Android · Recovery Guide

    How to Stop Location Tracking and Stalking on Android

    If you think your location is being tracked without your consent, here are some actionable steps to regain your privacy and security on your Android device.

    Review App Permissions and Location Access

    Many apps request access to your location for various reasons. It's crucial to review which apps have this permission and revoke it if it's not absolutely necessary for the app to function.

    1. Open your device's Settings app.
    2. Navigate to Location (sometimes found under Privacy or Security & privacy).
    3. Tap App location permissions to see a list of apps that have requested location access.
    4. Review the list. For any app that doesn't need your location to work properly (e.g., a simple calculator app), tap on the app's name and choose Don't allow or Ask every time. On some Samsung devices, this might be under Permissions then Location within the app's settings.
    5. Pay close attention to apps listed under "Allowed all the time". This grants continuous location access, which is rarely needed.

    Regularly reviewing app permissions is a good habit, not just for location, but for all sensitive data.

    Check for Device Administrator Apps and Unknown Tracking Apps

    Malicious tracking apps can sometimes gain elevated privileges, known as Device Administrator status, making them harder to remove. You'll need to revoke this access before uninstalling them.

    1. Go to Settings and search for "Device admin apps" or "Device administrators". This is often found under Security & privacy or Biometrics and security on Samsung devices.
    2. Review the list of apps. If you see any suspicious apps you don't recognise, or apps that shouldn't have this level of control, tap on its name and then Deactivate this device admin app.
    3. Once deactivated, go to SettingsApps (or Apps & notifications).
    4. Find the suspicious app in the list and uninstall it. If you can't find it, consider if it might be disguised with a generic name.

    Do not deactivate device administrator access for legitimate apps like "Find My Device" unless you are absolutely sure it is compromised, as this will hinder your ability to locate a lost device.

    Review 'Find My Device' and Other Location Sharing Services

    While helpful for locating a lost phone, 'Find My Device' and similar services can also be misused for tracking. Ensure only trusted individuals have access to your location.

    1. Open Settings and go to Security & privacy (or Security and lock screen).
    2. Look for Find My Device (on Samsung, this might be under Biometrics and securityFind My Mobile). Ensure this feature is enabled only if you intend to use it for legitimate purposes.
    3. Check any family sharing or 'trusted contacts' settings in apps like Google Maps. In Google Maps, tap your profile picture → Location sharing and review who you are sharing your real-time location with. Stop sharing with anyone you don't explicitly trust.
    4. If you've previously granted access via a shared Wi-Fi network or smart home devices, review the settings for those services to ensure your location data isn't being inadvertently shared.

    Remember that 'Find My Device' is a Google service, while Samsung's equivalent is 'Find My Mobile'. Both offer similar functionalities.

    Perform a Factory Reset and Secure Your Accounts

    If you suspect sophisticated or persistent tracking, a factory reset might be necessary to completely wipe your device clean. Afterwards, it's vital to secure your online accounts to prevent re-infection.

    1. Back up your important data first! This will delete everything on your phone.
    2. Go to SettingsSystemReset optionsErase all data (factory reset). On Samsung devices, this is often under General managementResetFactory data reset.
    3. Once the reset is complete, set up your phone as new. Do not restore from an old backup if you suspect it contains malicious software, as this could reintroduce the problem.
    4. Immediately change passwords for all important accounts: email, social media, banking, and any cloud services. Enable Two-Factor Authentication (2FA) wherever possible.
    5. Be very selective about which apps you reinstall. Only install essential apps from trusted sources (the Google Play Store) and grant permissions judiciously.

    A factory reset is a last resort, but it's the most effective way to eliminate deeply entrenched malware. Be prepared to lose all data not backed up.

    More from Device Security

    No image

    How to Block Scam Calls and Filter Spam SMS on Android

    How to Block Scam Calls and Filter Spam SMS on Android

    No image

    How to Detect Spyware or Stalkerware on an iPhone

    How to Detect Spyware or Stalkerware on an iPhone

    No image

    How to Stop Apps Spying Through Your iPhone Camera and Microphone

    How to Stop Apps Spying Through Your iPhone Camera and Microphone