I was looking up some information about Privacy Guard and came across this article from May this year. Searched the forum but didn’t see it already mentioned.
Standard but nice set of things to do on LOS to, and I quote, “If you follow the steps below on a vanilla LineageOS 18.1 without MicroG, you will achieve feature parity with /e/OS. Check out their whitepaper regarding details.”
Nice.
Disclaimer for the anti-rootists (*): Showcases root and root apps.
thanks @marcdw … can you post the link to the article from which that quote was taken & with those steps? Right now your OP only has a link to the /e/OS product description page.
I read the tips and it looks like they would mostly work with rooted debugging, as most of the work is done using adb. So no need to root the phone with Magisk. I’ll do some more digging on my LOS devices
°Lineage for microG
°Google services that are still being requested. In contrast to /e/OS:
NTP
Captive Portal
DNS
°Switch NTP:
adb shell settings put global ntp_server [de.pool.ntp.org](http://de.pool.ntp.org/)
°Switch DNS
adb shell settings put global captive_portal_http_url “[http://captiveportal.kuketz.de ](http://captiveportal.kuketz.de/)”
adb shell settings put global captive_portal_https_url “[https://captiveportal.kuketz.de](https://captiveportal.kuketz.de/)”
adb shell settings put global captive_portal_fallback_url “[http://connectivity.ecloud.global ](http://connectivity.ecloud.global/)”
adb shell settings put global captive_portal_other_fallback_urls “[http://connectivity.ecloud.global ](http://connectivity.ecloud.global/)”
°Switch DNS
°Settings/Network/Advanced/Private DNS
[dnsforge.de ](http://dnsforge.de/)
Worth reading the guide that @Manoj linked to, about what calls to Google servers exist in /e/, why they are needed, and what data is removed before they are made.