The carrier is probably the most important part of this. One can choose to use a dumbphone with limited system services, hell, an IOT board with a speaker and a microphone attached. It is comparatively easy to silence local software.
However, one can not stop the cell carrier from gathering e911 “required” telemetry (GPS geolocation and cell site location ranging data) except to keep the modem turned off. (If one believes “off” is off.)
There used to be telecom regulations around privacy way back when, but those days are apparently long behind.
Good, but there’s more to it than that. I’d argue the carrier is actually the least important part of this
The carrier point is where they connect the persona to the person.
The Google/Apple account arguably does worse.
You can create a complete new Google account, using a burner phone paid in cash.
However, the PHONE is what is tracked, all the time, on the network.
You’re not wrong, just saying there’s a lot of data being stolen from most every device that most people use, regardless of carrier.
The carrier is probably the most important part of this. One can choose to use a dumbphone with limited system services, hell, an IOT board with a speaker and a microphone attached. It is comparatively easy to silence local software.
However, one can not stop the cell carrier from gathering e911 “required” telemetry (GPS geolocation and cell site location ranging data) except to keep the modem turned off. (If one believes “off” is off.)
There used to be telecom regulations around privacy way back when, but those days are apparently long behind.