A field guide to the surveillance machine behind the search bar, and what to do about it.
Google logged nearly 24,000 interactions with a single user in one month — and that user wasn’t even on Gmail. Every search, route, video, edit, and app download became another row in Google’s databases. This isn’t a glitch. It’s the product working exactly as designed.
At its core, Google is not a tech company that happens to sell ads. It is an advertising company that builds technology to collect and monetize data. More than 70 percent of Google’s revenue comes from advertising. The phones, the browser, the email, the maps, the cloud storage — they all exist, ultimately, to feed that advertising machine.
The Fishbowl: One Profile to Rule Them All
Picture a row of fishbowls. Each Google service — Search, YouTube, Maps, Chrome, Docs, Gmail — is its own small bowl, collecting a slice of your behavior. Queries here, locations there, watch time over here. The longer the water sits, the darker and more revealing it gets.
Above all of them sits a much larger bowl, and that’s where Google is heading: a single, integrated system that pools every stream into the most personal surveillance tool the company has ever built. Not a set of products. One profile, rendered in extraordinary detail, designed to predict what you’ll do next.
Search: The Original Surveillance Engine
Google Search has been profiling you since the first time you typed a question and clicked a result. Every interaction — even hovering — refines a behavioral dossier used to decide what to show you and what to sell about you to advertisers.
Google calls this personalization. What it really means is: we are watching what you do so we can show you ads. By default, search history and related activity are logged and retained until you go in and change the settings yourself.
How to reduce exposure
- Stay signed out when you search.
- Use a VPN so your IP address is less directly tied to your identity.
- Better yet, use search engines that don’t build invasive profiles.
Chrome: Tracking You Even When You’re “Signed Out”
Chrome is the world’s most popular browser — used by roughly two out of three people online. It’s also one of Google’s most powerful data-collection tools.
Even when you’re signed out, Chrome sends what you type into the address bar to Google servers in real time, before you ever press Enter. The moment you sign into Gmail or YouTube, Chrome by default signs the browser itself into your Google account, fusing your browsing data with your identity.
And avoiding Chrome alone isn’t enough, because Google is woven into the fabric of the web itself.
Google Is the Web’s Infrastructure
Most people think of Google as a cluster of websites. In reality, it has become part of the internet’s plumbing.
More than half of all websites use Google Analytics, handing Google information about who visits, from where, with what device, and for how long. Millions more rely on Google’s reCAPTCHA to filter bots, which means Google is tracking you even on sites that carry no visible Google logo at all.
In practice, that makes Google extraordinarily difficult to avoid — even if you never type google.com and never open Chrome.
How to reduce exposure
- Disable “Allow Chrome sign-in,” “Improve search suggestions,” and “Make searches and browsing better.”
- Enable “Do Not Track” — with the caveat that most sites don’t honor it.
- Use non-Google browsers with stricter tracking protection wherever possible.
YouTube: Monetizing Your Attention Profile
YouTube became the dominant video platform in history because it relentlessly tracks and optimizes around what you do. It logs searches, watch time, pauses, and rewinds, then sorts you into ad-targetable categories — “dads in Florida over 30 who like baseball,” for example.
Google often insists it doesn’t sell your data. That’s a framing trick. It may not hand over the raw file, but it sells access to people who match advertiser-defined profiles, and keeps the data to itself precisely because exclusivity is what makes that data so valuable.
Yes, Google lets you dial back some collection. But its interfaces and defaults are engineered so most people never touch those controls — and so that, if you do, you feel the service get noticeably worse.
How to reduce exposure
- Watch YouTube signed out where you can, to blunt profile depth.
- Consider front-ends or alternative platforms that don’t tie every view back to a global profile.
Gmail: Where Ads Meet State Surveillance
Two backdoors run into your Google account. The first is government surveillance, and Gmail is its main gate.
Section 702 of FISA allows the U.S. government to surveil non-U.S. persons abroad. If you’re a U.S. citizen who has emailed someone overseas, your messages can be swept up “incidentally.” The target was never you. You just spoke to someone who was.
Layer on top: national security letters that let the FBI demand your name, addresses, and email metadata from Google with no judicial approval, plus administrative subpoenas for account metadata that are so legally fragile the government tends to back down whenever they’re challenged — but only a tiny fraction of people ever learn their data was requested in the first place.
