All HTTP requests include your ip address, you don't "consent" to giving it to anybody. You can geolocate somebody based on ip address but it won't be very accurate
This problem solved, but whenever you change your network or IP and then periodically, your phone will report to Firebase, so you can receive push notifications.
You can block those with software that simulates a local VPN with a filter, but you won't get any more push notifications. Now push notifications are not just the ones you see. Some apps use invisible ones to get infos they need to work.
Not the magic bullet people think they are. Oh, and you can't turn it off, so you'll have to take the loss in network speed on absolutely everything. And better know how to configure each device so it doesn't go ahead and check leak your IP anyways, which also restricts choice of devices you use. Cause remember, if any device on your network ever connects to the net without the VPN, then your anonymity just went out the window.
As a quick note - location shared was not very precise (but still in the same postal index), I guess due to the fact that iPhone was connected to WiFi and had no SIM installed.
If it was LTE, I bet the lat/lon would be much more precise.
And this was with location services off. How precise is a "postal index" in the author's country (presumably Spain) I wonder.
it's been known for a long time that there is enough identifiable information in a "normal" person's internet usage to identify exactly who and where you are and what you are likely doing just from metadata analysis and public domain information
Does this happen to users in the EU? It’s highly illegal to gather data without consent here obviously. Even processing other data to derive location (which is personally identifiable information) means processing data for purpose that’s different to one that was consented to (if they tried to get any consent at all). There are big companies implicated here so it’d be easy to fine them into submission in jurisdictions that allow it.
"uc": "1", // User consent for tracking = True; OK what ?!
My guess is that developers are pretending to get user consent to get more money from the ads. Unity could be encouraging this somehow but good luck proving that.
Route all or traffic through tor. Never log into anything. Never use the same identity twice. Ahh and live in a hut in the woods never going to shops or cities that have security cameras.
Using firefox in strict mode with ublock origin, cookie auto-delete, and a VPN to change your IP every now and then should stop location tracking and cross-site tracking. Sites will still know you've visited them and what pages you've been to in that session, but that is impossible to stop.
The main thing is don't use apps, they can collect tons of data and tie it directly to your physical device, and run in the background while not actively using it.
Using a web browser is really the safest option I can think of because you have control over almost everything.
I imagine an ad blocker could prevent this data going out, unless the hosts were generic and the game/app simply won't work without allowing those connections. I've never seen an app be [obviously] broken from my ad blocker but I am interested in running a similar experiment to see just how much data is going out.
Use a custom DNS and/or hosts file. You can cut them off the grid by blocking data upload to SSP. Don't install many apps, for games that can be played offline, play them offline.
EDIT: AdGuard DNS doesn't block the 1st URL (o.isx...) in the page. 2nd URL is blocked.
That’s crazy. As it’s (almost) impossible to prevent those data to be sent from the phone, would it be possible to make the data useless ? For instance by sending loads of fake json payloads for some ids ? Then enjoy my data which says at the same time that I’m in Vancouver, Lisbon, Paris, on my low cost and super expensive phone, with volume at max and zero,…
Not possible I guess ?