Table of Contents

If you carry a smartphone or use a laptop, chances are your movements and habits are being tracked – often in ways you may not expect. Many people are surprised to learn that disabling ‘Location Services’ is not enough to stop their devices from revealing their whereabouts, and that both companies and hackers alike can exploit tracking to build sophisticated profiles.
This comprehensive guide will help you understand how your devices track you, who wants the data, and what actionable steps you can take to dramatically improve your location privacy.
Why Should You Care About Device Tracking?
Device and location tracking presents multiple serious risks:
- Targeted advertising and profiling by Big Tech
- Exposure of movements to strangers if data is leaked
- Automated law enforcement and government surveillance
- The data can be used in legal proceedings, even for minor infractions
- Puts vulnerable people (domestic abuse survivors, journalists, whistleblowers) at risk
How Your Devices Track You
GPS & Assisted GPS: Used in smartphones to provide very precise location down to meters, often even when apps appear closed. Many apps request access to GPS for functions like maps, ride-sharing, and social media check-ins.
Wi-Fi & Bluetooth: Even when GPS is off, devices scan for Wi-Fi networks and Bluetooth beacons, which can be used to triangulate your location indoors or out. Retailers, airports, and malls use Wi-Fi beacons for tracking foot traffic, often without your knowledge.
Cell Tower Triangulation: Carriers can estimate your position by calculating the delay between nearby cell towers.
App-Based Tracking: Apps like weather, photo, fitness, and social media often access location or sensor data (accelerometer, gyroscope) that can infer movement patterns even with location services ‘disabled.’
Browser Fingerprinting: On laptops/desktops, websites can combine publicly exposed data (IP address, Wi-Fi info, browser version, time zone, etc.) to uniquely identify and sometimes approximate your physical location even if you aren’t logged in.
Metadata in Files: Photos and some documents include Exif or metadata, including the device GPS coordinates and the time the file was created, which is uploaded when you share with others.
Wearable Devices: Smartwatches and fitness bands sync detailed location and health activity data that can cross-link to your identity.
Who Wants This Data?
- Advertisers: To build a detailed dossier of your habits and sell targeted ads.
- App makers: Sometimes to resell or share your data with “analytic partners.”
- Governments: For law enforcement, immigration, or political suppression.
- Hackers: To steal sensitive info, blackmail, or access your accounts.
- Stalkers/Abusers: For individuals at particular risk of physical harm.
How to Prevent or Limit Device Tracking
Review App Permissions (Smartphones):
- On iOS, go to Settings > Privacy & Security > Location Services, and review each app. Set to “Never” or “While Using” for all but maps/ridesharing, if you must.
- On Android, go to Settings > Location > App location permissions, and restrict as above. Consider “Ask every time.”
Disable Background Location Tracking:
- Some apps try to get your location when you’re not using them. Deny or uninstall apps that require this unless absolutely critical.
Turn Off Wi-Fi and Bluetooth When Not In Use:
- Wi-Fi: Disable or set your device not to “auto-join” public networks.
- Bluetooth: Turn off when you don’t need headphones or smart device pairing.
- On iOS, use Settings to turn off fully — the Control Center does not always disable completely!
Use Airplane Mode (with Wi-Fi/Bluetooth off) In Sensitive Situations:
- Meetings, protest rallies, or when visiting sensitive locations.
- Be aware Airplane Mode doesn’t always disable all radios; verify through settings.
Avoid Location Histories and Timeline Features:
- In Google account settings (https://myaccount.google.com/activitycontrols), turn off “Location History” and “Web & App Activity.”
- Facebook, Instagram, Snapchat, and other social apps often keep visual or textual location trails. Disable these features in settings and delete your history.
Limit Exposure from Photos and Files:
- Strip metadata before sharing with tools like ExifCleaner (desktop) or remove location before sending images (both Android and iOS offer this in the sharing dialog).
- Avoid posting real-time photos/tags that reveal your exact location.
Use a Privacy-Respecting OS and Browser:
- Consider using operating systems like GrapheneOS or CalyxOS (Android), or “hardened” iOS via manual settings.
- Use privacy-focused browsers like Firefox/LibreWolf on desktop with privacy extensions (uBlock Origin, Privacy Badger), or Brave.
Limit Browser and Device Fingerprinting:
- Disable browser geo-location.
- Use tools like the Tor Browser for sensitive activities — it routes traffic through multiple relays and masks your location.
- Consider using a reputable VPN—but know that a VPN mainly hides your broadband IP, not Wi-Fi/Bluetooth leaks.
Block Carrier and Big Tech Surveillance Where Possible:
- Ask your carrier about opting out of geolocation-based ad programs (Verizon, AT&T, T-Mobile, etc.).
- Disable Google Location Accuracy on Android.
For Advanced Users: Use Dummy Accounts, Burner Devices, or Faraday Bags:
- When attending particularly sensitive events, consider a “burner” device only used for the purpose, with minimal account info.
- Faraday bags can block all radio signals to your phone/laptop when privacy is essential.
Special Cases: Location Tracking and Wearables
- Wearables (like fitness trackers) often sync location to the manufacturer’s cloud, cross-referencing your account—even if you never post online.
- Review permissions in the companion app and set them to share as little as possible.
- Never link wearable devices to real names or public social media accounts if possible.
Common Misconceptions
- “If I turn off GPS, I’m invisible.” (False: Wi-Fi, Bluetooth, and cellular triangulation continue to work.)
- “Using Incognito mode hides my location.” (False: It only hides browsing history on the device — not from ISPs, websites, or apps.)
- “I need to use location services for all my apps.” (Very few apps need location to work; be strict about denying permissions.)
Staying Safe: Maximum Privacy Habits
- Regularly audit your apps and the permissions they have; uninstall what you no longer use.
- Turn off radios when not needed, and get in the habit of toggling Wi-Fi/Bluetooth.
- Avoid synchronizing your contacts and calendars beyond what you truly need.
- If you must use location, provide it “just-in-time” — then disable it again.
- Educate your friends and family about privacy implications whenever sharing or tagging you.
Conclusion: Take Back Control
While you may never be “completely invisible,” understanding and aggressively managing your device and app permissions is your best defense in an era of ubiquitous tracking. By forming new privacy habits, you make yourself a much harder target — for Big Brother or the algorithmic ad machine.