Hacked.com icon

hacked.com

How to stop location tracking

map with location symbol

Location tracking happens through layers: phone permissions, account-level sharing, ad and analytics systems, and embedded metadata in photos and files. You usually do not need to eliminate location entirely. You need to make location sharing intentional and hard for other people to change.

Safety note: if you are at risk from a partner, stalker, or coercive situation, do not make sudden setting changes that could escalate conflict. Prioritize personal safety, preserve evidence, and consider using a safer device strategy before you start removing access.

Immediate steps (15 minutes)

  • Turn off location access for most apps and leave it on only for apps that truly need it (maps, ride share while in use, emergency features).
  • Disable precise location for most apps. "Approximate" is good enough in many cases.
  • Review location sharing at the account level (Apple ID, Google account, family sharing, Maps sharing). Remove anyone you do not explicitly trust.
  • Secure the controlling account with two-factor authentication (2FA).
  • Check for spyware signs if tracking feels persistent or tied to a relationship context.

Key idea: permissions and sharing are the obvious signals. Fix those first. Ad tracking and metadata are quieter signals that matter after the basics are locked down.

Where location exposure usually comes from

Source What it looks like What to do
App permissions Social apps, games, shopping apps, weather apps Set to "never" or "while using", disable precise location
Account sharing Find My, Google Maps location sharing, family groups Remove unknown shares, review devices that can see or change sharing
Device-level services System location services, emergency location, nearby device features Keep what you need, but audit what is enabled and who controls the account
Ad and analytics Personalized ads and "nearby" recommendations Limit ad personalization and reset identifiers where available
Photo and file metadata Photos that reveal where they were taken Strip location metadata before sharing publicly

Threat model: what kind of tracking are you trying to stop?

The right controls depend on whether you are reducing general data sharing, or responding to a human threat.

General privacy (ads and apps)

Your goal is to minimize passive sharing while keeping navigation and safety features working. App permissions and account settings usually solve most of the problem.

Stalking, coercive control, or relationship-based tracking

Your goal is to remove other people's access without signaling your moves too early. Tracking in this context can involve account access, shared family groups, installed spyware, or physical trackers.

If this is your situation, consider starting with evidence and device safety checks, then changing passwords from a clean device. Use what to do about online harassment for an evidence-first workflow.

Stop location sharing on iPhone (Apple account controls)

On iPhone, the controlling account and system services matter as much as individual app permissions.

1) Review app permissions

  • Remove location access from apps that do not need it.
  • Prefer "While Using" over "Always" where possible.
  • Turn off precise location for most apps.

2) Review system location services and Find My sharing

Apple's location services documentation is the canonical reference for how the system layer works: Location Services and Privacy.

Then review Find My and location sharing:

  • Check whether you are sharing your location with anyone you did not explicitly choose.
  • Review devices associated with your Apple ID. Remove unknown devices and change the Apple ID password if anything looks wrong.
  • Turn on 2FA for the Apple ID so another person cannot silently change sharing settings.

3) Check for unwanted trackers

Some tracking is physical. If you get warnings about an unknown tracker moving with you, follow Apple's official guidance on identifying and disabling it: If you find an unwanted tracker.

Stop location sharing on Android (Google account controls)

On Android, app permissions, device settings, and Google account services all contribute to location sharing.

1) Review app permissions

  • Remove location access from apps that do not need it.
  • Use "only while in use" equivalents where available.
  • Disable precise location where the OS offers that option.

2) Review Google location services

Google account settings can store and share location history and sharing connections. Use Google's official documentation to locate and manage these controls:

Also review Android's system location settings and permission model using Google's device guidance: Manage your location settings.

Quiet leaks: photos, posts, and metadata

Even with location sharing turned off, your own content can leak location indirectly. Photos can include embedded GPS metadata. Posts can reveal patterns (work commute, child school pickup, regular routes).

When location tracking is a symptom of compromise

If someone is changing your settings back, or you see unfamiliar devices, treat it as account compromise and possibly device compromise. The sequence matters:

  1. Check the device for spyware indicators: how to detect spyware.
  2. Secure the controlling accounts (Apple ID, Google account, email). Enable 2FA.
  3. Sign out unknown sessions and remove unknown devices from account settings.
  4. Then re-apply location controls once you are confident the attacker cannot revert them.

If you are uncertain whether you are dealing with compromise, use how to check if you've been hacked to structure the investigation.

What "done" looks like

Location privacy is easiest when it is intentional. Most apps do not need precise, always-on location. Once you restrict permissions and sharing to the minimum, tracking risk drops sharply.

After the initial cleanup, keep it simple: review location permissions monthly and after installing new apps, and re-check account sharing after major phone or relationship changes.

The stable endpoint is a device where location is shared only when you choose, and accounts are protected well enough that no one else can silently change those choices.