Just went over to check RATtrap website, Iād say they are more likely the culprit than PureOS. Either of their hardware or software have Google/Apple fingerprints all over it. Obviously, RATtrap is in collaboration with those data sniffers, theyāre not an independent company since you could see their programs can be downloaded thru Google Play and Apple Store which is saying a lot.
For those asking to see more information, or information a different way, wouldnāt it make more sense to perform your own tests and share those results? After all even with the complete logs from the OS and Firewall with timestamps thereās no way to know theyāre from the same test (no offense intended to uniqeNICK, Iām primarily playing devilās advocate).
I havenāt gotten to run my own tests yet, but my intended setup is to create a VM and boot from the live CD but instead of using the firewall my plan is to give the parent OS access to the virtual nic and run a packet capture and see hat happens with just the live CD booting, just the settings being opened, and just opening purebrowser, and maybe try opening anything else I find with the pure prefix that implies Purism customization had happened.
@mladen I think that it does matter whether or not the live CD phones home in some fashion not just PureOS post install.
Personally I still suspect itās something with purebrowser and the fact that it is customized Firefox with Google as an optional search provider.