What is Location Tracking Defense?
Strategies and tools to prevent or limit the collection of your physical location. Location data is among the most sensitive—it reveals where you live, work, worship, and who you're with. Defense involves both device settings and behavioral changes.
Your phone—and increasingly your car, watch, and other devices—constantly broadcasts where you are. Location tracking defense is about taking back control.
Location Data Sources
- GPS: Your phone's most accurate location source
- Cell towers: Approximate location from tower triangulation
- WiFi: WiFi networks reveal location (Google's database maps SSIDs to coordinates)
- Bluetooth: Beacons in stores, airports track movement
- Photos: EXIF metadata embeds GPS coordinates
- Apps: Many request location "for functionality" but use it for ads
Defense Strategies
Device Settings
- Disable location for apps that don't need it
- Use "While Using" instead of "Always" when possible
- Turn off Location Services when not needed
- Review system services that use location (Find My, etc.)
App Choices
- Use privacy-respecting maps (Organic Maps, OsmAnd)
- Avoid apps that require location for no clear reason
- Check app permissions before installing
Behavioral
- Don't check in or tag locations on social media
- Strip EXIF from photos before sharing
- Be aware of WiFi networks—they can track you
- Consider a faraday bag for phones when location must be hidden
Connected Cars and Wearables
- Cars increasingly report location to manufacturers
- Fitness trackers and smartwatches log routes
- Rental cars may track you
- Review privacy policies and opt out where possible
Related Terms
Connected Car Privacy
The privacy risks created by modern vehicles that collect and transmit vast amounts of data — including location history, driving behavior, cabin conversations, biometric data, and even your weight.
Metadata
Data about data. In the context of communications, metadata includes information like who you contacted, when, for how long, and from where—everything except the actual content of your message. Metadata can reveal intimate details about your life even when content is encrypted.
Phone Privacy Settings
The essential privacy configurations on iOS and Android devices that most people never change — controlling what data apps can access, what your phone broadcasts, and what gets sent to Apple or Google.
Have more questions?
Use our guided flow to get the right next privacy step for Location Tracking Defense.
Open Guided Flow