I have no issue with them advertising to me based on what I've typed but if they put me in audiences based on it and sell those I get uncomfortable.
One could easily build chrome extensions that DIDN'T phone home.
Today deep learning data can be downloaded to each computer. They are doing it with small IOT!!
May be they use some statistics over uploaded texts to improve algorithms.
I wonder why so many people tacitly assume that paying for a service will make them forego mining your data and monetizing it. Very few people read the terms of service in its entirety regardless of whether they pay or not.
What we SHOULD do is standardize privacy policy clauses already.
Your OS is already logging your keystrokes, your browser is already logging your keystrokes, who even knows what else is already logging your keystrokes.
Obviously I speak here for the majority of computer users, I imagine many (most?) in the HN readership have taken steps to reduce the amount of keylogging they are exposed to as much as possible already.
I typically use Chromium on OpenBSD, am I being keylogged. I'm pretty sure we all have a choice, and many of us choose convenience over privacy.
You trust your OS and user agent. Would be better if there were strong cryptographically signed assurances that the open source build is the one you have. And lots of companies should be looking through the source and patches. And even then someone might have hidden a back door by now.
And your CPU and encryption algorithms might contain back doors, too.
I would say all these things are fixable over time. Cory Doctorow talks about the war on general computing by spyware and locked-down devices.
Ultimately the only way to have trust is the same way Ripple has trust - by using products from various ostensibly unrelated parties - indeed enemies - to check adherence an agree-upon standard, like code signing from source without compiler backdoors. So you can eg inspect code.
https://softwareengineering.stackexchange.com/a/184896/13446...
Here are some recent examples:
http://www.cnbc.com/2017/06/23/under-pressure-western-tech-f...
http://m.mspmentor.net/managed-security-services/kaspersky-l...
https://disruptiveviews.com/chinese-demand-source-code-imple...
http://fortune.com/2016/04/19/china-demanded-apple-iphone-co...