![]() |
Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
Tom Metro wrote: > For #2, the application might use SQLite tables or plain text files. > These are not transparently synced to the cloud. Not unless the application developer specifically codes for that behavior. Google Drive is one such example, one that uses Google's storage. Evernote is another, one that doesn't use Google's storage directly. And while we're on the subject, pay attention to what permissions various applications want to have. I recently went through my list to identify and purge things that seemed suspicious. Things like a terminal program requiring complete access to my telephone call records. Things like a dice roller for role-playing games requiring full access to wifi and baseband networks. -- Rich P.