Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Google Knows Where You Are: Here’s How to Stop Them

Google Knows Where You Are: Here’s How to Stop Them

Late in the summer this past year there were several articles written about how Google would continue to track the location of a person’s smartphone after they had chosen to turn their location settings off. A Princeton researcher corroborated those claims for the Associated Press, traveling through New York and New Jersey with locations services off only to be tracked the entire way. Today, we will discuss this issue, and tell you what you need to know to keep Google from tracking you wherever you go.

Google’s 99 Problems
The perception of Google might be as of a benevolent force in a world full of malevolence to a majority of its users, but over the past few years the problems have been mounting up at the doors of the Googleplex. There has been a laundry list of ongoing legal problems, there has been an employee walkout to protest sexual assault allegations by top executives, and for its continued work as a military contractor. CEO Sundar Pichai appeared before Congress in December to answer lawmakers’ questions about data privacy and company censorship. There has also been a recent dust up with Apple over a violation of Apple App Store policy.

With all these problems on the surface, it would be difficult to assume that Google, or its parent company, Alphabet, Inc. would be raking in dough. That is exactly what has happened. Google took in an astounding $39.3 billion in the fourth quarter of 2018. With every dollar they take in, they take in so much more data. In fact, over the past week, the scrutiny over privacy problems led Google to make the claim that changing their privacy policies--something they will most likely be expected to do--could hurt their company earnings and hinder their ability to create revenue.

So Google Tracks User Data?
Like many of the most utilized services, Google, which owns the Android mobile operating system that powers over 81 percent of all smartphones in the world, tracks data down to an individual level. They contend that they do this to be able to improve their services. The more they know about an individual, the more they know about demographics, and about society as a whole. This gives them the best opportunity to develop, build, and bring to market products and services in line with what people want.

Google has its hands in lots of pies, but its most lucrative, by far, is advertising. In fact, in 2017 Google made $110 billion in profits, $95.4 billion of which came from advertising. In order to be the best they can be at advertising, they need information about consumers (and would-be advertisers).

Google’s tracking tools are numerous.

They have the number one mobile operating system (Android), the number one Internet browser (Chrome), the number one hosted email provider (Gmail), the number one video site (YouTube), the number one search engine (Google Search), and the number one mapping application (Google Maps). This is just a small list of all of Google-owned services as hundreds of millions of people and organizations also use their cloud storage systems, their productivity applications, their virtual assistant, and their news aggregate.

Privacy with Google
With all the services you use tracking every piece of data they can, keeping yourself private with Google around might be harder than you think...or is it? You’d think that you should just be able to go into your Android OS and switch off location settings and they will keep from tracking your whereabouts or your activity. This, of course, is not the case, but there is a relatively simple way to keep your location a secret...even from Google. Throw your phone in a large body of water. If you don’t have a large body of water near you, just run it under the faucet for a couple hours (or long enough for those with that pesky IP68 certification to be proven foolhardy).

We’re just kidding of course. If you want Google to stop tracking you, you will need to find, and toggle off the “Web and App Activity” setting. With this setting turned off, Google will no longer be able to store a snapshot of where you’ve been and won’t have access to browser search metrics either.

This may be annoying to some Google users, as to their understanding once Location History is toggled off, the phone should not be able to track his/her location. Google, defending the miscommunication, stated, “Location History is a Google product that is entirely opt in, and users have the controls to edit, delete, or turn off at any time...we continue to use location to improve the Google experience when they (users) do things like perform a Google search or use Google for driving directions.”

Google’s justifications could make sense, until you consider that a feature called “Web and App Activity” needs to be disengaged in order for Google to stop tracking location, even after you tell the OS to stop tracking location. While the company has a laundry list of valuable services, they continue to try and obtain as much data as they can to drive their ad program’s effectiveness, thus profiting off of consumers’ trust.

Do you think that these major Internet companies reliance on advertising revenue is good for consumers or investors? Who really is profiting? Leave your thoughts in the comments section below.

