR
Is this new for Websites or is it I just noticed it.
Vulnerability Disclosure Policy
Where I’ve seen it, is a product site, so a first for me.
[https://sharkninja.com/vulnerability-disclosure-policy/]
Alex, have you seen anything along direction this yet?
9o5
1) Around 1969, the U.S. Defense Department’s Advanced Research Projects Agency (ARPA) funded the development of ARPANET, the precursor to the modern internet.
2) By the 1970s, it brought on developments of the Transmission Control Protocol (TCP) and Internet Protocol (IP).
3) 1989 introduced the World Wide Web (WWW), a system of interlinked hypertext documents accessible via the internet.
4) Early in the 1990s the internet became available to the general public, and saw the first secure online transaction taking place in 1994.
5) The Internet has transformed life, and with the rise given to social media platforms, online communities, and e-commerce. Makes the world go round 24/7/365/360.
So by the initial plan as history has recorded it, dating back to the 1950s, when the United States government initiated a project to create a network of computers for communication and information sharing. This effort was driven by official’s concerned about the Cold War and the present potential for surprise attacks.
The U.S. Defense Department’s task given for the United States government failed at my above counts 1-5 for today’s digital world. Which is fluctuating with new technology faster than old challenges are solved.
Are we as a nation ready for Artificial intelligence, with its AI-centric tech overhead?
9o5
@Mike, I’ve always liked what you bring to the comments. I have a question, are AI smartphones our Titanic with GenAI as the iceberg?
It’s the leading design of ‘chips’ and ‘engines’ with neural processing capabilities and on-board machine learning being the pinnacle of connectivity and luxury for online users.
Since the use of an AI Phone term hit, it’s not understood what the heck the leading phone manufacturers meant by that term and how we got here. Is it to be expected than an AI Phone will give us a global resource where AI is on the same world page. That policymakers, regulators, academics, and the private sector with civil society handles the challenges posed by Artificial Intelligence?
And not like the obtuse differences contributed to the varying levels of security, speed, and functionality among VPN services of that history.
Mike
@9o5 if you’re referring to me, I do not like the usage of AI on any electronic devices and if I decide to upgrade my smartphone, I am going to see if there is one without AI on it or if the new phone I get that has AI enables me to opt-out.
AI is a useful tool to use for many things, but to be an “assistant” in this regard is not one of them.
9o5
Yez you, Mike because you supply links to support your words.
Smartphones were to help humans not hurt us. I guess you could blame it on the technology.
Happening before any set regulations, so the fuze has been lit. The bang that’s to come we have looked for – GenAI is possibly that bang.
It’s worth remembering that most Smartphones have been tapping into AI-centric tech and features for years, but, that use of AI in smartphones has mostly been as supportive. 2023 marked a move towards generative AI. So it’s now that this smart tech actually is serving up content and more actively aiding phone users. As it can generate images and itineraries for them or drafting responses to emails.
https://www.techradar.com/phones/2024-will-be-the-year-of-the-ai-phone-whether-we-like-it-or-not
Mike, me to, I do not like the usage of AI on any electronic device. Flip phones with their limited connectivity, lack of apps, no GPS, simplified design, and basic encryption make them a more private option compared to smartphones. So I will downgrade in my next phone to less convenience for more personal privacy.
9o5
Mike here’s a 02/24 discussion on the topic, note OP #1 of the point made in AI subcriptions to pay for these AI server farms by the smartphones brands. To pay to use their features of the phones with AI-centric tech thats embeded within it.
https://xdaforums.com/t/samsung-forced-phone-subscription-fee-the-future.4654151/
I’ll bet, the local area electrical grids where these server farms are located. Will cause the areas residents to see hugh electric bill price increases.
Mike
Unfortunately, two open source, privacy-oriented mobile keyboard apps, FlorisBoard and OpenBoard, have been discontinued. However, Fossify’s keyboard and a fork of OpenBoard, Heliboard, are available to take their place. AnySoft Keyboard has not been updated in two years so it might be safe to assume that is discontinued despite a lack of notice. One other option that looks promising is FUTO Keyboard.
Both apps are available on F-Droid and GitHub.
HeliBoard – https://github.com/Helium314/HeliBoard
Fossify – https://github.com/FossifyOrg/Keyboard
FUTO Keyboard – https://github.com/futo-org/android-keyboard
Fossify – https://github.com/FossifyOrg/Keyboard
Mike
I’ve just found out that Simple Mobile Tools (a suite of open source apps that can replace most of Android’s core applications) is no more. The head of the effort, Tibor Kaputa, sold his product to ZipApps that will, likely, add new features such as advertisements, subscriptions and probably convert the apps to proprietary.
Thankfully, a developer with SMT has forked the apps before the purchase was finalized and has started a new project called Fossify. Most of the original SMT apps, save a calculator, are available on Google’s Play Store, F-Droid, or Fossify’s GitHub (links below).
I must admit to being annoyed since I emailed Kaputa not too long ago, letting him know I was a customer and one would think he would at least email people he has interacted with (like me) letting them know. Plus, Simple Mobile Tools’ website is still up and there’s nothing on it to indicate the suite of applications has been sold or discontinued.
GitHub – https://github.com/FossifyOrg
F-Droid – https://search.f-droid.org/?q=fossify&lang=en
Google Play Store – https://play.google.com/store/apps/dev?id=7297838378654322558