I have degoogled my phone few years ago it really hit me how much the phones depend on Google services. Few examples from of my daily usage when I compromised:
- Communication
I’m in students group, people there have own group chat on facebook messenger. They share info regarding tests, deadlines etc. Basically standard uni messaging. Unless I had fake Facebook account to be there I would have to collect all info by myself. The alternative is a discord server, which in privacy terms is questionable choice too.
At least I have few friends who use Signal or Element, but it’s minority.
What do you usually use and offer when people ask you for contact?
- Banking app
Banking app I used has blocked me from app after few years of using it when they realized I have it from “unofficial” source - Aurora store. That motivated to switch the bank and app, which doesn’t really on Google Play services. The easiest way to do that was browsing Huawei app store and finding the most suitable app. Do you use baking apps?
- Taxi/Transport
Of course theres no way to use Bolt/Uber for transport on degoogled device. What’s your way of transport after having few beers in pub? Do you use taxi via calling it directly or use that weird Telegram taxi addon?
- Map directions
Is there a way to convert google map pins to open source solutions and vice versa? What’s your recommended software for directions? What do you use for driving?
- Fitness
Do you track fitness activities?
- Phone
Do you have good phone recommendations? I know that GrapheneOS+Pixel is one, but what about others?
I think it’s a lot to do with developing a threat model that works for you, and understanding that, unless you’re trying to be Jason Bourne, there’s always going to be SOME compromise - the level of compromise again, depends on you.
A couple years ago when I started down this rabbit hole, I was doing EVERYTHING that I read on every privacy blog: I started using GrapheneOS, completely degoogled my phone, didn’t use any non-FOSS apps, no location apps, the whole 9 yards.
I soon came to realize I had to find a compromise. I now follow a threat model that best works for me… Naturally there are weaknesses in it, but it’s things I’m willing to risk.
A few extras:
That’s just my little process… I know some of these aren’t directly related to common phone usage but it’s how I use my phone daily, so hopefully some of it is interesting to you.