New cars are way safer than the ones from the 1980s, though. In just a risk-minimization strategy I prefer a new car with Alexa over a forty year old car without.
The privacy risk is low with the new one, but the death risk is high with the old one.
Rolled my car and I just crawled out of the wreck and walked away with a mild concussion.
Sorry, using the "risk = probability times damage" meaning here. It doesn't matter so much how much telemetry is sent until that leads to: a) compromising my privacy b) that breach leading to damage to me. I like to threat model things like this, rather than going on a binary scale of threatened/not-threatened and I think there is no threat model that leads to me needing to worry. Of course, if you have concrete information that I am in danger, I will pay you for it.
I rate that as astronomically unlikely, especially since my SSN is out there and I haven't been identity thefted yet despite making half a million a year and having more credit cards than I can keep track of.
I understand. I was just curious because telemetry is an automatic privacy intrusion. The only question is whether or not it exceeds your comfort level. In your case, it does not. That's fair.
Ah, right. I don't see an automated system seeing things about me as an intrusion until it has implications about me. For instance, I imagine if someone dev-nulled all telemetry but still had it running you'd consider it a privacy risk because your private data was exfiltrated but I wouldn't because no action was taken against me on private information.
> I imagine if someone dev-nulled all telemetry but still had it running you'd consider it a privacy risk because your private data was exfiltrated
Yes, this is my perspective. There are two aspects to privacy.
The first is data collection. When data is collected about me or my use of my machines, that is a privacy intrusion regardless of what is done with that data post-collection.
The second is what is done with the data post-collection. In my view, the impact of this is secondary -- how the data is handled post-collection will inform whether or not I'm willing to give consent for its collection in the first place.