this post was submitted on 21 Nov 2025
89 points (98.9% liked)

privacy

7387 readers
3 users here now

Big tech and governments are monitoring and recording your eating activities. c/Privacy provides tips and tricks to protect your privacy against global surveillance.

Partners:

founded 3 years ago
MODERATORS
 

How I tracked myself down using leaked location data in the in-app ads, and what I found along the way.

top 15 comments
sorted by: hot top controversial new old
[–] adespoton@lemmy.ca 24 points 1 month ago (2 children)

Am I the only person who doesn’t use apps with in-app ads?

[–] Chais@sh.itjust.works 5 points 1 month ago* (last edited 1 month ago)

I avoid them if possible and block the ads if not.

[–] Onomatopoeia@lemmy.cafe 4 points 1 month ago (1 children)

Part of why I root is to block them using Ad-away.

[–] Auli@lemmy.ca 2 points 1 month ago

I just block with custom DNS.

[–] FauxLiving@lemmy.world 18 points 1 month ago* (last edited 1 month ago)

Great article. It should be noted that your web browser allows websites to do this with javascript.

Also, since this tracking isn't really trying to hide, people have compiled lists of the dns names of the destinations of these requests.

If you host a DNS server and you take that list and return NULL for everyone on the list. Then clients on your network who have ad tracking software will try to look up the destination to send your data and your DNS will tell them that there is nowhere to send the data and so the data isn't delivered. So, all of the smart TVs, game consoles, refrigerators, toasters and doorknobs which automatically send data but you cannot configure will fail because they use DNS also.

This sounds complicated to do, but I'm just describing Pi-hole (https://pi-hole.net/). It only takes a few minutes to setup the container and change your router's DHCP configuration in order to give out the address of the Pi-hole DNS server.

Assuming you're on Linux, which you are because you're a reader of a c/Privacy... right?

[–] Tundra@sh.itjust.works 9 points 1 month ago* (last edited 1 month ago)

You can check an app for embedded trackers & get a list of permissions here:

https://reports.exodus-privacy.eu.org/en/

[–] not_me@piefed.social 4 points 1 month ago (2 children)
[–] DoctorPress@lemmy.zip 10 points 1 month ago (2 children)

No OS gonna protect you from apps spying you. The solution is to not use the said apps.

[–] girsaysdoom@sh.itjust.works 3 points 1 month ago

Google Play services likely does this too, so to actually protect yourself from this spyware you will need to use either microG or containerized Google Play services like how GrapheneOS has implemented.

[–] not_me@piefed.social 0 points 1 month ago* (last edited 1 month ago) (1 children)

If you start with a xiaomi, then a motorola and finally end with a custom rom grapheneos smartphone, your number of trackers and bloatware will have dropped by more than 97%

[–] Auli@lemmy.ca 1 points 1 month ago

GrapheneOS is not magic.

[–] PatrickYaa@feddit.org 7 points 1 month ago (1 children)
[–] FauxLiving@lemmy.world 1 points 1 month ago

Everyone will have a next phone though.

[–] Sunshine@lemmy.ca 4 points 1 month ago

Bad Android apps with ads: you’re the product mate.

[–] NanoooK@sh.itjust.works 4 points 1 month ago

Very interesting, but also scary.