• If you’re at that point of not trusting a company, the best practice would be to avoid using their devices or connecting them to your network.

    There are plenty of other ways to track and identify users, a company could conceivably bake whatever the hell they want into the operating system and doesn’t need to rely on you creating an account with them to achieve that objective.

    I used the term “unhealthy paranoia” due to the logical fallacy that is at play.

    • If you’re at that point of not trusting a company, the best practice would be to avoid using their devices or connecting them to your network.

      Yes, that would be the best practice. However there are a lot of best practices that cannot be followed for one reason or another.