How google spies on you: 1) Saving all your Google searches, tied to your identity across devices [1] [2] [30] 2) Reading all your emails. Even if you don’t use Gmail directly, but you’re sending email to someone who does. [5] [6] 3) Saving all your web traffic if the website uses Google Ads, Captchas, or Analytics (and over 85% of all websites use some of their services). Even if you aren’t signed in to a Google account, and you’re using a VPN, they can still use past cookies and browser fingerprinting to identify you. [35] [1] [25] [26] Google’s reCaptcha fingerprinting includes mouse movements, response time, timezone, screen dimensions, IP address, and any cookies. ReCAPTCHA uses the google.com domain instead of one specific to ReCAPTCHA, which allows Google to receive any cookies you have directly, instead of the website you’re visiting. [35] This concentrates the vast majority of all traffic data in the hands of a single company, which can then be used to de-anonymize users. 4) Everything you do in Google’s Chrome Browser is recorded, including even how long you are idle on a page. [7] [8] 5) Tracking and Saving your physical location, via Android’s GPS and Wifi triangulation. [12] [13] Even if you turn location features off or set the phone to airplane mode, it still saves your location via Wifi triangulation, which is the process of pinging nearby Wifi hotspots to identify where you are. [9] [10] [11] Wifi triangulation can figure out your real location, even if you have a fake IP address from a VPN. [14] As intelligence expert and ex-law enforcement Michael Bazzell says, Google is one of the first places law enforcement goes to for information because Androids track everyone’s location so accurately. Bazzell points out that even if you’re not directly involved in something, just owning an Android that was near it, can get you involved in answering police questions. Bazzell’s experience serving in law enforcement and intelligence motivated him to completely cut Google out of his life even though he’s doing “nothing wrong”. [11] 6) Keeping track of who you know to identify new phones or email accounts as you. Rob Braxman Privacy expert and phone operating system designer Rob Braxman points out that, by synching everyone’s phones’ contact lists and who they are physically standing near, Google (and therefore governments) can identify unknown devices or email accounts as you. [30] [31] [32a] Braxman further points to publicly available websites made by Google’s Jigsaw division and their partner Moonshot CVE, which openly sells services to governments to track and manipulate search results for targeted users. These users targeted by Jigsaw & Moonshot CVE’s government clients have their search history, location, and identifying fingerprint stored in a database. [32b] 7) Recording and saving audio of your private conversations [16] [17] [18] Google’s Android has the microphone constantly recording and saving your intimate personal conversations against your wishes for their profit and power. As an extensive academic study of tech patents by Consumer Watch Dog points out, Google will claim this is only to find out if you said the words “Google Assistant,” but yet they have publicly filed patents to scan audio conversations and any available visuals on a variety of home smart devices to identify who is speaking, what you’re interested in, and what you’re doing for the purpose of targeted advertising. [15] Tracking what you say, what you like, when you sleep, and even when you go the bathroom, goes well beyond Google Assistant helping you do a quick search and would instead be considered an all-inclusive surveillance. [15] In addition, they’ll allow 3rd party apps to record you without your knowledge because of poor permissions control. As University of California Santa Barbara cybersecurity researchers presented at a BlackHat European conference, 3rd party apps like Silverpush can play high frequency audio, which is invisible to the human ear, on another device like a television ad or mall kiosk. Then your phone’s mic picks up the frequency, to rat out your real identity or location. [34] Silverpush’s advertising system is embedded into many “free” apps on the Google Play Store. These doctoral researchers warned of the dangers this presents by being connected to wide-spread platforms like Google Ads. To demonstrate this, they played video of their lab experiment, which de-anonymatized a laptop through Tor Browser, because of an Android’s mic next to the laptop’s speakers, which was signed in to a Google account. [34] Is the Data Sold? Google has marketing propaganda which claims that they are merely selling advertising space on your devices and not selling the data itself. However, this claim is misleading in a number of ways. First, not only is advertising sold by demographics or interests, but in addition, Google also allows its advertising customers to target users by name, email, or device ID and reach them almost anywhere. [1] So advertisers can target you specifically and then serve you anything on your specific device by name. Second, while it’s true that Google technically doesn’t sell your actual name to the advertiser, when your device interacts with an ad, the third party advertiser can easily use your IP address, cross-site cookies, and/or browser fingerprinting to identify you. For example, suppose an advertiser runs an ad for an ebook on how to get out of debt. The advertiser could collect the IP addresses of anyone who clicks it, and so they’d know whose indebted. “I think the big problem is that we give much more data to Google than it needs,” said Guillaume Chaslot, former Google engineer who worked on YouTube’s recommendations algorithm. [4a] Chaslot’s first-hand experience with Google’s spyware and manipulation inspired him to create the non-group AlgoTransparency.org, which