You are more familiar with your cell phone that you realize. Tracking is being done unconsciously on a daily basis and where you go and what you browse the length of time spending on certain apps. As much as a tracking would help in navigation, recommendations and even security, much of the trackings are much more than the expectations of most users. It is not merely a data collection but its invisibility that is the actual problem. The majority of people never check their privacy settings until it begins to raise some kind of suspicion. They can make you think that you possess some time of digital privacy once again and where to locate your own personal information as well as what to regulate.
Location Access

Location tracking works as one of the most common and the most revealing data collection. It is not required that most of the applications require location access. Using the apps, it is possible to ensure that they are not tracking you at all times, when they are in use or not to reduce the tracking and conserve the battery.
App Permissions

permissions are usually more than those required by the applications. The access to photos or storage space, as well as contacts, can be used to create detailed profiles. The constant review of the permissions is necessary to ensure that the apps can access only what is absolutely required.
Location History

A list of the places visited can be stored on the phones. This data can be in the form of months or years. The loss and re-examination of location history will reduce the historical trail along with the archived individual information on movement.
Background Activity

There are applications which continue to run even when they are closed. The ability of these background processes to accumulate data quietly is possible. The battery usage habits are apt to reveal what applications are in operation even when you are not in operation.
Ad Tracking

The IDs provide the opportunity to personalize your ads based on behavior. This does not record your name, however, it keeps an eye on habits. Targeting advertising will be reduced to lossage or restocking advertisements in apps.
Bluetooth Signals

Bluetooth is also applied not only on headphones. It can be used in proximity tracking within the stores or any other places of the population. This will limit unwarranted data transfers because the device can be turned off when it is not needed.
Privacy Dashboard

The existing phones have privacy dashboard to recap the apps that were using sensitive information. The tools provide the visibility of tracking and help users to recognize the presence of abnormal or excessive activity on a short time basis.
Unused Apps

Open Apps that are not used may be permitted. These applications lost can monitor the information without raising any alert whatsoever. Deleting the apps which are not used reduces privacy and also utilizes less space.
Data Usage

The tracking or tracking of the background can be indicated by abrupt peaks in mobile data usage. The use of the data is tracked to highlight the apps that may be sharing an excessive amount of data than required.
Camera and Mic

Phones have indications on whether the camera is being used or the microphone being used. Whenever they are popped on abruptly, this is a reminder that it is time to verify application rights immediately.
System Updates

The operating system updates are often seen to improve privacy. Delay in upgrading your phone can put your phone at a risk of experiencing outdated security weaknesses or stalking behaviors.