Gmail also enables corporate surveillance. Google reserves the right to train its AI on your emails, and lets companies embed invisible tracking pixels that quietly phone home when and where you open a message.
How to reduce exposure
- Turn on “Ask before displaying external images” to block automatic pixel loads.
- Disable Smart Features in Gmail, Chat, Meet, and the rest of Workspace.
- Move sensitive conversations off services that mine inboxes for advertising or AI training.
Maps & Location: Tracking Even When You Turned It Off
In 2022, Google paid roughly $400 million to settle allegations that it kept tracking users after they switched off “Location History.” And Maps is only one input. Google can infer your location from Search, from Chrome, and from your IP address alone.
This location stream feeds the second great backdoor: the ad system itself. When Google auctions ad space, it sends “bid requests” to advertisers — packets that can include precise GPS coordinates and device identifiers. This can happen hundreds of times per day as you move through the world, turning your phone into a continuous beacon broadcast to ad exchanges and the data brokers who sit on top of them.
That is how richly detailed location profiles — like the ones later sold to agencies including ICE — get assembled. Not because Google handed your data to them directly, but because the ad infrastructure constantly broadcasts it into an ecosystem built for extraction.
How to reduce exposure
- In Google Maps, turn off Timeline (Location History).
- At the OS level, revoke location access for all Google apps, not just Maps.
- Be ruthless about which apps get location, and prefer ones that don’t share with ad exchanges.
Docs & Gemini: Feeding the AI
Google isn’t literally “stealing the words” from your Google Docs — but that is much too low a bar.
A small star icon at the top of every doc now invites you to connect that document to Gemini, Google’s AI assistant. Accept, and you risk piping everything you write into Gemini’s training pipeline.
Google is also marketing a new concept it calls personal intelligence — the idea that Gemini can range across everything Google already knows about you: emails, calendar, YouTube history, search queries. The headline message reassures users that Gemini isn’t training directly on your inbox or your real-time location. The fine print is darker.
On Google’s own support pages, once you connect apps to Gemini, your data will be used to “improve Google services, including training generative AI models for everyone.” Their models are trained on summaries, excerpts, generated media, and inferences derived from your data. Translation: the more you lean on personal intelligence, the more your personal life becomes fuel for global AI products.
Surveillance Capitalism 2.0: Ads + AI
Combine all of it — Search, Chrome, YouTube, Gmail, Maps, Docs — and infuse the whole thing with AI, and you get a new layer of surveillance capitalism. Google has built tools that make its surveillance immediately useful to you, so that you’ll consent to making your data useful to everyone else.
Google now gets paid for your data twice: once when it sells targeted ads built on your behavioral profile, and again when it sells AI models trained, at least in part, on your information.
Over time, your photos, your emails, your locations, and your documents could all shape how those models behave — with no meaningful opt-out for most users.
What You Can Actually Do
You will not be able to fully remove yourself from Google’s systems — its reach is infrastructural, not optional. But you can meaningfully reduce the data flowing in, and the ease with which it can be weaponized against you later.
Key actions
- Account hygiene. Turn off Location History/Timeline, enable auto-delete for activity where possible, and audit ad personalization settings.
- Browser choices. Avoid Chrome where you can. If you must use it, kill Chrome sign-in and the “improvement” features.
- Service diversification. Use alternative search engines, email providers, mapping tools, and video platforms that don’t depend on a surveillance-driven business model.
- AI caution. Think hard before you connect emails, docs, or photos to Gemini or any “personal intelligence” system.
Most of all, be honest with yourself about what Google already has, and about what you’re still willing to hand over. The core issue isn’t that Google is doing something anomalous. It’s that Google helped build the internet we all depend on, and wired that infrastructure to watch us.
Part II — The DeGoogle Migration Dashboard
A practical matrix for leaving Google’s ecosystem without burning everything down on day one.
A real DeGoogle plan compares more than privacy claims. It weighs data minimization, cryptographic protections, migration friction, and how much self-management each replacement actually demands. The matrix below is designed for people who want to step out of Google’s orbit in phases — not for people who want to spin up a home server this weekend.
