Privacy Tools Guide

Your smartphone constantly broadcasts location data through multiple channels—GPS satellites, cellular towers, Wi-Fi networks, and Bluetooth beacons. Understanding these vectors enables effective countermeasures. This guide provides technical depth for developers and power users seeking location privacy.

Location Tracking Vectors Explained

Modern smartphones expose location data through four primary mechanisms, each with distinct technical characteristics and mitigation strategies.

GPS (Global Positioning System)

GPS relies on signals from orbiting satellites. Your device calculates position by measuring time differences between signals received from multiple satellites. GPS provides accuracy within 5-10 meters under optimal conditions but requires clear sky visibility.

To verify GPS status on Android:

# Check GPS provider status via ADB
adb shell settings get secure location_providers_allowed

# Disable GPS entirely
adb shell settings put secure location_providers_allowed -gps

On iOS, GPS cannot be fully disabled without disabling Location Services entirely, which impacts legitimate app functionality.

Cellular Network Triangulation

Your phone connects to nearby cell towers—even without active calls. Carriers triangulate position using signal strength from multiple towers. This works indoors and operates continuously.

Technical mitigation involves using airplane mode or aircraft-style cell jamming (typically illegal). For legitimate protection, consider burner phones with minimal carrier association.

Wi-Fi Positioning System (WPS)

Google and Apple maintain databases mapping Wi-Fi router MAC addresses to geographic locations. Your phone scans for nearby networks and reports them to these services—even with Wi-Fi disabled, probe requests reveal network names.

On Android 10+, MAC randomization prevents permanent association:

// Verify MAC randomization is enabled
WifiManager wifiManager = (WifiManager) context.getSystemService(Context.WIFI_SERVICE);
if (Build.VERSION.SDK_INT >= Build.VERSION_CODES.Q) {
    Log.d("Privacy", "MAC randomization: " +
        wifiManager.isMacRandomizationSupported());
}

Bluetooth Low Energy (BLE) Beacons

Retail stores, airports, and smart cities deploy BLE beacons for location tracking. Your phone detects these beacons for indoor navigation and proximity marketing.

Systematic Countermeasure Implementation

Phase 1: Permission Audit and Revocation

Review all apps with location permissions. Many request unnecessary access.

Android Implementation:

# List apps with location permission
adb shell pm list permissions -d | grep -i location

# Revoke specific app permission
adb shell pm revoke com.suspicious.app android.permission.ACCESS_FINE_LOCATION

iOS Implementation: Settings → Privacy & Security → Location Services Disable access for non-essential apps. Set to “While Using” instead of “Always” where possible.

Phase 2: System Service Configuration

Both platforms include location-related services requiring attention.

Android System Services:

iOS System Services:

Phase 3: Network-Level Protection

Protecting location requires securing all network traffic.

VPN Configuration: Route all traffic through a VPN to prevent ISP-level location inference:

# WireGuard configuration example
[Interface]
PrivateKey = <your-private-key>
Address = 10.0.0.2/32
DNS = 10.0.0.1

[Peer]
PublicKey = <server-public-key>
Endpoint = vpn.example.com:51820
AllowedIPs = 0.0.0.0/0
PersistentKeepalive = 25

DNS Configuration: Use privacy-resolving DNS to prevent location-based query leakage:

Configure via Network Settings → Private DNS on Android or DNS Settings on iOS.

Phase 4: Advanced Mobile Configuration

Custom ROM Consideration: Installing privacy-focused ROMs like GrapheneOS or CalyxOS provides granular permission control unavailable in stock firmware. These ROMs include:

Network Stranding: When entering sensitive environments, enable airplane mode—but recognize limitations:

# On Android, verify airplane mode disables all radios
# Note: GPS is hardware-based and may remain active
# only truly disconnects with powered-off state

Technical Reality Check: Airplane mode on most devices does NOT disable GPS (which is receive-only). GPS itself transmits nothing. However, apps can still record GPS coordinates while airplane mode is active and transmit when reconnected.

Phase 5: Monitoring and Detection

Verify your countermeasures with active testing.

Android:

# Monitor location API calls (requires root)
adb logcat | grep -i "location"

# Check which apps recently accessed location
adb shell dumpsys location

iOS: Settings → Privacy & Security → Location Services → Location Services indicator (shows purple arrow when location recently accessed)

Third-Party Verification:

Platform-Specific Recommendations

Android Users

  1. Disable “Improve Location Accuracy” in Location settings (disables Wi-Fi scanning)
  2. Set all apps to “Allow only while using” not “Allow all the time”
  3. Use Firefox with Enhanced Tracking Protection for browsing
  4. Disable Google Location Sharing in Google Maps settings
  5. Consider disabling Chrome entirely (replaced with Brave or Firefox)

iOS Users

  1. Enable “Precise Location” toggle OFF for each app individually
  2. Disable “Share My Location” in Find My settings
  3. Use “Custom Access” for Location (iOS 15+)
  4. Disable “Analytics & Improvements” in Privacy settings
  5. Consider “Lockdown Mode” for maximum protection

Physical Security Considerations

Digital countermeasures fail without physical device security:

Special Use Cases

Journalists and Activists: Standard countermeasures are insufficient. Consider:

Developers Building Location-Aware Apps: If your app requires location:

Built by theluckystrike — More at zovo.one