I don't think a mega corp having full access to my phone while me not having that is very "secure". Sure it's pretty ok against third parties but in my threat model Google and Apple are also adversaries. Microsoft too by the way.
In my model my Linux pc is a lot more secure as there's no adversary having direct access and more control than me.
I don't think a mega corp having full access to my phone while me not having that is very "secure". Sure it's pretty ok against third parties but in my threat model Google and Apple are also adversaries. Microsoft too by the way.
In my model my Linux pc is a lot more secure as there's no adversary having direct access and more control than me.