Tldr: grapheneos
summary
No! THIS is a DeGoogled phone!
This video discusses how to achieve a fully de-Googled smartphone experience by replacing Google apps and services with privacy-focused alternatives. The presenter outlines privacy issues associated with Google, why one should deGoogle, and presents a step-by-step guide on alternatives for search engines, web browsing, email, and more, ensuring user privacy and independence from Google's ecosystem.
Key Points
Why deGoogle?
The video begins by outlining the significant privacy risks posed by Google, explaining that the company collects extensive data about users, potentially compromising their privacy and security. The host highlights that much of this data collection occurs even without direct engagement with Google services, emphasizing the overarching presence of Google's tracking across various websites and apps.
Alternatives to Google Services
The presenter introduces various alternatives to Google's most commonly used services. For search, DuckDuckGo, Quant, and Brave Search are suggested. For web browsing, alternatives like Brave, Firefox, and Tor are recommended to combat Google Chrome's dominance. For email, options such as ProtonMail and Tutanota are highlighted.
Secure Cloud and Storage Solutions
The video discusses transitioning away from Google Drive and Google Photos to more privacy-centric storage solutions like Proton Drive or self-hosted options like Nextcloud. The importance of using strong passwords and two-factor authentication is emphasized, along with the suggestion of Bitwarden for password management.
Transitioning from Gmail and Calendar
Viewers are guided on how to transition from Gmail to secure email services like ProtonMail, along with using alternatives for calendar applications, thus minimizing reliance on Google.
Moving Away from Google Play Store
The host discusses methods to obtain apps without using the Google Play Store, advocating for app stores like Acent and Optinum which do not require personal information for sign-up. The procedure for verifying app safety and legitimacy is explained, alongside alternative installation methods.