Comparison Matrix
| Service Area | Privacy-First Options | Security & Data Stance | Migration Difficulty | Maintenance | Friction |
| Search | DuckDuckGo, SearXNG | DuckDuckGo blocks trackers; SearXNG anonymizes queries, strips cookies, and can route through Tor. Public SearXNG instances require trust in the operator. | Drop-in swap for DuckDuckGo; self-hosted SearXNG is harder. | Low | Low |
| Proton Mail, Tuta | Proton uses zero-access and end-to-end encryption, is open source and audited. Tuta encrypts mail and calendar; supports ICS and vCard import. Neither is ad-driven. | Proton offers Easy Switch to import Gmail, Calendar, Contacts. Tuta is workable but more manual. | Low to Medium | Medium | |
| Cloud Storage | Nextcloud, Filen | Nextcloud supports end-to-end encryption on selected folders, with the server unable to read protected files. Filen is positioned as zero-knowledge (verify current product details). | Managed Nextcloud is moderate; self-hosting is high effort. Filen is simpler as a hosted vendor. | Medium to High | Medium |
| Mobile OS | GrapheneOS | Hardened Android-based OS with strong security posture. Privacy depends heavily on configuration choices, especially Google Play compatibility decisions. | High — apps, backups, push, payments, and hardware compatibility all change. Easiest on supported Pixels. | Medium to High | High |
Friction score reflects realistic onboarding effort and ongoing care for a non-technical user. Low = drop-in swap. Medium = a weekend of setup and habit retraining. High = systemic lifestyle changes including app, payment, and notification rebuilds.
Best-Fit Patterns
Low-friction first phase. DuckDuckGo for search, Proton Mail for email, and a managed Nextcloud (or comparable hosted encrypted storage) get most households out of the deepest layers of Google exposure without forcing you to host anything yourself.
Sovereignty path. If you’re ready to manage updates, uptime, and trust, SearXNG plus self-hosted Nextcloud provide a stronger control model. Only walk this path if you actually want to be your own sysadmin.
Mobile last. GrapheneOS belongs in a second-phase migration. Mobile is where private-first computing collides hardest with banking apps, push notifications, proprietary services, and habit. Powerful — but the highest “digital pain point” risk in any DeGoogle plan.
Migration Checklist
- Inventory your Google dependencies. Gmail aliases, Google Sign-In logins, Drive folders, shared Docs, Calendar subscriptions, Maps saved places, Photos backups, Chrome bookmarks and passwords, and Android-only app dependencies.
- Replace search first. Set DuckDuckGo or a trusted SearXNG instance as your default. Live with it for a week before judging.
- Migrate email next. Stand up Proton or Tuta, import mail/contacts/calendars, then update logins and recovery addresses for critical accounts before touching low-risk services.
- Move storage in stages. Export Drive while preserving folder structure, convert Google-native formats where needed, and re-sync only current working folders. Cold-storage archives can wait.
- Rebuild mobile last. Verify GrapheneOS device support, back up essentials, identify must-have apps, test banking and authentication workflows, then migrate 2FA, messaging, maps, and media one category at a time.
Pain Points (Be Honest About These)
The recurring industry pain points in private-first computing are convenience loss, interoperability gaps, and support burden landing back on you. In practice: weaker search relevance on niche queries, more manual email/calendar migration, Google-format conversion headaches, and a real bump in effort around mobile notifications, app compatibility, and backup design.
DeGoogling does not have to be all-or-nothing. The smartest path is phased migration with a clear definition of which tradeoffs you’re willing to accept, and which ones you aren’t.
A Note on Why This Belongs in the Climate Conversation
The same extractive logic that treats your life as raw material to be mined is the logic that treats the planet as inventory. Surveillance capitalism and ecological collapse run on the same operating system: externalize harm, internalize profit, and call it innovation.
Digital sovereignty and ecological sovereignty are the same fight wearing different clothes. The question — for our data and for the living world both — is whether we are willing to be honest about what is being taken, by whom, and on whose authority. Adaptive Resiliency starts with that honesty, and continues with the small, daily, stubborn refusals that add up to a different kind of future.
Sources: Reporting and product documentation referenced throughout draws on the video walkthrough at youtube.com/watch?v=WJ8clVdaRKA, the Foreign Intelligence Surveillance Act (Section 702), public reporting on Google’s 2022 Location History settlement, and product pages from DuckDuckGo, SearXNG, Proton, Tuta, Nextcloud, and GrapheneOS. Verify current product specifics directly with vendor sources before publication.
Proton Video – Expression
Tito
Leave a comment