• Avid Amoeba@lemmy.ca
    link
    fedilink
    English
    arrow-up
    3
    ·
    4 months ago

    Totally valid take given a threat model where you have zero trust in Google. It also implies there should be no system components from Google on the device though since they have root and they can exfiltrate data accidentally too.