Skip to main content

Google Admits Tracking Android Users Even with 'Location' Off

Google has confirmed it can track the location of Android users via the addresses of local mobile phone masts, even when location services were turned off and the sim cards removed to protect privacy.

Revealed by a report by Quartz, Google’s Android system, which handles messaging services to ensure delivery of push notifications, began requesting the unique addresses of mobile phone masts (called Cell ID) at the beginning of 2017.

The information was captured by the phone and routinely sent to Google by any modern Android device, even when location services were turned off and the sim card was removed. As a result Google could in theory track the location of the Android device and therefore the user, despite a reasonable expectation of privacy.

A Google spokesperson said: “In January of this year, we began looking into using Cell ID codes as an additional signal to further improve the speed and performance of message delivery.

“However, we never incorporated Cell ID into our network sync system, so that data was immediately discarded, and we updated it to no longer request Cell ID.”

Google requested the Cell ID alongside what is called the mobile country code and mobile network code, which identify the country and mobile phone operator that the smartphone is using. That data is used to ensure the phone stays properly connected to Google’s Firebase Cloud Messaging system, which handles the delivery of messages and notifications to the smartphone.

A persistent connection is required for the system to work, but instead of staying constantly connected, the phone pings Google’s servers at set intervals. The more pings, the greater the battery drain, so the data collected about the country and mobile networks is used to work out the the minimum number of pings required to stay connected without draining the battery -- so called heartbeat analysis.

The benefit of having the address of the mobile phone mast to ensure message service reliability is not clear, but through a process of triangulation -- the same used to assist when a user is actively using location services -- the position of the user can be revealed down to a roughly 400m radius at a minimum, and often much more accurately in urban areas.

Google said that the data was never stored and that Cell ID requests would stop by the end of November, after an update to the messaging system.

Location tracking via smartphones is a common practice used by all the major players, either locally on the device or remotely on a server and is used to provide many of the services expected of a modern phone.

Beyond mapping services, location data is used for delivering the weather, localized news results, shopping services, augmented reality features and even things as mundane as the ability to pair two different wireless devices simply by colocation.

But in most cases it is possible to prevent the location tracking systems from recording data, should services be disabled and privacy features enabled. That was not the case with the Cell ID collection, whether or not the data was stored by Google.

Comments

Popular posts from this blog

Dangerous sex Positions For Men

The most common cause of pénile injury is found among the variety of potentially dangerous positions used for séxual intercourse. The most popular is the ‘woman-on-top’. This type of position can result in an impact between the pénis against the female pelvis or perineum that can easily traumatize the pénile cylinders. A pénis becomes érect when the lining of the cylinder within it is engorged with blood.  A pénis fracture can occur when there is trauma to the eréct pénis, resulting in a rupture of the cylinder lining. This very painful injury is often accompanied by an abrupt, distressing cracking noise that is immediately followed by dark bruising of the pénis due to blood escaping the cylinder. In ten to 30% of pénis fractures, the urethra is damaged and blood may be visible at the urinary opening. Given these signs, an injury should be relatively simple to diagnose, right? You would be surprised, even with the unsettling sounds of a fracture occurring, many men...

AWS Battles Rivals: Advertising Campaign

Amazon Web Services has defeated IBM in a competition for lucrative federal contracts, threatened Microsoft's core businesses, and reshaped corporate technology. In the last few months, the pioneering cloud-computing unit of the online retail giant has taken a page from the playbook of some of its more traditional competitors: It started advertising. Ads have been splashed across billboards and in airport terminals, television spots and web videos, featuring a whiteboard full of sketches of software architecture and appeals to invent something using Amazon's collection of rented computing services. The advertising campaign, which bears the "Build On" tagline, represents a milestone in AWS' march from technology upstart to one of the major players in business software, technologists and marketers say. For many years, AWS didn't advertise, partly because it didn't have to. The service held a wide lead over the competition, and word-of-mouth was enough to...

Google Authenticator, a formidable layer of protection to your account.

​Google Authenticator is a free security app that can protect your accounts against password theft. It's easy to set up and can be used in a process called two-factor authentication (2FA) offered on popular social media services like Gmail, Facebook, Twitter, Instagram, etc.  The app ( iOS / Android ) generates a random code used to verify your identity when you're logging into various services. The code can technically be sent to your phone via text message every time— but the Google Authenticator app provides an extra level of security.  SMS-based 2FA has a  known security flaw , and any devoted hacker can attempt to  socially engineer  an attack against your phone company. The Google Authenticator app eliminates the possibility of an SMS-based attack  using algorithms  to generate the codes on your phone. Here's how to set it up: 1. Download Google Authenticator from either the Apple App Store or the Android Google Play store. It's free. 2. Nex...