What is Phone Privacy Settings?
The essential privacy configurations on iOS and Android devices that most people never change — controlling what data apps can access, what your phone broadcasts, and what gets sent to Apple or Google.
Also known as: Mobile Privacy Settings, Smartphone Privacy, iPhone Privacy Settings, Android Privacy Settings
Your phone is the most intimate surveillance device you own. These settings can significantly reduce what it leaks.
iPhone Privacy Settings
Critical Changes
- Settings → Privacy → Tracking → Allow Apps to Request to Track: Turn OFF
- Settings → Privacy → Location Services: Set most apps to "Never" or "While Using"
- Settings → Privacy → Analytics: Turn off "Share iPhone Analytics" and all sub-options
- Settings → Apple ID → iCloud → Advanced Data Protection: Turn ON (end-to-end encrypts backups)
- Settings → Safari → Privacy: Enable "Prevent Cross-Site Tracking", hide IP from trackers
- Settings → Privacy → Apple Advertising → Personalized Ads: Turn OFF
- Settings → Passwords → Security Recommendations: Review and fix compromised passwords
Lockdown Mode (High-Risk Users)
Settings → Privacy & Security → Lockdown Mode. Significantly restricts device functionality to reduce attack surface. Designed for journalists, activists, and high-risk targets.
Android Privacy Settings
Critical Changes
- Settings → Privacy → Ads → Delete advertising ID: Remove your device's ad tracking identifier
- Settings → Location → App location permissions: Audit every app
- Settings → Privacy → Permission manager: Review camera, microphone, contacts, etc.
- Settings → Google → Ads → Opt out of Ads Personalization: Turn ON
- Settings → Google → Google Account → Data & Privacy: Review and restrict data collection
- Settings → Connected devices → Connection preferences → Bluetooth: Turn off when not in use (Bluetooth beaconing tracks location)
- Settings → Apps → Special app access: Review which apps have special permissions
De-Googled Android
For maximum privacy, replace stock Android with GrapheneOS (Pixel phones) or CalyxOS. These remove Google's data collection entirely while keeping Android functionality.
Both Platforms
App Permissions Audit
Go through every installed app and ask:
- Does this camera app need microphone access? (Probably yes)
- Does this flashlight app need location? (Absolutely not)
- Does this game need contacts? (No)
- Does this weather app need to track me always? ("While Using" is sufficient)
Reduce Attack Surface
- Delete unused apps — Every app is a potential data collector
- Update regularly — Security patches close known vulnerabilities
- Use app alternatives — Replace data-hungry apps with privacy-respecting ones
- Turn off Wi-Fi and Bluetooth when not actively using them — both broadcast device identifiers
- Use a VPN — Encrypts all traffic from your device
Notifications
- Disable lock screen previews — Messages and emails visible on a locked screen are readable by anyone who glances at your phone
- Settings → Notifications → Show Previews → "When Unlocked" or "Never"
The Reality Check
These settings reduce tracking significantly, but don't eliminate it. Your phone still communicates with cell towers (revealing location), your carrier logs all metadata, and apps find creative ways to track you. For maximum mobile privacy, consider a de-Googled phone with GrapheneOS.
Related Terms
CalyxOS
A privacy-focused Android operating system that includes microG for Google compatibility while removing Google's tracking, easier to use than GrapheneOS.
De-Googled Phone
A smartphone running an Android-based operating system with Google services removed, offering app compatibility while eliminating Google's pervasive data collection.
GrapheneOS
A privacy and security-focused mobile operating system based on Android, designed to minimize data collection while maintaining app compatibility.
Location Tracking Defense
Strategies and tools to prevent or limit the collection of your physical location. Location data is among the most sensitive—it reveals where you live, work, worship, and who you're with. Defense involves both device settings and behavioral changes.
Sideloading
Installing applications from sources outside the official app store, which can enhance privacy by avoiding store tracking but requires caution about malware.
Have more questions?
Use our guided flow to get the right next privacy step for Phone Privacy Settings.
Open Guided Flow