• wincing_nucleus073@lemm.ee
    link
    fedilink
    arrow-up
    6
    ·
    1 year ago

    I’ve thought about this for a long time. Nice to see it getting attention.

    this is why I don’t really appreciate Graphene’s sandboxed google play services as much as I appreciate MicroG. MicroG allows you to control which GPS-compatible apps get registered to your random ID on google’s servers.

    It’s also worth studying your individual apps and how exactly they handle google push notifications. I know that there are various configurations, some which allow Google to see the content of the notification and some which done. of course, regardless of that, metadata such as who it gets delivered to and when, is still there.

    • TheAnonymouseJoker@lemmy.ml
      link
      fedilink
      arrow-up
      8
      arrow-down
      5
      ·
      1 year ago

      …after many years, when Google confirmed it long ago. Apple once again tells us they are a fake bastion of privacy.

  • miss_brainfart@lemmy.ml
    link
    fedilink
    arrow-up
    5
    ·
    1 year ago

    What users often do not realize is that almost all such notifications travel over Google and Apple’s servers.

    So on the Android side, is an app safe from this if it doesn’t rely on Firebase Cloud Messaging?

    • TheAnonymouseJoker@lemmy.ml
      link
      fedilink
      arrow-up
      8
      arrow-down
      5
      ·
      edit-2
      1 year ago

      Yes.

      Consider blocking Firebase domains in HOSTS file, which you can do in NetGuard or Invizible Pro, which you can supply your HOSTS file.

      Not sure if Hagezi or such community made HOSTS rulesets carry Firebase domains in their anti-Google/BigTech part of domains.

      There are no client side tools on Apple to accomplish this, unlike on any Android, no matter $50 or $5000.

        • TheAnonymouseJoker@lemmy.ml
          link
          fedilink
          arrow-up
          8
          arrow-down
          5
          ·
          1 year ago

          These are in progressing order of complexity.

          • Exodus database shows the “bad” domains an app connects to.
          • Warden on F-Droid does a similar but more comprehensive job for any installed app packages.
          • App Manager shows activities, services, receivers and providers apps utilise or have in a comprehensive manner.
  • edric@lemm.ee
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    Is it right that Apple is putting the responsibility of preventing it on app developers?