Hi,

I am (very, very early) in the process of degoogling. I am definitely not a high risk as far as needing to be completely locked down. It’s more about trying to have a little more control over how my data is used.

I am looking at Graphene OS, but I am a little confused how certain apps (that rely on Google services) work. I have a Pixel 8 and will have it for the foreseeable future.

The apps I currently use that I would still need (or their equivalents) are:

  • Clash Royale (Supercell)
  • Notion (Notion Labs)
  • Clickup (Mango Technologies)
  • Business Calendar 2 (Appgenix)
  1. If I installed these exact apps “sandboxed”, what exactly does that mean from a user standpoint? Will I have to use a separate account, reboot my phone, etc, or is it a quick process to use the app?

  2. Is there a list of apps that I could browse to find equivalents to the above? Recommendations here are also ok.

  3. I saw that Firefox isn’t exactly private(?) and that Vanadium is better in that aspect but I don’t understand why. Can someone ELI5, and help me see if this is a relevant concern for me?

Thank you! 😁

      • scratchandgame
        link
        fedilink
        Tiếng Việt
        arrow-up
        1
        arrow-down
        1
        ·
        9 months ago

        Chromium is inadequate and bad.

        For a anonymous browser, but not for a secure browser. The paper is purely about privacy and anonymity. No security (sandboxing, mitigations) here.

          • scratchandgame
            link
            fedilink
            Tiếng Việt
            arrow-up
            1
            arrow-down
            1
            ·
            9 months ago

            Chromium sandboxing means nothing when it leaks so much data.

            The attacker can’t gain access to the host with javascript.

            A browser that support javascript but doesn’t have sandboxing might not leak these data but when their are bug in their js implementation, the attacker can gain more access to the host.

              • scratchandgame
                link
                fedilink
                Tiếng Việt
                arrow-up
                1
                ·
                9 months ago

                It can also be used to extract metadata, which is used to attack someone in other ways or through other software or OS.

                Threat model. Regular user aren’t attacked this way?