Do you have to use EVERY recommended tool on the list? Is just using one of them pointless?

My best example of this is probably Proton Mail and Drive. I use both of these. But they sync to a computer that is running Windows 11. Is all the data in Proton Drive still being acquired, used, and sold by Microsoft due to this? Would I have to fully remove all Apple or Microsoft devices entirely from my life and only use Linux?

No. They are just recommendations. Everyone’s needs / limitations / and threat models are different. Even if there is more that you want to change then you can change, any privacy improvement is still that, an improvement.

4 Likes

You should also always keep. in of your threat model and decide based on that. What you need and why and how will or rather should depend a lot on it.

There’s always nuance here depending on a few factors.

Simply put:

Dont use all recommendations at once, it is not necessary (they’re called recommendations for a reason), see above ^

1 Like

Yep - this is pretty much it.

Its a recommendation, not a bible. Theres also your personal use case, personal threat model etc etc. I say this not with bad faith towards pg, but in general; don’t be a sheep just following everything without practicing some sort of critical thinking, followed by self research and read.

3 Likes

Not at all. Think of the site more like a buffet where you’re presented with what we think are the best options for different software categories and you can pick and choose which ones you like or completely ignore what we say. Ideally we want to give you the tools to be able to make decisions about what software you use via threat modeling etc. We show what criteria we use to decide what we think are the best options so you can get an idea of how we decide what to list, but you can completely ignore it if you have a different set of criteria in mind. At the end of the day we don’t know your situation or what you’re looking for, only you can really decide what’s best for you.

1 Like