Get Started Today!  321-259-5500

croom new

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

Google’s 99 Problems
The perception of Google might be as of a benevolent force in a world full of malevolence to a majority of its users, but over the past few years the problems have been mounting up at the doors of the Googleplex. There has been a laundry list of ongoing legal problems, there has been an employee walkout to protest sexual assault allegations by top executives, and for its continued work as a military contractor. CEO Sundar Pichai appeared before Congress in December to answer lawmakers’ questions about data privacy and company censorship. There has also been a recent dust up with Apple over a violation of Apple App Store policy.

With all these problems on the surface, it would be difficult to assume that Google, or its parent company, Alphabet, Inc. would be raking in dough. That is exactly what has happened. Google took in an astounding $39.3 billion in the fourth quarter of 2018. With every dollar they take in, they take in so much more data. In fact, over the past week, the scrutiny over privacy problems led Google to make the claim that changing their privacy policies--something they will most likely be expected to do--could hurt their company earnings and hinder their ability to create revenue.

So Google Tracks User Data?
Like many of the most utilized services, Google, which owns the Android mobile operating system that powers over 81 percent of all smartphones in the world, tracks data down to an individual level. They contend that they do this to be able to improve their services. The more they know about an individual, the more they know about demographics, and about society as a whole. This gives them the best opportunity to develop, build, and bring to market products and services in line with what people want.

Google has its hands in lots of pies, but its most lucrative, by far, is advertising. In fact, in 2017 Google made $110 billion in profits, $95.4 billion of which came from advertising. In order to be the best they can be at advertising, they need information about consumers (and would-be advertisers).

Google’s tracking tools are numerous.

They have the number one mobile operating system (Android), the number one Internet browser (Chrome), the number one hosted email provider (Gmail), the number one video site (YouTube), the number one search engine (Google Search), and the number one mapping application (Google Maps). This is just a small list of all of Google-owned services as hundreds of millions of people and organizations also use their cloud storage systems, their productivity applications, their virtual assistant, and their news aggregate.

Privacy with Google
With all the services you use tracking every piece of data they can, keeping yourself private with Google around might be harder than you think...or is it? You’d think that you should just be able to go into your Android OS and switch off location settings and they will keep from tracking your whereabouts or your activity. This, of course, is not the case, but there is a relatively simple way to keep your location a secret...even from Google. Throw your phone in a large body of water. If you don’t have a large body of water near you, just run it under the faucet for a couple hours (or long enough for those with that pesky IP68 certification to be proven foolhardy).

We’re just kidding of course. If you want Google to stop tracking you, you will need to find, and toggle off the “Web and App Activity” setting. With this setting turned off, Google will no longer be able to store a snapshot of where you’ve been and won’t have access to browser search metrics either.

This may be annoying to some Google users, as to their understanding once Location History is toggled off, the phone should not be able to track his/her location. Google, defending the miscommunication, stated, “Location History is a Google product that is entirely opt in, and users have the controls to edit, delete, or turn off at any time...we continue to use location to improve the Google experience when they (users) do things like perform a Google search or use Google for driving directions.”

Google’s justifications could make sense, until you consider that a feature called “Web and App Activity” needs to be disengaged in order for Google to stop tracking location, even after you tell the OS to stop tracking location. While the company has a laundry list of valuable services, they continue to try and obtain as much data as they can to drive their ad program’s effectiveness, thus profiting off of consumers’ trust.

Do you think that these major Internet companies reliance on advertising revenue is good for consumers or investors? Who really is profiting? Leave your thoughts in the comments section below.

Is Your Effort Getting Things Done?
Tip of the Week: How to Consolidate Your Email Man...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, May 19 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Our 10 Benefits Whitepaper
See The Value of Managed IT Services!
Download our simple 10 Benefits of Managed IT Services Whitepaper.

Download Now!

 

Free Network Consultation
Sign up today for a FREE Network Consultation
How secure is your IT infrastructure?  Free Evaluation!

Sign Up!

