I think it's good advice to assume your device is doing things against your best interests, especially when running software from MS, Google, etc.
There are a few easy things you can do like use e2e encryption wherever possible and trust as few things (devices, companies, apps) as you can get away with.
TOR has dubious value given the effort put in by various actors to de-anonymize its traffic.
There are a few easy things you can do like use e2e encryption wherever possible and trust as few things (devices, companies, apps) as you can get away with.
TOR has dubious value given the effort put in by various actors to de-anonymize its traffic.