[ad_1]
"Wherever you are an observer", no one would have imagined being such an observer after the publication of a series of secret documents revealing the CIA's surveillance of all the smartphones in the world.
But of course, knowing that you are an observer and that you can follow yourself on your smartphone worries the privacy of your data, especially since their use may not be for security reasons.
Some companies exploit the malicious methods used to track a person by accessing and targeting them in a very disturbing advertisement.
The Wired website pointed out that WikiLeaks had revealed in its new confidential documents that US intelligence agencies could spy on and track anyone in the world through a series of malicious methods used only by hackers.
According to these documents, US intelligence agencies can determine where anyone, with friends, family members, or colleagues around the world, uses a laptop, personal computer, smart phone, or operating system. Windows, Mac or Android. "Or" IOS ".
The documents indicate that the CIA relies on a wide range of malware, launched on the Internet and intended for users around the world, and taking advantage mainly of devices using Wi-Fi (Wi-Fi) in general.
WikiLeaks noted that the documents were part of a project launched by the US intelligence agency ELSA, which dates back to 2013, and which specifically targets all Windows PCs and laptops. It has been developed to include all smartphones.
But Digital Trends, the specialist technical site, presented what he called "the complete guide to protect your phone from any monitoring or surveillance."
The technical site explained that the follow-up operations are often "anonymous" before being sold to intelligence agencies or advertising agencies, which provide complete information, whether it is your place of residence or where you prefer to shop, or even go to clinics or cafes and your favorite restaurant.
The report provides ideal ways to prevent any application from tracking your position, whether on Android or iOS.
Search applications
Before you know the best way to prevent apps from following you, you need to know which applications can access your site first.
You must first examine the applications on your smartphone to see if they can access your location data.
You need to know if these apps use legitimate reasons to track these apps based on your location or if there is a real reason to track them for your location because apps are not working properly when you stop following your location , such as Google Maps. .
Total ban on Android
If you have an Android phone, you can completely disable tracking of the position, but it is slightly different from one phone to the other, which will look like this:
– Google Pixel 3: Go to Settings, the "Security and localization" icon, then enable the Change location option to prevent any application from accessing your location.
– Samsung Galaxy S 9 Plus: go to Settings, then the icon, then go to the site and disable it.
– Huawei P20 Pro: Go to the settings, to the security and privacy icon, then to the location services, and disable access to my location.
Note:
– But after stopping to follow all the applications of your position, your follow-up will stop, the answer will be "No"He said.
Because there are still applications that can reach you via the IP of your device.
– Disabling your location means that if you lose your phone, you will not be able to find it, you will never see it, and some apps such as Google Maps and others may not work.
Google tells users that it continues to track their position even after turning off Location History.
A @AP investigation finds that many #google services on #iPhone and #Android devices store location data, even if you've used privacy settings to prevent tracking of your movements pic.twitter.com/KyEKds6jTw– Anonymous Scandinavia # # SafePbadage #NoExpulsion (@AnonScan) August 16, 2018
Limited ban on Android
To enable some of your favorite apps that only work when you enable location tracking, you can enable a limited or limited ban for a number of apps, which varies from phone to phone. other as follows:
– Google Pixels: Access settings, including apps and notifications, advanced settings, app permissions, and then to the location and disable it.
– Samsung Galaxy: Go to Settings, then to apps, you will find the 3-point menu at the top right, then go to Application Permissions, allowing you to track and cancel your location.
– Huawei: Go to Settings, including Applications and Notifications, then Permissions, select your location, and disable it.
Prohibition on iPhone
Phones operating under the IOS operating system for iPhone phones differ from Android phones by blocking tracking location.
For a complete ban, you can:
Go to the settings, including the privacy icon, and then the Location Services option, choose the option to completely disable location tracking services.
But this will also affect some services and applications, such as map applications and looking for an iPhone phone when it is lost via iLoud.
So, you should follow these steps to not lose these applications:
Go to Settings, including Privacy, and then Location Services.
You will see a list of applications that can access your location data. You can click and select one by letting your position never be tracked, when using the app, or always.
What about applications that have followed you in the past?
You have now blocked access to different services and apps to track your location from now on. What about the previous data collected about you by companies? Can you delete them?
For Android phones:
You can ask Google to remove any postings from your location by clicking on your Google Account Location History and then permanently deleting the information. You will not be able to recover them.
Accessories for mobile phones and personal badistants
Go to Settings, then in Privacy, go to Site Services, scroll down to find the system services, then go to the "Important Sites" option.
Click the option to completely erase the records, you will see an Apple message stating that this information is encrypted, but continue the process until the records are completely erased.
[ad_2]
Source link