Without defending one or the other, as long as you have proprietary closed software running on the device itself or on the backend of the services it syncs with, all you can have is assumptions and reasonable doubt about how the data is used. We’re trading convenience for someone knowing something about us.
Without defending one or the other, as long as you have proprietary closed software running on the device itself or on the backend of the services it syncs with, all you can have is assumptions and reasonable doubt about how the data is used. We’re trading convenience for someone knowing something about us.