Threat profile: privacy conscious
You want to move away from Google and Big Tech. Not because you have something to hide, but because your data belongs to you. How do you start de-Googling without throwing everything overboard?
Threat profile: privacy conscious
You’re not an activist. You haven’t done anything illegal. But you’re done with Google tracking every search, every click, every location and every YouTube video. You want control over your own data — not because you have to, but because it’s the logical choice.
This profile is for anyone who consciously chooses to become less dependent on Google, Meta and other data-hungry tech companies.
What are your real threats?
Mass data profiling by Big Tech Google and Meta build a detailed profile of your habits, political preferences, health interests, relationships and finances over years. This profile is sold to advertisers, shared with governments on legal requests, and can be leaked in a data breach.
App tracking and unnecessary permissions Most free apps make their money from your data. They request access to location, contacts and camera — and share that information with dozens of ad networks.
Google Play Services as a central data pipe On a standard Android device, Google Play Services runs in the background with full system access. It tracks your location, reads app activity and syncs everything to Google servers — even when you haven’t consciously set this up.
Lock-in via free services Gmail, Google Drive, Google Photos — they’re convenient but create dependency. Your data is locked in a system you don’t control.
What you DON’T need to do
At this threat level you don’t need Tor, Tails or Qubes. You’re not the target of directed surveillance. The threats are mass and commercial — well contained with the right tools and habits.
Approach: de-Googling in layers
You don’t have to do everything at once. Start with the layer that gives the most benefit.
Layer 1: Browser and search (15 minutes)
- Search: DuckDuckGo, Startpage or Brave Search
- Browser: Firefox (with uBlock Origin) or Brave
- Result: no more search profile at Google
Layer 2: Communication
- Signal as your primary messenger (including groups)
- ProtonMail or Tutanota for email — or your own domain via Migadu
- Result: messages and email outside Google/Meta
Layer 3: Maps and cloud
- Maps: Organic Maps (offline, OpenStreetMap) or OsmAnd
- Cloud: Proton Drive, Nextcloud, or local storage
- Result: location history and files no longer at Google
Layer 4: Phone (the big step)
- GrapheneOS on a Pixel device
- Sandboxed Google Play if you still need Google apps — isolated without system access
- F-Droid for open-source alternatives
- Result: Google Play Services no longer runs as root on your phone
Behaviour checklist
Do now
- Install Firefox + uBlock Origin
- Switch search engine to DuckDuckGo or Startpage
- Install Signal and use it as your primary messenger
- Check app permissions on your phone — revoke unnecessary location/contacts/microphone access
This week
- Create a ProtonMail account — start registering new accounts with it
- Install Organic Maps or OsmAnd as a Google Maps alternative
- Delete apps you don’t actively use
Bigger step
- Look into GrapheneOS — see the GrapheneOS guides
- Identify which Google services you actually need and whether alternatives exist
Tools
| Google service | Alternative | Cost |
|---|---|---|
| Google Search | DuckDuckGo / Startpage | Free |
| Chrome | Firefox + uBlock Origin | Free |
| Gmail | ProtonMail / Tutanota | Free (basic) |
| Google Maps | Organic Maps / OsmAnd | Free |
| Google Drive | Proton Drive / Nextcloud | Free / self-host |
| Signal | Free | |
| Google Play Store | F-Droid (open source apps) | Free |
| Android | GrapheneOS | Free (hardware needed) |
Hardware at this level
You don’t need any special hardware to get started. If you want to install GrapheneOS:
- Pixel 9a or 9 — supported by GrapheneOS, available from Coolblue from €399
- See the GrapheneOS guides for the installation guide and which phone to pick
Next steps
- GrapheneOS guides — from picking a phone to fully configured
- App hardening guide — which apps to replace, which settings to change
- Security as habit — building privacy into daily use
- F-Droid: the open-source app store — alternatives to Google Play\n- All GrapheneOS guides — complete overview\n- Which network setup fits your threat profile? — VPN on router, DNS filtering
Reviews: