Friday, October 11, 2024
HomeSecurity NewsGoogle Collects Android Users Location Even though you have Turnoff Location Services

Google Collects Android Users Location Even though you have Turnoff Location Services

Published on

Android phones collecting users location data even when you are offline and send it back to google once you have connected to the Internet. Even though if you have turned off Location services or removed SIM card.

Starting from 2017 Android phones started collecting address of nearby cellphone towers even if you turn off location services and send back to Google once you come online, according to Quartz investigation.

Quartz contacted Google and they confirmed the practice. According to Google Spokesperson Google uses to manage push notifications and messages on Android phones for the past 11 months. He also added they never used or stored data.

Devices that connected to mobile data or WiFi use to send data to Google whenever they come across with a new cell tower. Quartz observed even after default factory reset and apps with location service disabled it continues to send nearby cell tower address to Google.

- Advertisement - EHA

It is still unclear how the cell tower address transmitted as a data string will improve the message delivery and not limited to any particular type of Android phone or tablet; Google was apparently collecting cell tower data from all modern Android devices before being contacted by Quartz.

The practice is annoying and it breaks the user’s privacy. Anyway the data sent is encrypted, but still, it can be potentially used if the device is compromised with Spyware.

Also Read Interesting to See How Google Recognize Traffic Condition

Nowadays it is not a surprise to see a malicious app on Google play store, hackers continued to deceive the Google safety checks even after Google play protect implementation.

Google’s privacy policy says that they can collect the information from devices that use services, but not indicates they can collect even if the location sharing is disabled.
When you use Google services, we may collect and process information about your actual location. We use various technologies to determine location, including IP address, GPS, and other sensors that may, for example, provide Google with information on nearby devices, Wi-Fi access points, and cell towers.

There is no way for users to turn off the collection of cell tower data, according to Google they are to end the practice by end of this month and Android phones will no longer send cell-tower location data to Google.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical PDF.js & React-PDF Vulnerabilities Threaten Millions Of PDF Users

A new critical vulnerability has been discovered in PDF.js, which could allow a threat...

LayerX Security Raises $26M for its Browser Security Platform, Enabling Employees to Work Securely From Any Browser, Anywhere

LayerX, pioneer of the LayerX Browser Security platform, today announced $24 million in Series...

Email Header Analysis – Verify Received Email is Genuine or Spoofed

Email Header Analysis highly required process to prevent malicious threats since Email is...