Is Your Effort Getting Things Done?
Tip of the Week: How to Consolidate Your Email Man...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, March 24 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Internet Data Network Security Productivity Productivity Outsourced IT Software Managed IT Services Data Backup IT Support Business Innovation Mobile Devices Tech Term Data Recovery Computer Ransomware Hardware Microsoft Backup Cloud Computing Small Business Google Internet of Things Business Continuity Efficiency Smartphone Managed Service Provider Upgrade Remote Monitoring Android Business Management VoIP Encryption Disaster Recovery Social Media IT Support Data Management Paperless Office Windows 10 Smartphones User Tips Browser Artificial Intelligence Workplace Tips Phishing Windows Managed IT Communication Collaboration Risk Management Windows 10 Cybersecurity BYOD Save Money Facebook Mobile Device Mobile Device Management Saving Money Server App communications Holiday Government Document Management Unified Threat Management Compliance Robot Bandwidth Firewall Applications BDR Managed IT Services Apps Automation Recovery Passwords Gmail Bring Your Own Device Office 365 Employer-Employee Relationship Vendor Management Network Wi-Fi Vulnerability Chrome Business Technology Analytics SaaS Telephone Systems Healthcare Hosted Solution Website IT Management Microsoft Office Tip of the week Money Managed Service Data storage Quick Tips Scam Content Filtering Antivirus Information Project Management Going Green Virtualization Infrastructure Wireless Password Big Data Data loss Data Security Virtual Reality Remote Computing Unified Communications Politics Miscellaneous Work/Life Balance Apple Regulations Office IT Service Social Training Computers Router Two-factor Authentication Storage Computing File Sharing VPN Tablet Files Customer Relationship Management Printing Help Desk Blockchain Customer Service Private Cloud Access Control Network Management Users Google Drive Tech Support Mobile Security Upgrades Assessment Server Management Settings Twitter How To Spam WiFi Digital Payment Business Growth YouTube Uninterrupted Power Supply Websites Identity Theft Downtime Mobile Computing Licensing End of Support Health Remote Monitoring and Management Administration Management Hacker Monitors Word Education LiFi Wireless Technology Legal The Internet of Things Alert Remote Workers Redundancy Software as a Service Electronic Medical Records IT solutions Smart Technology Machine Learning Mobility Maintenance Net Neutrality How To Samsung IoT Sports Budget Chromebook Patch Management Flexibility Information Technology Employees Operating System Internet Exlporer Avoiding Downtime Mouse Virtual Private Network Outlook HIPAA Company Culture Managed IT Service San Diego Writing Emoji MSP RMM Windows 8 Save Time IT Budget Cooperation Recycling Cyberattacks Notes Network Congestion Development Zero-Day Threat Disaster Trending Identities Utility Computing Consulting Cabling Specifications Technology Laws Voice over Internet Protocol Permissions Nanotechnology OneNote Mail Merge Legislation IT Technicians Computer Repair Managing Stress Instant Messaging Break Fix Social Networking Retail Cortana Proactive Tech Terms VoIP Sponsor SharePoint Staff Physical Security eWaste Read Only Touchscreen Techology Google Wallet PowerPoint Point of Sale Roanoke — Central Technology Solutions Display Cables Backup and Disaster Recovery Hard Drives Google Docs Unified Threat Management Hotspot 3D Printing Managed Services Provider Consultation Lenovo Black Friday Statistics Windows 7 Telephony Fraud Screen Reader Processors Employee-Employer Relationship Address Humor Sync Mirgation Enterprise Content Management Finance Dark Web Motherboard Theft Digital Obstacle Backups Public Cloud Downloads Augmented Reality Office Tips Disaster Resistance Drones Professional Services Law Enforcement Cyber Monday technology services provider Update Wires Human Error Search Solid State Drive Botnet User Error Language Unsupported Software Virus Cost Management E-Commerce Superfish Deep Learning Security Cameras Travel Authentication Bluetooth Virtual Desktop Smart Tech Connectivity Current Events Mobile Device Managment Software Tips Migration Vulnerabilities Gadget Data Warehousing Social Engineering USB WPA3 Financial Spyware Course Automobile Computer Care Operations Enterprise Resource Planning Bookmarks Proactive IT Alt Codes Virtual Assistant Technology Assurance Group ’s 18 Permission Shortcut Cryptocurrency Computing Infrastructure Mobile Data Hard Drive Features Remote Worker Geography Authorization GPS Firefox Technology Tips Chatbots Wasting Time Microsoft Excel Modem Safety Fleet Tracking Procurement Hacks Multi-Factor Security Wearable Technology Dark Data Personal Information Mobile Favorites Heating/Cooling IT Consulting Typing Distributed Denial of Service Annual Convention Test WannaCry Bitcoin Marketing Supercomputer Printer Alerts Cache Electronic Health Records Time Management Networking Best Practice ROI Crowdsourcing Meetings High-Speed Internet Hacking Gadgets Tracking Notifications Star Wars Monitoring Buisness G Suite History Comparison Identity Database Taxes Cookies Black Market Asset Tracking Google Maps Google Calendar Conferencing Servers Data Breach Webcam IT Consultant Error Cybercrime Web Server Printers Cameras Hard Disk Drive Motion Sickness CCTV Administrator Regulation Relocation Emergency CrashOverride