this post was submitted on 25 Nov 2023
1 points (100.0% liked)

Entrepreneur

0 readers
1 users here now

Rules

Please feel free to provide evidence-based best practices, share a micro-victory, discuss strategy and concepts with a frame work, ask for feedback, and create professional conversation. Treat every post as if you're at work and representing the best version of yourself.

founded 1 year ago
MODERATORS
 

Which company's devices are you using if you are skeptical of your ideas/data being stolen or misused by the respective company? do you also worry that you may be secretively spied on? Which mobile device, laptop and cloud do you have for personal use? Is Apple ethically better?

you are viewing a single comment's thread
view the rest of the comments
[–] TheScriptTiger@alien.top 1 points 11 months ago (3 children)

Is Apple ethically better?

You're asking if the company that employed cheap Chinese child labor for years to build their products right up until mainstream media started making a deal out of it is ethical? The same company that you could not even buy a standard power cable for at a normal store, but had to go to a registered Apple reseller just to get a power cable? That's the "ethical" company you're referring to?

[–] redMatrixhere@alien.top 1 points 11 months ago (1 children)

curious to know which company's devices/services do you use?

[–] TheScriptTiger@alien.top 1 points 11 months ago

I prefer Android devices that were NOT manufactured in China. Chinese vendors will embed a lot of BS onto chips that you can't even get out of a rooted device. The reason why I favor Android is because it's much more conducive to the open-source ecosystem and you can readily get apps, like firewall apps and such, that will block all of the BS Google traffic. I am actually a developer, so I even do custom builds of open-source apps myself for mission-critical functions just to be extra cautious. But really, good network security is multi-factor/multi-layered. So, it's securing everything from your browser itself, your operating system, and then securing the network you're connected to, as well.

load more comments (1 replies)