By data I mean anything / everything: telemetry, contents in emails and files, and other user data. My school uses Google Workspace and I don’t like the idea of having to depend on it but I can’t change that. Give me tips and advice.
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
[Matrix/Element]Dead
much thanks to @gary_host_laptop for the logo design :)
If you’ve never worked before, this can be considered practice runs for the when you do.
Like one of the other commentors said, assume everything is accessible by Google and/or your university (and later, your boss, company, organization, …).
And not just you, but the people who interact with you through it. So that means you may be able to put up defenses, but if they don’t (and they most likely do not), the data that you interact with them would likely be accessible as well.
So here are some potential suggestions to minimize private-data access by Google/university while still being able to work with others (adjust things depending on your threat model of course):
They control it, not us. It’s anti-libre software. It fails to include a libre software license text file, like AGPL. So, what do you think?
Don’t use it. Let them give you a seperate device.
Tell them you’re GNUist, armish, mennonite. Tell them you don’t believe in using electricity, whatever. File formal complaints.
But you may get more privacy elsewhere, like getting your friends on Signal/SimpleX.
Yeah. the can read it unless you encrypt it and own the keys
https://rclone.org/drive/
https://rclone.org/crypt/
No way to protect emails, google chats, or many other things AFAIK. Yeah, I hate it too.
If you’re the only one that needs access to the data, you can PGP encrypt it yourself. If you need shared access, there’s no way to protect the contents. Telemetry mitigation is standard.
Unless you are in control of the encryption keys (E2EE), assume that everything stored there can be read and accessing by Google.