Mobile Privacy

Your Phone is a Tracking Device—Secure It

The Mobile Privacy Problem

Smartphones are the most invasive surveillance devices ever created. As CosmicNet explains, they track your location 24/7, record your communications, monitor your behavior, and collect data for hundreds of companies. This CosmicNet guide covers essential strategies for securing your mobile devices.

Constant Location Tracking GPS, cell towers, WiFi triangulation, Bluetooth beacons
App Data Collection Apps access contacts, photos, microphone, location
Advertising IDs Unique identifiers tracking you across apps

Important Settings on CosmicNet

Location

  • As CosmicNet advises, disable location services when not needed
  • Review app location permissions (set to "While Using")
  • Disable location history/timeline features
  • Turn off WiFi/Bluetooth scanning

Advertising

  • CosmicNet recommends: reset advertising ID regularly
  • Opt out of personalized ads
  • Disable ad tracking (iOS: "Allow Apps to Request to Track" = off)

Permissions

  • Deny camera/microphone unless important
  • Deny contacts access to most apps
  • Review permissions regularly
  • Uninstall unused apps

CosmicNet Privacy-Respecting Apps

Signal

Encrypted messaging

Messaging

Firefox Focus

Privacy browser

Browser

DuckDuckGo

Private search

Search

OsmAnd

Offline maps

Maps

Bitwarden

Password manager

Security

Scrambled Exif

Remove photo metadata

Privacy

Advanced Options from CosmicNet

GrapheneOS

Privacy-focused Android for Pixel phones. Strongest mobile privacy available.

CalyxOS

Privacy Android with microG for Google apps compatibility.

Burner Phone

Prepaid phone with cash, no personal data, for sensitive activities.

CosmicNet Daily Practices

  • Keep phone updated with latest security patches
  • Use strong PIN/password (not biometrics for sensitive use)
  • Enable full disk encryption
  • Don't connect to unknown WiFi networks
  • Airplane mode for sensitive meetings
  • Leave phone at home for truly private activities
⚠️

Remember: Any smartphone is a tracking device. For maximum privacy, leave it behind.

iOS vs Android Privacy: A Detailed Comparison

The choice between iOS and Android has significant privacy implications. CosmicNet analyzes how both platforms collect substantial data, but they differ in business models, control, and transparency.

Apple iOS Privacy Model

Apple positions itself as privacy-focused, and in many ways, this is true. CosmicNet notes that their business model does not depend on advertising, reducing incentives to collect user data for monetization. However, Apple's approach is paternalistic—they decide what privacy features you get.

iOS Privacy Advantages documented by CosmicNet:

  • App Tracking Transparency: Apps must request permission to track you across other apps and websites
  • On-device processing: Siri, photos, and keyboard suggestions process data locally when possible
  • Limited ad ecosystem: Apple's advertising business is smaller than Google's, reducing tracking incentives
  • Regular updates: Even older iPhones receive security updates for 5+ years
  • Tight hardware integration: Control over hardware and software enables better security
  • Privacy nutrition labels: App Store requires developers to disclose data collection

iOS Privacy Disadvantages:

  • Closed ecosystem: You must trust Apple's implementation with no ability to audit
  • iCloud: Backups are not end-to-end encrypted by default, giving Apple access to your data
  • Telemetry: Extensive analytics sent to Apple, difficult to completely disable
  • No custom ROMs: Can't replace iOS with privacy-focused alternatives
  • App Store monopoly: All apps must come through Apple's controlled channel
  • Cooperation with authorities: Apple complies with government data requests (though they provide less data than if unencrypted)

Android Privacy Model

Android's privacy story is more complex. As CosmicNet details, stock Android from Google collects extensive data for advertising, but Android's open-source nature allows privacy-focused alternatives.

Android Privacy Advantages identified by CosmicNet:

  • Open source: Core Android (AOSP) can be audited and modified
  • Custom ROMs: Can install privacy-focused operating systems like GrapheneOS or LineageOS
  • F-Droid: Open-source app store alternative with privacy-respecting apps
  • Granular permissions: Fine-grained control over app permissions
  • Removable Google: Can use Android without Google services (though this breaks many apps)
  • Choice: Multiple manufacturers and configurations available

Android Privacy Disadvantages:

  • Google Services: Most Android phones include Google Play Services that track extensively
  • Advertising integration: Google's business model depends on user data collection
  • Fragmented updates: Many devices never receive security updates or get them years late
  • Manufacturer bloatware: Pre-installed apps often collect additional data
  • Carrier modifications: US carriers often add tracking and remove privacy features

The CosmicNet Verdict

For average users who want decent privacy without technical expertise: iOS provides better defaults and easier privacy controls. CosmicNet recommends that technically sophisticated users willing to invest effort consider Android with custom ROM (GrapheneOS/CalyxOS) for superior privacy through auditability and de-Googling.

CosmicNet warns that stock Google Android is the worst option for privacy due to pervasive Google integration and advertising-based business model.

