>>998174 (OP)
Even Lineage OS and the final attempts of Cyanogenmod were compromised you could see Mountain View CA IP addresses on the kernel level if you use network logging.
Despite the OS itself getting rid of Google apps is a good thing, the kernel itself is still compromised and most of these ports are just "reuse the compromised phoning kernel + compile everything else using the same build tree but this time we built them disabling all off required google frameworks like device erase" which is still compromised on my textbook.
While very few phones have open sourced their kernels (like nexus 5/7), most 'privacy' Android OS still reuse the tainted kernel and claim itself good (lineageos) despite having google kernel not to mention it also contains the manufacturer's very own botnet. Some Android phones that have the kernel unlocked including the bootloader have alternatives like ubuntu or kde plasma. That's the only way out if you're gonna ask me but you're bound to have zero apps or even a working baseband.
>on apps
These are extremely harmful. If you can access the hidden components you'll almost see them
>create unique identifier
>grab your phone's user agent
>grab all your device's ID like MAC/BT/IMEI/IMSI and more
>make certain log file somewhere with read permissions open to any apps that know where to look
>create its own database
>create strings of unintelligible text which is actually your transcoded device IDs
You could spoof most of these info with Xprivacy for kitkat which is free but paid app on more recent android versions. Or just get a virtual machine/android x86 going.
System apps have full control and can create permissions which aren't even stated in the manifest so these are much more dangerous. This is where the botnet meme comes from. They can literally activate your sound recorder out of nowhere or connect to a wifi network on its own to phone whatever it covertly recorded during the day and you have no say since you "agreed with terms and conditions and privacy policy" when you first opened your phone. Honestly you won't even stand a chance on any court.
>But i want to know can google know what is going on when we use third party apps such as firefox browser?
Root permission google apps let them do anything. Root account is simply the owner of the system and goyims have no access to it. *snap* I'd bet it already took a photo of you on the front cam.
I'm also surprised as to how android managed to hide those long as fuck permission list of facebook app. You'll see "No special permissions required" when installing the app but it can access your contacts and almost anything even the camera or video chat. Somewhat new and surprised me. Might there be some kind of "certificate signing" on new android versions to jew people out?
Since if you install the same app on a Android Jellybean you'll see the fucklong permissions that it asks for.