openly says in it’s manifesto, “algorithms don’t have your best interests at mind”. [4b] Play Store and Chrome Extensions Leak Data Third, the Google Play Store and their Chrome Browser Extension Store leak application and user data directly to the app’s developers. This is sensitive private information, and these third party app developers are NOT carefully vetted, as almost anyone can put an app in the Google Play or Chrome Extension Store with minimal screening. Examples: [21] [23] [24] Mental Outlaw “Mental Outlaw” is a cybersecurity Youtube video influencer who is constantly having his videos about torrents flagged by Google as “dangerous content”. He points out how ridiculous this is because Google does so little to stop real dangerous content. One of the numerous examples he’s given is the Chrome webstore featuring extensions that are malicious hacking malware, which does URL injections to force online shoppers, without their knowledge, to use the malware creator’s affiliate links when they shop online. [22b] These 5 popular extensions got over 1.3 million downloads, which got the attention of McAfee Labs, the research department of the respected anti-virus company. From McAfee Labs’ articulate research, this is huge security risk because not only is your personal data, like name and location, sent to malicious actors, but the attacker can forward the URL to any site they want. So you might think you’re going BestBuy.com, but it’s really the attacker’s bullshit site to get your credit card info. [22b] Youtuber Mental Outlaw points out how ludicrous it is that not only did Google allow 1.3 million people to download these extensions, but they have featured status on the Google Chrome store. [22a] And not only does Mental Outlaw find similar malware in the Android Play Store, but Google has changed how apps disclose permissions to remove themselves of liability. Starting in mid-2022, Google has the app developers themselves disclose what permissions the app uses, so Google does not have to do any research. This is a conflict of interest, since app developers are self-reporting what information they get access to, and the end user may not properly be able to evaluate it. [19] [20a] Sell it via Cookies Google’s defense to these types of criticisms has always been that they don’t “sell your data” directly. But as laid out in research from the tech-savvy lawyers at the Electronic Frontier Foundation, Google allows advertisers to connect their cookies with Google’s in order to process data on the customer. This process is called “cookie matching” and essentially allows Google to sell the advertiser your information through a cookie. [1] In the European Union, if Google were caught selling this data directly, it would be illegal. [27] [28] [29] So instead Google finds sneaky work-arounds such as the cookie matching, which allows them to appease the regulators and make statements like “we don’t sell data, we just use the data.” [1] Conclusion The more influence that Google has in our society, the more difficult it becomes to avoid their fingerprinting. If every website has a Google Captcha and everyone you talk to demands you talk to them on Gmail, then Google has become the gatekeeper for overseeing all human behavior. They can use this power to influence who sees your messages and what information you are able to find. By using Gmail or Google Docs, you’re forcing and enabling Google to fingerprint your loved ones or friends. Even if you think you’re doing nothing illegal, you assume that Google will give you and those you care about an equal opportunity for your business to thrive. They can reduce Google’s search traffic to your website, or bounce your emails to potential employers or customers. They can buckle your business at the knees if they think it fits its agenda and by giving them so much information you’ve completely surrendered your freedom. Well what is their agenda? In our next article, we’ll discuss Google’s censorship ability to shape society and how affects you. The Sources for this article can be found here. Related Articles Big Tech Abuses Medical Privacy February 25, 2023 No Comments In the US, your medical records are protected by HIPAA but your internet medical browsing history on websites like WebMD is NOT. That is the Read More » Browser Fingerprints Lead to Price Discrimination February 25, 2023 No Comments Some people mistakenly believe they do not need to worry about online privacy because they have “nothing to hide.” In reality, your digital identity expressed Read More » Avoid this Monero Vulnerability February 25, 2023 No Comments We love Monero. It’s our favorite and number one recommended cryptocurrency. However, it does not offer completely perfect anonymity under all circumstances because there are Read More » How to Reduce Google’s Control Over You February 25, 2023 No Comments There’s a huge number of steps you can take to reduce Google’s power and influence over your business and personal life. You would get a Read More » Google Censors Freedom February 25, 2023 No Comments This article presents evidence that Google promotes an agenda of centralized control through systematic censorship on its search, email, video, app store, and ad platforms Read More » Session username: Simple / Signal #: +855 68 504 905 Web 3 on IPFS: SimplifiedPrivacy.x Tor Onion: privacypkybrxebcjicfhgwsb3coatqechwnc5xow4udxwa6jemylmyd.onion Nostr Public Key: @SimplifiedPrivacy.com XMPP@SimplifiedPrivacy.is / @Matrix:SimplifiedPrivacy.is

Replies (53)

I want to believe most of this, but they said that Google listens for the words "Google Assistant" on Google devices. That's not correct. Google doesn't listen for that hot phrase. It should be "Hey Google" or "Okay Google". I know it's minor, but what other minor details are also slightly incorrect. That could mean a lot.
Big tech corporations have silently created the framework for an Orwellian style thought police system of control. It is time to wake up and resist.
Some of the sources linked aren't exactly high quality. But a lot of the claims are things I've either seen elsewhere or noticed myself from digging into what Google gets up to. I don't need much encouraging to degoogle myself even more than I am already trying to.
Default avatar
deleted 2 years ago
Thank you, look forward to more!
Graphene OS and another OS I heard about (maybe was called AbovePhone, if I heard it correctly) was listening as I was driving and couldn’t do much rewinding. I heard discussed on @Jack Spirko podcast is a remedy. I’m familiar w Graphene, but not the one discussed on Spirko’s show. I think AbovePhone is a provisioned phone already whereas Graphene you throw onto Pixel, and only can be on Pixels, ironically.
n0>1's avatar
n0>1 2 years ago
Just do what we can. 👻
Tom's avatar
Tom 2 years ago
Great thread! @utxo the webmaster 🧑‍💻 please answer? What mobile OS do you use? And what are your thoughts on Apple vs Google? I want to switch from #iOS to #Android for #Nostr purposes, but I wonder if Apple is the lesser evil in terms of privacy? At least I currently split my data between Apple and Google. I’m also exploring #grapheneOS although it seems “limited” (maybe that’s a good thing I dunno).
Follow Rob Braxman on Youtube or Odysee and you'll find that building a privacy iPhone is impossible. Apple is no 'lesser evil'. https://www.youtube.com/channel/UCYVU6rModlGxvJbszCclGGw Personally, I'd opt for a phone that officially runs LineageOS and then install the MicroG variant for de-googling it. Then take it from there and only install privacy-friendly apps, e.g. open-source from the F-Droid store. Your path to more digtal freedom 💪🏼
Desktop: 1.) Use Mullvad Browser with no extensions and don't login to any service. 2.) Use FireFox with Multi Container Extension, ublock and sandbox your sessions with separate containers where a cookie is needed. (Otherwise use Mullvad Browser, see 1.) 3.) Use a VPN with a DNS that blocks all ad and tracking domains 4.) use Torbrowser when possible. All of the above +: 5.) Use a clean VM with no browsing history, snapshot it. After your're done, restore to clean the snapshot to wipe all browsing history. Or just use Tails OS or Whonix. On Mobile: de-google and use grapheneOS.
Thats why I can highly recommend GrapheneOS on mobile. Linux on Desktop and using open source where it is possible. AND remember - If it is free - than you are the product :-)
I tried a few decentralized emails. My email name is very long. No way I can give out my email address. Its suitable to copy and paste my address. Any solutions to this?
Tom's avatar
Tom 2 years ago
Cool, I now know about Rob Braxman. He has a lot of great content. I will have to see whether I can part with or replace certain apps… do any of you know if the Tesla app works on F-droid?
Find some friends who also want email. Rent a cheap VPS for $11 - 15 per month. Setup open source email software such as mail in a box, iredmail, or Luke smith. Split the monthly VPS cost among friends
Hmm. Interesting to hear. Well I’ll be doing Graphene on a pixel soon. Been on the Graphene tip since Sept of last year after about them. I’m into the #RightToRepair movement, and a DIYer. Heard about AbovePhone on dude’s show I listen to. Hard to imagine crappy customer service from a company w a mission like that but it could be.
Ah I see. No, I heard about it on The Survival Podcast with Jack Spirko & one of the co-founders.
Very nice you are diving into this! Yes, you have to make the effort to find replacement apps and let go of some. Beautiful exercise! And no, you won't find the Tesla app on F-Droid since it won't be open-sourced. But since you probably need it, you can still download the Tesla app apk file, install it manually and curate updates with the Aurora store that doesn't require a Google login.
Tom's avatar
Tom 2 years ago
I really appreciate the guidance! We should all support each other doing what we can to improve privacy. Although I’m an engineer I do seek a mobile solution that “just works” w/o me spending lots of time in a CLI. But I will investigate. If I didn’t have the Tesla it might be easier to go “all-in.” Meanwhile I’m waiting for my iPhone X to die—it may be awhile so I at least went through a “cleanse” yesterday and deleted a ton of #crapps (that’s “crap apps”😆), deleted a bunch of saved passwords, etc. it just feels good to lower my attack surface as well as removing dependency on big tech. #privacy #mobile
GrapheneOS has no Google services, so no Google tracking. But you still have to use good OpSec for best privacy & security.
the axiom's avatar
the axiom 2 years ago
No, what you did was to trick people onto reading thinking it was written by you.