Proton
Illustration of Big Tech firms

On Wednesday, the CEOs of four massive tech companies — Google, Apple, Facebook, and Amazon — testified before a congressional investigation about those companies’ anti-competitive practices.

The CEOs were eager to portray their companies as under constant threat from competitors. However, the congressional subcommittee raised multiple examples of the companies using their power to spy on, crush, coerce, or acquire competitors.

While the hearing did not reveal any particularly new information, it did force Sundar Pichai, Tim Cook, Mark Zuckerberg, and Jeff Bezos to confirm or deny (or obfuscate) their part in the consolidation of power on the Internet. In doing so, they made a number of questionable claims that do not hold up under scrutiny. 

We have had direct experience with some of these issues, and we believe it is important to share our perspective and set the record straight. We will focus mainly on Google and Apple because we have had the most exposure to their practices, but our overarching concerns are applicable across Big Tech.

Claim: Google lets users control their data

Responding to a question from US Rep. Val Demings, Google CEO Sundar Pichai said that “we today make it very easy for users to be in control of their data.” This is only partially true, depending on how you define “control.”

This assertion is part of a public relations push(new window) Google started last year, during which it implemented new privacy settings and features, such as the ability to turn off personalized ads. But Google continues to collect mountains of data about its users.

True data control would be incompatible with Google’s current business model. Google makes money by creating detailed profiles about all its users and then selling ads on the basis of that information. The process is opaque to users. And this lack of privacy and control is the implicit exchange for access to free services.

Claim: iOS and Android app stores have strong competition

Apple’s iOS controls 25% of the global smartphone market, and Google’s Android mostly takes up the other 75%. (In the valuable US market, Apple enjoys even more market share.)

Nonetheless, when questioned by Rep. Hank Johnson about its monopoly on app distribution on its smartphones, Apple CEO Tim Cook said, “I would describe it as a street fight.” He also said, “There is a competition for developers just as there is a competition for customers.” Cook even said the App Store is just like any other feature, comparing it to a camera.

This argument is patently absurd. Cook is ignoring the fact that the App Store is a market itself, in which Apple holds 100%. 

Developers do not have the option to seek other app distribution methods. Being in business is synonymous with having an app on both the App Store and Google Play. So it is by definition a duopoly on the mobile market.

Claim: Apple is not a gatekeeper

Cook was repeatedly questioned about the App Store and whether it uses its distribution platform to privilege its own apps and suppress competition. 

“Clearly, if Apple is a gatekeeper, what we have done is open the gate wider,” Cook said. “We want to get every app we can on the Store, not keep them off.”

But the App Store — just like Google Play, Facebook’s News Feed, or Amazon’s web hosting service — have become bottlenecks that give these companies immense power to throttle access to consumer markets or abuse data.

Despite Cook’s claims that apps may only be blocked because of privacy or functionality concerns, there is a litany of app developers who say Apple’s App Store rules are opaque, arbitrary, and inconsistently applied. We have experienced Apple’s problematic behavior first-hand(new window) with our Proton VPN iOS app, in which they threatened to remove our app entirely unless we deleted information from our app description that the Chinese and other authoritarian governments deemed objectionable.

Even if we were to accept the “open gate” premise, Apple’s 30% tax handicaps developers in the privacy space, favoring free apps that make their money by abusing people’s data. We have previously written about this in depth(new window).

Claim: Google believes privacy is a universal right

In his submitted opening remarks to the subcommittee, Pichai said, “I’ve always believed that privacy is a universal right and should be available to everyone.”

There’s not much to say about this comment, except that it is extremely ironic. Pichai runs a company whose entire premise is to invade people’s privacy. As his predecessor once said: “We know where you are. We know where you’ve been. We can more or less know what you’re thinking about.”

Doublespeak like this is troubling, and we hope that Congress — and Internet users — are paying attention. Because this isn’t just about antitrust. It’s about access to privacy and being able to control your own data.

We started Proton in 2014 in part because of the same concerns that are coming to light today. We believe society is better served when individuals have more control over their data online. By offering encrypted email, calendar, cloud storage, and other services, Proton is providing consumers with concrete tools to protect their privacy and security.

All these years later, very little about these companies’ business practices has changed, and they’ve only gotten bigger.

Best Regards,
The Proton Team

You can get a free secure email account from Proton Mail here(new window).

We also provide a free VPN service(new window) to protect your privacy.

Proton Mail and Proton VPN are funded by community contributions. If you would like to support our development efforts, you can upgrade to a paid plan(new window). Thank you for your support.

Related articles

The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.
A graphic interpretation of a block of how many gigabytes in a terabyte
Learn how many GB are in a TB and discover the best way to securely store and share your files — no matter their size.
The cover image for a Proton blog, showing a phone screen with a lock logo and three password fields surrounding the phone
Here's what to look for when choosing an enterprise password manager to streamline collaboration and protect your organization's sensitive data.