

/e/OS is just LineageOS with a bunch of cloud crap and a proprietary map app.
Their voice to text feature uses a cloud server that uses OpenAI on the backend. This is something that could and should run locally, but the local ones are apparently not good enough and instead of investing into developing them they are going to use a cloudy thing.
https://community.e.foundation/t/voice-to-text-feature-using-open-ai/70509
Just use LineageOS
It should be noted this is not any sort of actual anti-malware tool. By “lists the trackers” it just means it looks for strings in the compiled bytecode. This is prone to false positives (if the “tracker” classes are stubbed out, e.g. in Fennec F-Droid) and doesn’t actually tell you if or how these libraries are actually used.