Last Update: 04/05/2026 at 2:50 PM EST

Apple Tightens Phone Location Privacy

Coverage from Forbes, Consumer Reports, and others

Articles

3

Latest Article

02/06

Active Days

2936

Executive Summary

Apple and privacy guides show how phone users can limit location tracking, though carriers, apps, and investigators can still infer where they are.

  • Android and iPhone users can reduce tracking by turning off location services and narrowing app permissions
  • Phones can still reveal location through IP addresses, WiFi, Bluetooth, and mobile network signals
  • Apple rolled out an iPhone update that reduces precise location sharing with cell providers
  • The Apple feature keeps emergency call location data available and is limited to Boost Mobile users for now
  • Law enforcement can still seek location data through E911 requests, warrants, or tower dumps
  • Location histories and system services can be reviewed and cleared on both Android and iPhone
  • Spyware, ad tracking, and third party data sales can expose location data even when GPS is restricted

Quick Facts

  • What: Efforts to limit phone location tracking and data sharing
  • Where: On Android and iPhone devices in the United States
  • Why: To reduce exposure of precise location data to advertisers and investigators
  • Who: Smartphone users, Apple, carriers, and law enforcement
  • When: Recently, including an Apple update in late January

Coverage Timeline: 2936 Days

1Jan 24 '181Nov 12 '241Feb 6 '26

Featured Article

Forbes / Thomas Brewster 02-06-2026
Apple limits precise location data shared with cell providers in the United States in late January 2026 to reduce exposure to advertisers and investigators.

Additional Articles

⭐⭐⭐⭐⭐

Consumer Reports / Melanie Pinola 01-24-2018
Consumers limit location data now on Android and iPhone devices to reduce tracking.

⭐️⭐️

Panda Security Mediacenter 11-12-2024
Panda Security describes, in a 2020s online guide, how smartphone owners worldwide can curb location tracking and spyware-based monitoring through configuration changes and security tools.