pwshub.com

Location tracking of phones is out of control. Here’s how to fight back.

Both operating systems will display a list of apps and whether they are permitted access always, never, only while the app is in use, or to prompt for permission each time. Both also allow users to choose whether the app sees precise locations down to a few feet or only a coarse-grained location.

For most users, there’s usefulness in allowing an app for photos, transit or maps to access a user’s precise location. For other classes of apps—say those for Internet jukeboxes at bars and restaurants—it can be helpful for them to have an approximate location, but giving them precise, fine-grained access is likely overkill. And for other apps, there’s no reason for them ever to know the device's location. With a few exceptions, there’s little reason for apps to always have location access.

Not surprisingly, Android users who want to block intrusive location gathering have more settings to change than iOS users. The first thing to do is access Settings > Security & Privacy > Ads and choose “Delete advertising ID.” Then, promptly ignore the long, scary warning Google provides and hit the button confirming the decision at the bottom. If you don’t see that setting, good for you. It means you already deleted it. Google provides documentation here.

iOS, by default, doesn’t give apps access to “Identifier for Advertisers,” Apple’s version of the unique tracking number assigned to iPhones, iPads, and AppleTVs. Apps, however, can display a window asking that the setting be turned on, so it’s useful to check. iPhone users can do this by accessing Settings > Privacy & Security > Tracking. Any apps with permission to access the unique ID will appear. While there, users should also turn off the “Allow Apps to Request to Track” button. While in iOS Privacy & Security, users should navigate to Apple Advertising and ensure Personalized Ads is turned off.

Additional coverage of Location X from Haaretz and NOTUS is here and here. The New York Times, the other publication given access to the data, hadn't posted an article at the time this Ars post went live.

Source: arstechnica.com

Related stories
3 weeks ago - Is your iPhone battery dying too quickly? Here are eight tips for diagnosing and extending your iPhone's battery life.
1 month ago - How well do you know your iPhone? We bet you've never heard of these tips and tricks before.
1 month ago - Getty Image/ Jeffrey Hazelwood/ CNET Smartphones will get much better at meeting your needs, and soon, thanks to...
1 month ago - Smartphones will get much better at meeting your needs, thanks to AI. And that's just for starters.
1 month ago - You keep all sorts of sensitive personal data on your phone and don't want anyone, from app developers to strangers in public, to be able to access it. Here's how to stay safe.
Other stories
10 minutes ago - Attacks on unprotected servers reach 'critical level' An unknown attacker is abusing exposed Docker Remote API servers to deploy perfctl cryptomining malware on victims' systems, according to Trend Micro researchers.…
16 minutes ago - Sleep better with these pillows designed for back sleepers, tested and reviewed by a CNET sleep expert.
16 minutes ago - Earlier this month, a woman appeared on my TikTok For You page who had flown all the way from the US to Thailand solely to see the internet-famous...
1 hour ago - We all love a deal from the local TJ's. But is your typical supermarket really more expensive than the quirky grocery store? We crunched some numbers to find out.
2 hours ago - Don't ignore this nasty zero day exploit says TAG A nasty bug in Samsung's mobile chips is being exploited by miscreants as part of an exploit chain to escalate privileges and then remotely execute arbitrary code, according to Google...