Tracking Off
Who Is Tracking You?
Corporate Surveillance
Companies build detailed profiles from:
- Web tracking — cookies, browser fingerprinting, tracking pixels
- App permissions — location, contacts, microphone, camera
- Purchase history — loyalty cards, credit card data
- Device sensors — accelerometer, gyroscope patterns
This data is sold to data brokers and used for targeted advertising.
Government Surveillance
- Mass metadata collection (call records, internet traffic patterns)
- Cooperation with service providers (varies by country)
- Device seizure at borders
Disable Location Tracking
Android
Settings > Location > disable entirely, or restrict per-app:
- App Permissions > Location > set to “Only while using app” or “Deny”
- Turn off “Google Location History” in Google account settings
iPhone/iOS
Settings > Privacy > Location Services — set each app to “Never” or “While Using”
Windows 10/11
Settings > Privacy > Location > turn off “Location service”
Disable Bluetooth When Not in Use
Bluetooth can be used for:
- Proximity tracking (retail stores, airports)
- Device fingerprinting
Android: Quick settings tile > Bluetooth off iPhone: Control Center > Bluetooth off (or Settings > Bluetooth > Off for complete disable)
Disable NFC When Not in Use
NFC is used for contactless payments but also poses risks if a malicious reader is nearby.
Android: Settings > Connected devices > NFC > off iPhone: NFC cannot be fully disabled on modern iPhones (it auto-activates for Apple Pay)
Opt Out of Ad Tracking
Android
Settings > Google > Ads > Delete advertising ID (Android 12+)
iPhone
Settings > Privacy > Tracking > turn off “Allow Apps to Request to Track”
Windows
Settings > Privacy > General > turn off “Let apps use advertising ID”
Browser Fingerprinting
Even without cookies, websites can identify you by your browser’s unique combination of:
- Screen resolution
- Installed fonts
- Browser plugins
- Canvas/WebGL rendering
Test your fingerprint: coveryourtracks.eff.org
Mitigation: Use Firefox with uBlock Origin + Firefox Multi-Account Containers, or use the Tor Browser.