Newsletter Sign Up

  • Company Name
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Privacy Hackers Business Computing Business Malware Hosted Solutions Internet Email Productivity IT Services Network Security Data Computer Productivity Backup Mobile Devices Software Hardware Microsoft Google Ransomware User Tips Efficiency Managed Service Provider Workplace Tips Tech Term Windows 10 Smartphone Android Innovation Server Business Continuity Small Business Communication Cloud Computing Disaster Recovery IT Support Data Management IT Support Upgrade Social Media Encryption Business Management Smartphones Network Phishing App Managed IT Services Browser Data Backup Windows 10 Windows Artificial Intelligence BYOD Office 365 Facebook Data Recovery Paperless Office Outsourced IT Gmail Employer-Employee Relationship Collaboration Office Apps Internet of Things Big Data Passwords Vendor Management Managed IT Services Microsoft Office Save Money Remote Monitoring Government WiFi Mobile Device Management Hosted Solution Holiday VoIP Recovery Wireless Spam Robot Wi-Fi Vulnerability Risk Management Two-factor Authentication Saving Money Chrome Miscellaneous Virtualization Office Tips Firewall Wireless Technology Alert Cybersecurity communications IT solutions Website Automation Hacker Document Management Customer Service IT Management Content Filtering Bandwidth Business Technology VPN Quick Tips Infrastructure How To Tip of the week Money Antivirus Password Mobile Device Settings Social Word Budget Work/Life Balance Avoiding Downtime Scam Managed Service Analytics Compliance Tablet Applications BDR Data storage Virtual Reality Apple Going Green Hard Drives File Sharing Politics Legal Education SaaS Bring Your Own Device Maintenance IT service Twitter Tech Support The Internet of Things Computing Blockchain Storage Information Cybercrime Downtime Unified Threat Management Customer Relationship Management Remote Computing Machine Learning Healthcare Data loss Access Control HIPAA Patch Management Networking Samsung YouTube Business Intelligence Computer Care Unified Communications Regulations Gadgets Lithium-ion battery Solid State Drive Data Security Hacking Best Practice Identity Theft Computers Mobile Security Business Owner End of Support Training User Error Private Cloud Search LiFi Management G Suite Sports Competition Virtual Private Network Users Outlook Cooperation Heating/Cooling User Health Point of Sale Printing Taxes eWaste Upgrades Websites Telephone Systems Administration Running Cable Safety Mouse Operating System Electronic Medical Records Presentation Physical Security IBM How To Botnet Augmented Reality Router Automobile Chromebook Server Management Net Neutrality Google Drive Monitors Virtual Desktop Network Management Cost Management Cortana Cache Employees CCTV Halloween Typing Law Enforcement Monitoring Shared resources FCC iPhone Google Docs Help Desk Identities Alerts ROI Touchscreen Google Wallet Database Statistics Distributed Denial of Service Backups Personal Information IoT Favorites Meetings Vulnerabilities RMM CIO Current Events Comparison Troubleshooting Mobile Data Relocation Cookies Electronic Health Records Cabling Marketing Fraud Recycling Remote Monitoring and Management Digital Scary Stories Cryptocurrency SharePoint Gadget Law Consulting OneDrive Title II Mobile Computing Licensing Writing Notifications IP Address OneNote Notes Drones Voice over Internet Protocol Bluetooth Managed IT Service Computer Repair Undo Star Wars Instant Messaging Webcam Black Market Development Tech Terms Specifications Social Networking Nanotechnology Files Knowledge Public Speaking Zero-Day Threat Spyware Bitcoin Downloads IT Technicians Entrepreneur 5G Managed Services Provider Google Maps Manufacturing Online Techology Retail Crowdsourcing Mobile Office Employee-Employer Relationship PowerPoint Supercomputer Windows 7 Break Fix Assessment Finance Lenovo Hotspot Network Congestion Cables Theft Staffing VoIP Black Friday Refrigeration Screen Reader Read Only Travel Disaster Experience Company Culture Human Error Windows 8 Multi-Factor Security Mirgation Motherboard E-Commerce Error Hard Disk Drives Mail Merge Microsoft Excel Humor Update Web Server Corporate Profile Business Growth Unified Threat Management Staff Social Engineering Remote Workers Professional Services IT Budget Servers Dark Web Internet Exlporer Authentication Superfish Language Display Processors Wires Financial GPS Time Management Cyber Monday Smart Tech Printers Motion Sickness Uninterrupted Power Supply Deep Learning Managing Stress Permission IT Consultant Buisness Hacks Google Calendar Environment Chatbots 3D Printing Features Hiring/Firing Solid State Drives Address Cameras WannaCry Laptop Alt Codes Printer Wearable Technology Wasting Time Digital Payment Co-managed IT Save Time Teamwork Shortcut Managed IT Hard Drive Authorization Computing Infrastructure Security Cameras Tracking Information Technology Smart Technology Connectivity Bookmarks Hard Disk Drive Dark Data Emoji Enterprise Content Management Test Cleaning Firefox Trending Legislation Identity Unsupported Software Application Fun Modem Administrator Permissions Analyitcs Regulation USB Emergency Domains Flexibility CrashOverride Students Wireless Internet

      Latest Blog Entry

      Subscription-based solutions are quite popular these days, and Microsoft Office 365 is perhaps one of the most important ones on the market. However, the services provided by Office 365 are contingent upon successfully renewing the subscription, making it critical that the u...

      Account Login