Skip to content

Tracking technologies: GPS, Wi-Fi, and more – Privacy implications explained

Reducing radio module usage on smartphones when not in use contributes to environmental preservation.

Reducing the use of smartphone modules when not essential helps conserve battery life.
Reducing the use of smartphone modules when not essential helps conserve battery life.

Securing Your Smartphone: A Comprehensive Guide

Tracking technologies: GPS, Wi-Fi, and more – Privacy implications explained

Craving convenience, many individuals keep GPS, WLAN, and Bluetooth running on their smartphones at all times. However, Stiftung Warentest advises turning these modules off when they're not needed for better security and battery life.

The Power of Disconnecting

By turning off GPS, WLAN, and Bluetooth when not required, you prevent apps from gathering location data and aid in conserving your battery. Even when your battery is low, deactivating unnecessary wireless connections can grant extra minutes of usage time.

Moderating Your GPS, WLAN, and Bluetooth Activity

Savvy testers point out that keeping GPS or WLAN active reveals more about you and leaves room for app and operating system providers to store movement data or create detailed movement profiles. To reduce this exposure, toggle off GPS or WLAN when not in use.

Additionally, consider disabling "Precise Location" on both Android and iOS. This setting collects not only GPS data but also information about Wi-Fi networks and cell towers along with data from smartphone sensors like accelerometers or gyroscopes. You can turn off "Precise Location" on Android and iOS by adjusting their respective settings.

Securing Unused Bluetooth Connections

Wireless interfaces like Bluetooth can serve as entry points for potential attackers. Security researchers have discovered vulnerabilities in Bluetooth that could theoretically allow attackers to control your smartphone. To minimize risk, disable Bluetooth when not using it for music or location purposes.

Android vs iOS: Managing Connections

Disabling GPS, WLAN, and Bluetooth on Android devices is quite straightforward: just swipe down from the top of the screen to access quick settings. On the other hand, temporary deactivations on iOS require swiping down from the top right corner of your screen, and for a permanent off-state, you'll need to delve into Settings.

App Cautiousness and Permissions

To further reduce the risk of data falling into the wrong hands, it's wise to choose apps cautiously, only installing those that are truly needed. Apps not currently in use could still collect data and possibly transmit it in the background without your knowledge.

Additionally, when installing an app, think twice about granting it access to sensitive data such as your calendar, contacts, camera, photos, videos, physical activity, or location. Only provide access if it's absolutely crucial for the app's function.

Securing Your Android and iOS Apps

When managing apps on Android, go to Settings > Apps > App info. Choose an app and tap Permissions to review and modify the permissions given to it. Regularly updating apps through the Google Play Store is another crucial step to ensure you have the latest security patches.

For iOS users, go to Settings to view and manage the permissions for each app. Remember to regularly update apps through the App Store for up-to-date security measures.

Additional Security Measures

To protect your device further, enable remote wipe or lock capabilities in case it gets lost or stolen. On Android, use Google Find My Device, and on iOS, use Find My iPhone. Using encrypted messaging apps like Signal or WhatsApp is another valuable security practice for secure communication.

Lastly, remember to regularly update both your operating system and apps to have the latest security patches applied, shielding your device from potential threats.

  1. In the realm of personal-finance management apps, it's essential to be cautious about granting excessive access to sensitive data such as financial information.
  2. In addition to securing smartphone connections, data-and-cloud-computing services also require attention to protect your stored financial information and budgeting data from potential cybersecurity threats.
  3. To augment overall financial security, consider opting for services that prioritize encryption and follow stringent data privacy policies to safeguard your sensitive information.

Read also:

    Latest