I am greatly displeased at the smartphone industry. I think it’s time for a heavy handed crackdown about all the spying they’re doing. The smartphone industry and in particular the company qualcomm I find an intolerable company in their practice, I believe they should be smashed, their equiment liquidated and their intellectual property destroyed.

The smartphone industry is a festering cancer on general computing, a persistent and pernicious assault on human rights. An invasion of our private spaces. A colonization of our lives.

I think it is past the point of reform, not that there are any regulator with to intelligence figure out what is wrong let alone the wherewithal to do anything about.

For those reasons, I think global thermonuclear war is our only realistic option for setting back the clock on this travesty.

I am willing to hear your alternative, I don’t believe anything short of that has a snowball’s chance in hell to change anything about this.

    • CallMeAnAI@lemmy.world
      link
      fedilink
      English
      arrow-up
      1
      ·
      19 hours ago

      A long list without context is entirely unhelpful. The permissions need to be enabled and are likely to have features associated with them.

      So your correct privacy shouldn’t be optional. So which of these apps have features turned on that don’t require a user accepting them or wanting the feature?

      Frankly, almost all of these permissions are initiated my a user at first sight making some assumptions.

      • Onno (VK6FLAB)@lemmy.radio
        link
        fedilink
        English
        arrow-up
        1
        ·
        19 hours ago

        The long list is the permissions as the Google Play store presents it.

        Below each app column shows empty if that permission is not required, or shows the permission if it is.

        I’m not sure how else you feel that this information should be presented.

        As far as vague goes, that’s my point. We grant permissions to launch an app with often little or no thought as to their interactions, like calender contacts and internet, or files and internet, or system permissions.