{"id":2561,"date":"2011-04-21T09:43:01","date_gmt":"2011-04-21T08:43:01","guid":{"rendered":"http:\/\/blog.intego.com\/?p=2561"},"modified":"2011-04-21T09:43:01","modified_gmt":"2011-04-21T08:43:01","slug":"iphone-records-user-locations-whats-the-big-deal","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/","title":{"rendered":"iPhone Records User Locations: What&#8217;s the Big Deal?"},"content":{"rendered":"<p>A developer has published some information about a discovery made in backups of iOS devices. It turns out that these devices <a href=\"http:\/\/petewarden.github.com\/iPhoneTracker\/\">record where you have been<\/a>. <\/p>\n<p>Some reporters are <a href=\"http:\/\/www.guardian.co.uk\/technology\/2011\/apr\/20\/iphone-tracking-prompts-privacy-fears\">suggesting that the sky is falling<\/a>, and quoting numerous people who agree with them. The Guardian web site even has a big graphic saying &#8220;Privacy Alert&#8221; leading to the article linked just above.<\/p>\n<p>Is this really a big deal? This should actually come as no surprise to anyone who uses Location Services on the iPhone, or other iOS devices. If you have an iPhone, or a 3G iPad, the device uses Location Services to determine, well, your location. This is useful if you&#8217;re using the Maps app, or any other application that needs your location. GPS coordinates are used to geotag photos you take with the device, but <a href=\"http:\/\/www.willclarke.net\/?p=247\">this article<\/a> suggests that the device does not store GPS data, but rather the locations of cellphone towers.<\/p>\n<p>To be honest, we see no reason why this information is stored in the backups of the device on your computer, or why it&#8217;s not progressively deleted from the iPhone. And, while <a href=\"http:\/\/www.cultofmac.com\/iphone-tracking-is-all-a-big-mistake-says-researcher\/91387\">this Cult of Mac article says<\/a> &#8220;In many cases, users are able to access almost a year\u2019s worth of data stretching all the way back to the date when iOS 4 was installed on their device,&#8221; we have seen some iPhones that have location data from well before the release of iOS 4. <\/p>\n<p>It&#8217;s worth pointing out that <a href=\"https:\/\/alexlevinson.wordpress.com\/2011\/04\/21\/3-major-issues-with-the-latest-iphone-tracking-discovery\/\">this is not new<\/a>. Forensics researcher Alex Levinson has written about this in the past. He points out that Apple is <b>not<\/b> collecting this data, or at least as far as we know. (One security researcher <a href=\"http:\/\/www.f-secure.com\/weblog\/archives\/00002145.html\">thinks that Apple is indeed collecting it<\/a>, and explains why.) <\/p>\n<p>It seems that the most likely use for storing this data is to remember where cell towers are located so the device can find the more quickly when users return to locations they have previously visited. If this is the case, then it is likely that other phones store this information as well, though if they don&#8217;t back up their data in the same way, it may be harder to find.<\/p>\n<p>If you&#8217;re worried about this, you can do two things. If you really want to get rid of the data, you can use <a href=\"http:\/\/singe.za.net\/blog\/archives\/1029-Quick-note-on-the-iPhone-Location-Tracking-Disclosure.html\">this procedure<\/a>. It&#8217;s not simple, but it will overwrite the data. (The iOS device stores the data, so deleting your backup won&#8217;t get rid of it.)<\/p>\n<p>Second, if you&#8217;re worried about the presence of this data on your computer, in the files backed up from your iOS device, check <b>Encrypt iPhone Backup<\/b> on iTunes&#8217; Summary screen when the device is connected. Enter a password, and no one should be able to access your location information if they get access to your computer. <\/p>\n<p>So, there&#8217;s no need to make a big deal about this. This is a feature, not a bug. It would certainly be better if Apple didn&#8217;t store this information, but there is no evidence of nefarious intentions here.<\/p>\n<p>Update: Surprise! Android <a href=\"https:\/\/github.com\/packetlss\/android-locdump\">tracks your location too<\/a>. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don&#8217;t think so.<\/p>\n","protected":false},"author":3,"featured_media":1955,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,5],"tags":[3151,69,9,119],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don&#039;t think so.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone Records User Locations: What&#039;s the Big Deal? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don&#039;t think so.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2011-04-21T08:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"246\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg\",\"width\":\"128\",\"height\":\"246\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/\",\"name\":\"iPhone Records User Locations: What's the Big Deal? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage\"},\"datePublished\":\"2011-04-21T08:43:01+00:00\",\"dateModified\":\"2011-04-21T08:43:01+00:00\",\"description\":\"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don't think so.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"iPhone Records User Locations: What&#8217;s the Big Deal?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"iPhone Records User Locations: What&#8217;s the Big Deal?\",\"datePublished\":\"2011-04-21T08:43:01+00:00\",\"dateModified\":\"2011-04-21T08:43:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage\"},\"wordCount\":519,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg\",\"keywords\":[\"Apple\",\"iOS\",\"iPhone\",\"Security Update\"],\"articleSection\":[\"Apple\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don't think so.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/","og_locale":"en_US","og_type":"article","og_title":"iPhone Records User Locations: What's the Big Deal? - The Mac Security Blog","og_description":"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don't think so.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/","og_site_name":"The Mac Security Blog","article_published_time":"2011-04-21T08:43:01+00:00","og_image":[{"width":"128","height":"246","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg","width":"128","height":"246"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/","name":"iPhone Records User Locations: What's the Big Deal? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage"},"datePublished":"2011-04-21T08:43:01+00:00","dateModified":"2011-04-21T08:43:01+00:00","description":"Researchers have discovered that the iPhone, and other iOS devices with 3G, record user locations. Is this a big deal? We don't think so.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"iPhone Records User Locations: What&#8217;s the Big Deal?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"iPhone Records User Locations: What&#8217;s the Big Deal?","datePublished":"2011-04-21T08:43:01+00:00","dateModified":"2011-04-21T08:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#webpage"},"wordCount":519,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg","keywords":["Apple","iOS","iPhone","Security Update"],"articleSection":["Apple","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-records-user-locations-whats-the-big-deal\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2010\/08\/iphone4.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Fj","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2561"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=2561"}],"version-history":[{"count":0,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/2561\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/1955"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=2561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=2561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=2561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}