Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

None of that is relevant to my point. You seem to be trying to catch people in some kind of gotcha instead of engaging honestly with the problem at hand. But alright, I’ll bite.

Yes, I always start with clean installs, both on iOS and on macOS. Sometimes I even restart fresh on the same device, as I make sure my hardware lasts. I don’t sync bookmarks, I keep them in Pinboard and none of them has any private or remotely identifiable information anyway. I don’t care about saving browser history either, in fact I have it set to periodically auto-clear, which is a feature in Safari.



No I am trying to say with a connected device using online services, the service provider is going to have access to your data that you use to interact with them.

To a first approximation, everyone in 2024 expects their data and settings to be transferred across devices.

People aren’t working as if it is 2010 when you had to backup and restore devices via iTunes. If I’m out of town somewhere and my phone gets lost, damaged or stolen, I can buy another iPhone, log into my account and everything gets restored as it was.

Just as I expect my watch progress to work when I use Netflix between my phone, iPad, Roku devices etc.


And that should rightfully be your informed choice. Just like everyone else should have the right to know what data their devices are sending before it happens and be given the informed choice to refuse. People shouldn’t have to learn that from a random blog post shared on a random website.


In what world is Netflix for instance not going to know your watch history?

How many people are going to say in 2024 that they don’t want continuous cloud backup? You want Windows Vista style pop ups and permissions?


How many times are you going to shift the goalposts? This is getting tiresome, so I’ll make it my last reply.

I don’t have Netflix but neither is that relevant to the point, you’re obviously and embarrassingly grasping at straws.

No one is arguing against continuous cloud backups, they’re arguing about sending data without consent. Which, by the way, is something Apple used to understand not to do.

https://www.youtube.com/watch?v=39iKLwlUqBo

Apple’s OS are already filled with Windows Vista style popups and permissions for inconsequential crap, people have been making fun of them for that for years.


If you are doing continuous cloud backups and using Apple services - you are already giving Apple your data and your solution is to add even more permissions? You are not going to both use any Apple service that requires an online component and keep Apple from having your data.

Isn’t it bad enough that I have a popup every time I copy and paste between apps?


> Isn’t it bad enough that I have a popup every time I copy and paste between apps?

For me, not really no. It reminds me I am copying information and not from some phishing app, I find it informative.

And I'm probably one of the few who actually click "Reject" to the cookie pop ups having to click no on 3742 legitimate consents.

The simple answer is everything should be opt-out. I'll opt-in if I require it because frankly, regardless to how Fort-Knox my data is $CORP still cannot be trusted.


If that’s the case, you aren’t using email either or messaging?


Strictly Signal via self-hosted VPN for messages. My email web client provided by my email server (Zimbra) which are hosted on colocated servers. 3cx for calls via self-hosted PBX.

Video conferencing instead of FaceTime are made via self-hosted Jitsi and if I am to brag all running on FreeBSD.

Out of Apple or Google I trust neither however will align with Apple more than Google. It's as close as I can get from not having data collected from mongrels.


Netflix being unable to know your watch history on their service is exactly the goal of homomorphic encryption. The technology to make that work at that scale does not exist, however for smaller bits of data, eg phone numbers, that's entirely possible!

With PIR, an Apple phone recieving a phone call queries Apple's database with that phone number, but because it's using homomorphic encryption, Apple doesn't know the number that called despite looking it up in their database to provide caller id info, so they can't tie your phone number and the callers phone number together.

https://machinelearning.apple.com/research/homomorphic-encry...


As a general principle, I think computers should execute commands that users issue, and then wait for the next command. That's it.

Computers should not be sneakily doing things in the background without my commanding them to do so. But if they insist that the only way they can work is by doing things in the background, then I expect the computer to at the very least obtain my consent before doing those things. And computers should definitely not be exfiltrating anything over to the network without my explicit command to do so. This shit world we are living in where your computer just does whatever the application developer wants it to do rather than what the user wants it to do has to come to an end!




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: