There are numerous ways someone can use to track your location, particularly by cell phone. The list of methods is extensive, ranging from GPS tracking to smart devices and IoT-based tracking, with spyware and stalkerware being the most popular options.
Very often, it can be done without your knowledge and for disturbing reasons, such as stalking, blackmailing, or regular privacy violations.
A poll by NortonLifeLock found that 1 in 10 Americans admitted to using stalkerware to monitor a current or former partner’s devices. Meanwhile, a study within the proceedings of the Privacy Enhancing Technologies Symposium analyzed nearly 10,000 Android apps and found that 86% collected at least one sensitive data type, including GPS coordinates, Wi-Fi, and Bluetooth scan results. This type of data can be used to track movements with high precision, including indoors.
Thus, we’ve prepared this guide to ensure you maintain your safety and freedom of action while staying informed and connected with HeyLocate!
This article is intended for informational and educational purposes only. Its primary goal is to raise awareness about the various ways individuals may unknowingly be tracked or monitored in today’s digital landscape.
We do not endorse or encourage the use of any tracking methods for unlawful, unethical, or invasive purposes, including but not limited to stalking, harassment, or unauthorized surveillance. If you suspect you are being monitored without consent, we encourage you to contact legal authorities or cybersecurity professionals for assistance.
Can Someone Track Your Location?
Essentially, yes. There are many tools available to do this. The tracking can be simple, done by using your phone number, SIM card, or the Find My Device service. More advanced, through legitimate apps with location access or web trackers and IP geolocation. Or sophisticated, with the help of cell signal and tower analysis or side-channel and sensor-based attacks, for example.
All the Ways Your Location Can Be Tracked
Below, we’ll examine how tracking occurs, the signs of potential surveillance to watch for, and how to protect your device and yourself from becoming a targeted victim.

Note: Not every location tracking method is accessible to the average person. The feasibility of these techniques varies significantly depending on an individual’s technical expertise and available resources. While some methods require only basic knowledge and free applications, others demand advanced technical skills, specialized equipment, or significant financial investment.
GPS tracking
GPS tracking (Global Positioning System tracking), simply put, is a technology that determines the real-time location of a person, vehicle, or object using a network of satellites that orbit the Earth.
How does it work? GPS-enabled devices receive signals from multiple spacecraft surrounding the Earth to calculate their exact location based on signal travel time. This calculation is then transferred via the internet or mobile network to display the real-time position on a map.
This method is commonly used in apps such as Google Maps, fitness trackers, delivery tracking systems, and even personal and vehicle tracking systems. However, it can also be used for dangerous purposes that can cause potential harm to you, so it’s essential to spot this.
❗ Here are the signs of GPS tracking:
- sudden battery loss (even when you’re not using your phone much) hints that there might be a GPS tracking app running 24/7 silently;
- your phone gets hot or slows down without a clear reason;
- you’re getting highly personalized ads or location-based suggestions just moments after visiting a place;
- you find unfamiliar apps or services installed (some can be disguised as harmless system apps or use misleading names like Device Monitor or System Helper);
- some person seems to unexpectedly know where you are, even when you haven’t told them.
✅ What to do if you notice this? Here are some small steps you can take to minimize the risks:
- check your location settings and revoke access from apps that don’t actually need it;
- disable location services when not in use (especially overnight or when traveling);
- look for unknown apps on your phone (specifically ones with vague names);
- physically inspect your car or belongings if you suspect someone planted a tracker (pay close attention to the undercarriage, glove box, or wheel wells);
- consider a factory reset if you feel your phone is compromised (but back up your important data first).
Wi-Fi and Cell Tower Triangulation
To stay on the network, your phone is always connected to the nearby towers (usually, to the three closest ones). The system estimates the phone’s location based on the signal strength and timing. After that, the network or device draws circles around each tower using the distance measures. The overlapping part of the circles is your approximate location. This data is shared with permitted apps or services afterward.
As for the Wi-Fi triangulation, the procedure is the same. The only difference is that your phone scans for the Wi-Fi signals available nearby, not the cell towers, and checks the signal strength. Stronger signal = closer, weaker = farther. Again, the system figures out your position by overlapping ranges, making it accessible for the enabled apps.
An automated, yet tricky process that can both guarantee safety and pose dangers.
❗ These small details can help you spot that someone may use it to track your location:
- location-based ads or suggestions still show up even after disabling GPS (means that tracking apps are using other methods);
- your phone auto-connects to public or remembered Wi-Fi networks, even when you’re not actively using them;
- you see location prompts from apps that shouldn’t know where you are, or ones you don’t remember allowing location access to;
- battery usage from Wi-Fi scanning or network location stays high even when Wi-Fi or mobile data is off.
✅ How to prevent or limit this type of tracking:
- turn off Wi-Fi and Bluetooth when not in use;
- disable location access for apps that don’t need it;
- use Airplane mode (it’s the only way to fully disconnect and prevent triangulation, although temporarily);
- don’t auto-connect to public Wi-Fi (turn off Auto-Join for unfamiliar networks in Settings);
- use a VPN.
Spyware and Stalkerware
Spyware is a specifically designed software secretly installed on your device to collect your personal information without your knowledge. Not only can it track your location, but certain apps can read your texts, monitor your calls, steal your passwords or browsing history, and even activate your microphone or camera.
Stalkerware, at the same time, is a type of spyware created to track someone’s location, phone activity, or behavior, usually by someone they know (a partner, ex, family member, or employer).
Both of them run silently in the background. Most likely, you won’t even realize you’re being controlled since these services either use your account credentials or, if installed on your device, are hidden.
❗ Warning signs you might be monitored:
- your phone heats up or the battery dies unusually fast (again, spyware is consuming additional energy);
- you hear strange noises or echoes on calls;
- apps you don’t recognize appear in your menu;
- you’re asked to relog in to apps or accounts (could be a credential-stealing attempt);
- people around you know things they shouldn’t (like where you’ve been or who you’ve texted);
- the connection is slowing down (since your data is being transferred to an outer server).
✅ Here are some protection tips:
- revise your apps;
- search for suitable anti-spyware tools;
- lock down your device;
- pay attention to who has access to your gadget;
- analyze how much data your phone is giving away (review apps’ permissions and check data usage in settings).
Find My Device Services
These tools are built-in tracking features provided by most phone software companies. Although their primary goal is to help you locate your phone, tablet, laptop, etc., someone can log in using your credentials to access your movements in real-time.
It’s best to have two-factor authentication enabled; however, even if you don’t, you will be notified about someone signing in to your iCloud.

The notification I got after my account was accessed from another device; keep in mind that I had two-factor authentication enabled in advance.
- for iOS users, Apple created the Find My app, and if someone has your iCloud account login and password, they can use iCloud’s web version or another device to trace the position of your devices and therefore, you;
- Samsung offers SmartThings Find, which functions similarly, so if your devices are linked to this service, a person with your data can log in and get your geoposition;
- finally, if someone shares your Google account information, they can log in to Google Maps from any device and check your timeline (the history of your locations); however, for this to work, Timeline should be enabled previously, so check your settings in advance.
❗ What are the signs that might indicate that you’re being discreetly tracked?
- you’re suddenly logged out of your account and/or receive unexpected login alerts;
- you’re notified about a second device signing into your iCloud, Google, or Samsung account;
- your location settings have been changed or enabled without your knowledge;
- you see tracking apps or services installed, and you’re sure you didn’t set them up.
✅ Want to protect your privacy? Do this:
- review your installed apps;
- use trusted anti-spyware tools;
- secure your device access (set a strong passcode or biometric lock);
- avoid sharing your PIN or password, even with people you trust;
- don’t let others “check your phone”;
- check for screen mirroring or remote access tools;
- if you suspect deep-level spyware and can’t remove it, back up your data and reset the device or contact a professional.
SIM Swap and Phone Number-Based Tracking
SIM swap involves tricking your mobile carrier into giving access to your phone number by transferring it to a SIM card controlled by a bad actor and then using it to hijack your identity or track your location. Having this replacement done, they can:
- track your location via carrier tools;
- log in to messengers (WhatsApp, Telegram) using your number (unless you have two-factor authentication previously enabled);
- reset passwords to your iCloud, Google, or social accounts and use them for blackmailing you, scamming others, and other dangerous reasons;
- receive your texts and calls.
Phone-number-based tracking, at the same time, can be done in various ways, including:
- using online phone number trackers – usually by hidden location request;
- triangulating your position using nearby cell towers with the help of corrupt insiders at telecom companies, spyware apps that piggyback on tower data, or by exploiting SS7 vulnerabilities (SS7 is a set of protocols that allows carriers worldwide to communicate. It also has known vulnerabilities that hackers, governments, and private intelligence firms can abuse).
Finally, a phone number allows someone to compile your social profiles (if you’ve published your number online) and home address (if your number is linked to them in public records or places you frequently visit, based on check-ins or photos).
Moreover, they can get info about your employment (if your number is available on your LinkedIn profile or other records).
❗ Here’s how to tell if you’re being tracked with the help of this method:
- there’s a sudden loss of cellular signal (e.g., you see No Service, SOS Only, or can’t make calls or texts while others nearby can, and reloading your phone doesn’t help); this can signify that your SIM may have been transferred to another phone, and your carrier has cut off access to your device);
- you’re kicked out of email, social media, or banking apps;
- you suddenly get verification codes you didn’t request or receive alerts about unexpected password change or login;
- you get messages or emails from your operator saying “Your SIM was updated”, “A device was added to your account”, “Your number has been ported”, etc.;
- your phone behaves strangely (e.g., calls drop more often than usual, you stop receiving messages, you can call out, but no one can call or text you, etc.).
In addition to this, there can be more subtle indicators that still require your attention:
-
your battery drains abnormally; constant background processes related to location tracking use up a significant portion of your battery;
-
you see frequent Location Access signs;
On Android: look for the location icon in the status bar when you’re not using any map or app that needs it.
Additionally, you can check if an app has access to your location directly in Settings, to do so:
Go to Settings > Location > tap App Permissions. Now you can see what apps are enabled to see and use your geoposition on different levels (all the time, only while using the app, requesting your permission every time or never).
On iPhone: check for the location arrow in the status bar when you’re not using any map or app that needs it.
Note: In Settings, watch for location arrows next to apps in Privacy & Security > Location Services.
-
messaging apps (WhatsApp, Telegram) show activity at times you’re not using them;
-
messages that you didn’t open are marked read;
-
you see Logged in from another device or devices you don’t recognize.
Pay close attention, as even the smallest detail can mean a great deal for your safety.
✅ Here are some little actions that can help you reduce risks:
- never share your phone number publicly (if you can help it);
- enable two-factor authentication but not via SMS (e.g., via Gmail);
- lock your SIM with a carrier PIN;
- avoid using your phone number as a login;
- watch for suspicious phone behavior;
- monitor your accounts regularly;
- if you suspect your number has been hacked, get a new one and keep it private.
Tracking Without SIM Card (IMEI, Wi-Fi)
Even without a SIM card in your phone, you’re visible to potential trackers. Your device still emits signals and leaves digital traces that can be used to track your identity. For instance, your phone still broadcasts:
- IMEI number (a unique device ID hardcoded into your phone);
- MAC address (a unique hardware ID tied to your Wi-Fi or Bluetooth chip);
- Nearby Wi-Fi networks and connection history;
- Bluetooth signals that beacons can pick up;
- Device name and OS version (even when in airplane mode!).
All summed up, this means that if your phone is on, it can be tracked, profiled, and logged by routers, scanners, and surveillance tools.
Here’s how it works:
- IMEI (International Mobile Equipment Identity): This is a permanent hardware identifier. Typically, only law enforcement and some mobile carriers can use it; however, malicious actors with access to cellular tools can also use it to identify and trace a specific device across networks.
- Wi-Fi tracking: When Wi-Fi is turned on (even if you’re not connected), your device regularly sends probe requests to find known networks. Nearby routers or scanners can capture these to pinpoint your location and link it to a behavioral pattern, like how often you visit a store, how long you stay, or which route you took (often used by retailers, malls, and public venues).
- MAC address tracking: Can be used similarly. Some newer devices randomize their MAC address for privacy, but older phones still broadcast a fixed MAC, making tracking easier over time.
❗ Want to check if you’ve been exposed? The hints pointing at it are pretty similar:
- you get targeted ads after passing a store you didn’t enter;
- your phone battery dies quickly while idle (from background network scanning);
- public Wi-Fi requests access to your device info or prompts unexpected login screens;
- you appear in someone else’s digital footprint (e.g., nearby device scans, location tagging).
✅ Here’s how you can reduce tracking without a SIM card:
-
turn off Wi-Fi & Bluetooth completely;
-
randomize your MAC address;
For iOS: Settings > Wi-Fi > Tap your network > Enable Private Wi-Fi Address with Rotating for maximum privacy.
For Android (depends on version): Settings > Connections > Wi-Fi > Gear icon > MAC address type (Randomized MAC).
-
rename your device to something generic like Phone or Device123;
iPhone: Settings > General > About > Name.
Android: Settings > About Phone > Rename.
-
avoid public Wi-Fi (or use a VPN when connecting to it).
Web Trackers and IP Geolocation
Every time you visit a website, it receives a lot more information than you think, for instance:
- your IP address;
- your device type, browser, and OS;
- your ISP (Internet Service Provider);
- information about cookies, trackers, and browser fingerprinting.
These digital breadcrumbs can build a profile of you and your movements. For example, your IP address reveals your general location, approximate physical location (usually within 1-10 miles), time zone, city, and ISP. This information can be put in online IP trackers and used by stalkers.
Note: If you’re on mobile data or home Wi-Fi, your IP changes, but it’s always trackable unless you’re masking it. If you want to see what your IP address is showing, visit https://ipleak.net/.
Cookies are, in fact, tiny files stored in your browser. They track where you go, what you click, and how long you stay.
Additionally, invisible 1×1 pixels (called tracking pixels) can secretly report back that you opened an email, detect your device IP, OS, and location, and reveal the time and place you accessed the message. These are widely used in email newsletters, scam links, and even resumes/job documents sent via email.
What also matters is your browser fingerprint. It’s created when your device and browser send a unique combination of data (e.g., fonts installed, timezone, device ID, and more). All of it identifies you, even if you block cookies or use incognito mode.
Note that stalkers or hackers can receive your data through malicious or tracking URLs. A single click on a shady link can reveal all the information mentioned earlier and forward you to another site while silently reporting back to the sender.
❗ Want to check if it applies to you? Look for these red flags:
- weirdly accurate ads based on your exact location or device;
- spam calls or emails after you clicked a link;
- emails with strange file attachments or from unknown domains;
- someone mentions a location or activity you never told them about.
✅ Some small yet essential steps for safety can be found below:
- hide your IP address through a VPN;
- clear or block cookies (turn off third-party cookies in your browser settings).
Legitimate Apps with Location Access
When you install a new app and agree to its permissions, you may give it access to your exact real-time location, even when you’re not using it (we strongly advise reading Terms & Conditions and checking the guaranteed permissions carefully).
In most cases, after you check the required box and click Agree, apps can access your GPS coordinates, Wi-Fi and Bluetooth connections, your frequently visited locations and routes, and sometimes even more advanced information, such as your movement patterns (including speed, direction, and altitude).
This data is then quietly shared with advertisers, data brokers, and third-party trackers to create a behavioral profile of you, often including your workplace, home, favorite stores, and daily routines.
Some apps even share your location in the background every few seconds. That’s how they serve you “relevant” ads or push targeted content to your feed. The more apps have access, the more complete the map of your life becomes.
⭐ HeyLocate recommends ⭐

The Social Dilemma
Movie
In 2020, Netflix released a groundbreaking documentary-drama hybrid. This movie can be fascinating for those who want to learn more about the topic.
Your location data can be used to:
- predict where you’ll potentially go next;
- identify your home and work addresses based on time patterns;
- analyze your habits, including visits to medical clinics, banks, or religious centers;
- determine when you’re not home (useful for burglars or stalkers).
Note: this tracking doesn’t just happen through shady apps. Popular weather apps, ride-sharing platforms, retail apps, dating apps, and even some mobile games have been caught collecting and selling user location data, even when “anonymous.”
❗ Want to see if you’re at risk? Look for signs like:
- battery drain (again, from apps running in the background);
- sudden location-based ads from places you’ve recently visited;
- apps that don’t need your location but still request it;
- personalized content or offers that are too accurate.
✅ Here’s how you can enhance your privacy:
-
check which apps have location access (can be done in your phone’s settings, in the Location section);
-
turn off precise location;
iPhone: Settings > Privacy & Security > Location Services > Select app > disable Precise Location.
Android (for supported devices): Settings > Location > App Permissions > Choose app and toggle Use precise location to the OFF position.
-
disable background location access (on both iOS and Android, go to the specific app settings and choose Only while using the app or Deny background access if available);
-
avoid apps that require location for no reason.
Bluetooth Trackers (AirTags, Tiles, etc.)
Ironically enough, you don’t need to own a Bluetooth tracker to be tracked by one. Devices like Apple AirTags, Tile trackers, and similar tools were initially designed to help people locate lost items. Still, they’ve also become a stealthy way to track people without their knowledge. These small devices can easily be slipped into a backpack, coat pocket, purse, or car. Once planted, they silently report their location via nearby phones using Bluetooth.
Apple’s AirTags utilize the massive network of iPhones worldwide to determine their location, which is then transmitted back to the tracker’s owner. This system works even if you don’t own an iPhone, have no app installed, or aren’t connected to the internet.
Bluetooth trackers can offer:
- your real-time location, even across cities;
- your travel history and routine movements;
- timestamps of where you were and for how long;
- detailed movement patterns over time.
Note: These devices don’t rely on your SIM card, GPS, or Wi-Fi. Instead, they piggyback off other people’s phones, which makes them incredibly hard to detect.
Apple and some Android devices now feature basic alerts, such as “Unknown AirTag is moving with you,” but these alerts aren’t always timely or reliable. In numerous instances, a tracker can follow someone for hours or even days before any warning appears (if it appears at all).
❗ Want to know if you’ve been unknowingly tracked? Watch for signals like:
- your phone notifies you about an unknown Bluetooth device nearby;
- your battery dies faster than usual (constant Bluetooth scanning);
- a faint beeping or chirping sound from your belongings (some trackers make noise after hours of separation);
- strange or repeated visits from the same person/location;
- someone seems to know where you’ve been without explanation.
✅ Protect yourselves by:
-
using tracker-scanning apps (even if you don’t own one);
iPhone: Apple’s system will automatically alert you to Unknown AirTag Detected but these alerts may be delayed.
Android: Install AirGuard or AirTag Scan from the Play Store. These scan for unknown trackers moving with you, even if you don’t get system notifications.
-
listening for beeping or chirping;
-
checking your belongings physically;
-
disabling Bluetooth when you don’t need it.
If you find a tracker on you, act immediately. Take a photo of the device as evidence, then take it with you. Instead of going straight home, go to a public place or a police station.
Crowdsourced Bluetooth Mesh Networks
Crowdsourced Bluetooth mesh networks use a swarm of devices (phones, trackers, smart gadgets) to detect and report the location of nearby Bluetooth-enabled items. Prominent examples of such systems include Apple’s Find My network, Tile’s network, and Samsung’s SmartThings Find.
Here’s the process of how it happens:
- your phone’s Bluetooth signal is constantly scanning and being scanned;
- other nearby phones (even strangers’) relay your device’s presence to a central network;
- the system builds a location trail using crowd data.
The most disturbing fact is that the procedure doesn’t need you to install an app or give explicit permission; just being in the same area as someone else’s device is enough for your Bluetooth-enabled device to be detected and reported.
Although the above-mentioned systems are created for safety purposes, it is quite alarming that they track people passively through their own or nearby devices, and operate in crowdsourced silence, without many users realizing their phones are relaying data.
❗ Some critical signs of something going wrong include:
- your phone is constantly requesting Bluetooth access for apps you rarely use;
- you receive prompts like “Join the Find My Network” without clear context;
- your Bluetooth stays on even after you’ve toggled it off (some OS versions auto-reactivate it);
- you’ve noticed trackers (e.g., AirTags, Tiles) around you, even if you don’t own any.
✅ The following steps will help you reduce your exposure:
-
turn off Bluetooth when not in use and keep it off;
-
block app-level Bluetooth permissions.
iPhone: Settings > Privacy & Security > Bluetooth.
Revoke access from apps that don’t need it (like games, shopping apps, or wallpapers).
The solution for Android users is as follows: Settings > Connections > Bluetooth > tap three dots in the corner and select Advanced Settings. From here, check Bluetooth control history, and you’ll see the apps that have turned Bluetooth on or off most recently.
Tap Bluetooth scan history, and you’ll see the apps that have recently scanned for nearby Bluetooth devices while the screen is off. You can turn off Bluetooth-related features in the app’s settings, then.
Power Consumption Tracking (PowerSpy)
While it might sound mindblowing and alarming, professional security research has found that even your phone’s power usage can be used to track your location. This method is called PowerSpy, and it works by analyzing how your phone’s battery efficiency changes in different environments.
Simply put, in each case, when your phone connects to a cell tower, streams data, or switches networks, it consumes power in a specific pattern. These fluctuations can be measured by certain apps or background services that have access to one of the following:
- your phone’s battery level;
- charging and discharging rates;
- screen on/off times;
- CPU/network usage trends.
From this data, an attacker can infer your movement, estimate your distance from towers, or track your commuting route, even if you’ve disabled traditional location services.
Note: Unlike GPS tracking, which usually triggers permission alerts, power consumption tracking doesn’t require special permissions, which makes it harder to detect or block.
❗ Want to know if you’re affected? Watch out for:
- apps that request “battery optimization” access or background activity for no apparent reason;
- sudden overheating or battery drain when you’re not actively using your phone;
- unknown apps that stay active despite being closed;
- vague system apps you don’t remember installing.
✅ To be more sure of your security:
- check your battery usage regularly;
- delete suspicious or unfamiliar apps.
Cell Signal and Tower Analysis
So, you’ve turned off your GPS, Wi-Fi, and Bluetooth, but guess what? You’re still not completely safe due to the cell tower triangulation.
As we’ve explained before, every mobile phone constantly communicates with the nearest cell towers to stay connected, meaning that, in fact, your location is always being estimated by your signal’s interaction with these towers. The “interaction” covers your real-time distance from nearby cell towers, the signal strength and ping time between you and the towers, your device ID and IMEI (tied to your physical phone), and the timestamps of movement between towers (called “cell handoffs”).
This data can pinpoint your location with surprising accuracy, often down to a few hundred feet in urban areas.
Note: Your carrier always has access to it, and so do law enforcement (with a warrant), intelligence agencies, or even cybercriminals using fake towers (called IMSI catchers or stingrays) to intercept and track devices nearby.
What’s more concerning is that you don’t need to use your phone; just having it turned on is enough.
❗ So, if you want to know if you’re being tracked this way, here’s how to tell:
- your signal strength rises in areas where it usually shouldn’t;
- your phone heats up or acts strangely for no apparent reason (potential fake tower activity);
- you receive unusual SMS messages with no content or random characters;
- you’re told your phone was somewhere you’ve never been (based on tower data).
Note: You can’t altogether avoid cell tower analysis unless your phone is off or in airplane mode.
✅ To feel more comfortable and protected, here’s our advice:
- use Airplane mode when you don’t need signal;
- be wary of IMSI catchers (fake towers).
Clues you might be near one:
- sudden signal drop or unusually strong signal in an area with poor coverage;
- your phone heats up for no reason;
- you receive strange SMS codes, blank texts, or missed calls from odd numbers;
- the battery drains faster than normal;
- vary your routes and times when leaving the house.
Photo Metadata (EXIF)
Did you know that when you take a photo with your phone or digital camera, you’re not just capturing an image but also storing hidden data in the EXIF metadata file (Exchangeable Image File Format)? This data can include the exact GPS coordinates where the photo was taken, the date and time the photo was captured, your device make and model (e.g., “iPhone 14 Pro” or “Samsung Galaxy S22”), and even camera settings, like exposure, ISO, flash use, and more.
This means that anyone who receives your photo or finds it online can potentially extract this metadata and learn all that about you.
Note: Social media platforms like Instagram and Facebook typically strip out metadata when you upload photos. However, if you send an image directly via email, messaging apps, cloud links, or file-sharing platforms, the EXIF data often remains intact.
❗ You might be at risk if:
- you shared a photo privately, and someone mentions the exact place you took it;
- your online image files include suspicious amounts of hidden data;
- someone seems to know your device model or routine without being told.
✅ Simple safety tips include:
-
turning off location tagging for your camera app;
iOS: Settings > Privacy & Security > Location Services > Camera.
Android: Camera settings > Location tags.
-
using tools like ExifCleaner, ImageOptim, or apps like Scrambled Exif (Android) to strip metadata before sharing;
-
if you must send a photo, screenshot it first; this often removes metadata automatically;
-
avoiding sending high-resolution originals unless absolutely necessary.
Side-Channel and Sensor-Based Attacks
If you’ve followed all of our previous advice, here’s one more shocking fact: your phone’s internal sensors can still leak information about you through a method known as side-channel attacks. They don’t rely on direct access to your files, apps, or location data. Instead, they gather clues from the physical behavior of your device, including:
- your accelerometer (movement and orientation);
- gyroscope (rotational motion);
- magnetometer (compass/direction);
- ambient light sensors, microphone, or barometer.
From these sensors, attackers can figure out:
- what you’re typing (some attacks can detect keypress patterns just from motion data);
- whether you’re in a car, elevator, plane, or lying in bed;
- the room you’re in based on acoustics, light levels, or air pressure;
- which app or screen you’re looking at, based on how the phone moves or tilts.
Note: These sensors typically don’t require user permission in mobile operating systems. That means any app, even a calculator or game, can potentially access them.
This opens the door for harmful applications, websites, or ad trackers to perform complex profiling.
❗ Want to know if you’re affected? Watch for:
- apps that seem too eager to stay open in the background;
- games, flashlight apps, or tools that shouldn’t need motion or sensor access;
- websites or popups that cause sudden phone movement or vibration patterns.
✅ The most effective way to restrict this type of tracking is by revoking sensor access (where possible):
-
iPhone:
Go to Settings > Privacy & Security > Motion & Fitness > Turn off Fitness Tracking and revoke sensor access for apps that don’t need it.
-
Android (some models):
Settings > Security and privacy > Permission Manager > Body Sensors, Physical Activity, Nearby Devices. Deny unnecessary access.
Note: Android’s Developer Options menu may also include toggles to reduce sensor data access, useful for advanced users.
Smart Devices and IoT-Based Tracking
Smart devices encompass a wide range of products, including smart TVs, voice assistants, security cameras, smart thermostats, doorbells, refrigerators, and even light bulbs. They are designed for our comfort; however, they also listen, watch, and collect more data than we realize (habits, movements, conversations, and routines). Together, these devices become a part of the Internet of Things (IoT).
Each connected device in your home or workplace sends and receives data. Often, this data is stored in the cloud by third-party companies. Like some methods before, its purpose is to analyze and build a behavioral profile, then share the collected information with advertisers and partners.
What can IoT-based tracking reveal?
- when you’re home, away, or asleep (based on thermostat or motion sensor data);
- what you’re watching or listening to (via smart TVs and speakers);
- your voice, speech patterns, and even stress level (via voice assistants like Alexa or Google Home);
- when you open your fridge, turn on the lights, or use appliances;
- which devices and people connect to your Wi-Fi network.
Note: Most smart devices are always on and passively listening for commands. Even when not actively in use, they often collect background data or audio snippets. Some devices have been found to record hours of unintended audio and store it on remote servers.
❗ How smart devices become privacy risks:
- many are shipped with default settings that prioritize functionality over privacy;
- few users change permissions or check what’s being collected;
- some devices transmit data unencrypted, making it vulnerable to interception;
- others are exposed to remote hacking, allowing outsiders to spy, unlock doors, or manipulate cameras;
- many apps connected to these devices request excessive permissions, from microphone access to your location and contact list.
✅ To check if your information can be or already is being misused, look for:
- smart devices that turn on unexpectedly or make sounds without input;
- devices that keep logs of your interactions in the app or cloud account;
- lights, cameras, or screens that stay active when they shouldn’t;
- unexplained spikes in internet activity from your home network.
Privacy checklist for IoT devices:
- change default passwords and disable unused features (especially microphones or cameras);
- turn off cloud backups and logging where possible;
- use a separate guest Wi-Fi network for smart devices to isolate them from your personal devices;
- regularly update firmware to patch known vulnerabilities;
- check privacy settings in companion apps, disable location, voice logging, or unnecessary access.
Overall Tips to Prevent Location Tracking
Although we realize that it’s nearly impossible to eliminate all forms of digital tracking, we would like to point out that there are proven steps you can take to significantly reduce how much of your location is exposed.
The most basic action is to disable location services for apps that don’t need them and regularly review app permissions. Remember to turn off Bluetooth and Wi-Fi when not in use, and enable MAC address randomization to prevent long-term tracking on public networks.
Use airplane mode or power off your phone entirely in sensitive situations, and avoid connecting to public Wi-Fi without a VPN. It’s better to turn off ad personalization settings on your device. Be cautious with unknown links and QR codes, and consider using a VPN to mask your IP address.
If you want to get more advice from authoritative sources, Federal Trade Commission created consumer advice instructions on stalkerware to fight this massive issue.
Conclusion
To conclude, we hope our article gave you a better understanding of how profound and deeply rooted tracking methods can be. Obviously, you don’t need to go off-grid to protect your privacy.
Even a few small, consistent changes can reduce your digital footprint, make you harder to track, and give you more control over your own data.
Additionally, not all methods can be used by regular people, only by law enforcement and advanced hackers. Here’s what you should actually be careful about:
| Method | Who can use it |
|---|---|
| GPS tracking | Regular people with GPS trackers. |
| Wi-Fi and Cell Tower Triangulation | Regular people can access it through apps and services. |
| Spyware and Stalkerware | Mostly hackers; however, in some cases, regular people can use it as well. |
| Find My Device Services | Regular people with your account credentials. |
| Web Trackers and IP Geolocation | Regular people through the web trackers and IP tracking websites. |
| SIM Swap and Phone Number-Based Tracking | Hackers with advanced tools. |
| Tracking Without SIM Card (IMEI, Wi-Fi) | Law enforcement; hackers through complex systems. |
| Legitimate Apps with Location Access | Regular people through location sharing features in the apps. |
| Bluetooth Trackers (AirTags, Tiles, etc.) | Regular people; hackers and whoever has the Bluetooth tracking devices. |
| Power Consumption Tracking (PowerSpy) | Hackers; researchers through specifically crafted apps. |
| Crowdsourced Bluetooth Mesh Networks | Regular people through the networks (e.g., Find My network) connected within specifically designed apps. |
| Cell Signal and Tower Analysis | Law enforcement through the telecom providers’ data; hackers through fake cell towers. |
| Photo Metadata (EXIF) | Regular people; hackers by extracting the data from the pictures. |
| Side-Channel and Sensor-Based Attacks | Hackers through the malicious apps that acces the sensors. |
| Smart Devices and IoT-Based Tracking | Regular people; hackers through the IoT devices. |
⚠️ Remember, privacy in today’s world is important as never. Use our tips to enhance your protection and stay safe and connected with HeyLocate!
Frequently Asked Questions (FAQ)
Yes, it’s possible. Even though your phone number alone doesn’t give exact GPS coordinates, it can be used to track your general location through cell tower triangulation, IMSI catchers, or by tricking you into clicking tracking links that reveal your location and device info.
Yes, they can. Methods like cell tower analysis, Bluetooth mesh networks, PowerSpy, and even sensor-based tracking can reveal your location even if GPS and the internet are turned off.
Yes. You can get text messages containing tracking links or SMS-based exploits that, once clicked or interacted with, show your location or device information without your knowledge. Always be cautious about clicking links from unknown or suspicious senders.
Yes. Even with location services turned off, your phone can still be tracked through cell tower connections, Wi-Fi and Bluetooth signals, and sensor-based side-channel attacks. Turning off GPS alone doesn’t entirely prevent location tracking.
Yes, they can. AirPods use Bluetooth, which can be tracked through Bluetooth trackers and crowdsourced Bluetooth mesh networks, allowing others nearby to detect and locate them.
Not completely. Airplane mode disables cellular, Wi-Fi, and Bluetooth signals, which blocks most common tracking methods. However, some forms of sensor-based tracking (like motion or power consumption analysis) may still function. For complete privacy, it’s best to also manually turn off Wi-Fi and Bluetooth after enabling airplane mode.
Yes. EXIF data can include your exact GPS coordinates, time, and device information, all embedded in the image file. If you share the original photo (especially via email or cloud links), this hidden data can expose your location to anyone who receives it.















Leave a Comment