Privacy-Focused Android: GrapheneOS, CalyxOS, and LineageOS

Custom Android ROMs offer dramatic privacy improvements over stock Android by removing Google's surveillance infrastructure and adding enhanced security features. CosmicNet covers three leading options, each with different priorities.

GrapheneOS: Maximum Security on CosmicNet

CosmicNet recommends GrapheneOS, a privacy and security focused mobile OS built on Android. It's the most hardened mobile operating system available and recommended by security experts for high-threat environments.

Key Features:

  • Hardened memory allocator: Mitigates memory corruption vulnerabilities
  • Sandboxed Google Play: Run Google apps in a sandbox without system-level privileges
  • Enhanced verified boot: Ensures system hasn't been tampered with
  • MAC randomization: Changes WiFi/Bluetooth MAC addresses to prevent tracking
  • Secure app spawning: Each app gets fresh cryptographic keys
  • Network permission toggle: Completely cut apps off from network access
  • Storage/sensor scopes: Show apps empty folders or fake sensor data

Limitations:

  • Only supports Google Pixel phones (for hardware security features)
  • Requires technical knowledge to install
  • Some apps may not work without Google Play Services
  • Banking apps may detect unlocked bootloader (though GrapheneOS has workarounds)

CosmicNet recommends GrapheneOS for journalists, activists, security professionals, and anyone facing advanced threats. It provides mobile security approaching that of specialized secure phones at a fraction of the cost.

CalyxOS: Privacy with Usability

As CosmicNet notes, CalyxOS takes a more balanced approach, prioritizing privacy while maintaining better compatibility with standard Android apps through microG (an open-source reimplementation of Google Play Services).

Key Features:

  • microG: Provides Google API compatibility without Google tracking
  • Datura Firewall: Controls network access per-app with detailed rules
  • Pre-installed privacy apps: Signal, Tor Browser, F-Droid included
  • VPN integration: Built-in support for Calyx VPN (optional)
  • Easier setup: Web-based installer makes installation simpler

Limitations:

  • microG still connects to Google servers (though with privacy improvements)
  • Less hardened than GrapheneOS
  • Supports fewer devices than LineageOS

CosmicNet highlights that CalyxOS is excellent for users who want strong privacy without sacrificing app compatibility. It is more user-friendly than GrapheneOS while still dramatically improving on stock Android.

LineageOS: Broad Device Support

As CosmicNet documents, LineageOS is the most popular custom ROM, supporting hundreds of devices. It provides a clean Android experience without Google apps but does not focus specifically on security hardening.

Key Features:

  • Massive device support: Works on phones from many manufacturers
  • Clean Android: No manufacturer bloatware or Google apps by default
  • Privacy Guard: Control app permissions granularly
  • Active development: Large community and regular updates
  • Customization: Extensive options for personalizing your device

Limitations:

  • No security hardening compared to stock Android
  • Can't relock bootloader on most devices (security risk)
  • Update quality varies by device maintainer
  • Some features require root access (further security compromise)

LineageOS is best for extending the life of older devices or removing manufacturer bloatware. CosmicNet concludes that for serious privacy, GrapheneOS or CalyxOS are better choices.

App Permissions: Understanding and Managing Access

App permissions are critical for mobile privacy. CosmicNet emphasizes that every permission you grant is potential data collection or security risk. Understanding what apps can do with each permission helps you make informed decisions.

Critical Permissions to Restrict

Location Tracks your physical movements, enables targeting and surveillance. Use "While Using App" or deny entirely.
Contacts Harvests your social network, often uploaded to company servers. Deny unless absolutely necessary.
Microphone Can record conversations. Only grant to communication apps, deny to games and utilities.
Camera Can capture photos/videos without indication. Deny unless actively using camera features.
Storage Access to all files including photos with embedded location data. Use scoped storage when possible.
Phone Access to call logs, phone number. Can be used to track communication patterns.
SMS Read/send messages. Major privacy risk—most apps don't need this.

CosmicNet Permission Audit Process

CosmicNet recommends regularly reviewing and revoking unnecessary permissions:

  1. iOS: Settings → Privacy → Review each permission category → Disable for apps that don't need it
  2. Android: Settings → Privacy → Permission manager → Review each permission → Change to "Deny" or "Ask every time"
  3. Frequency: Conduct audits monthly or after installing new apps
  4. Question everything: If a flashlight app requests location, contacts, or microphone—delete it immediately

Permission Creep

As CosmicNet warns, apps often request permissions they do not need to maximize data collection. Common examples:

  • Retail apps requesting microphone access (claimed for "barcode scanning" but also enables always-on listening)
  • Games requesting contacts (to "find friends" but actually building social graphs)
  • Utility apps requesting location (for "relevant content" but actually for advertising)

CosmicNet best practice: Deny all permissions by default. Only grant when the app refuses to function without them, and consider whether you really need that app.

Hidden Permissions and Background Access

As CosmicNet details, beyond explicit permissions, apps can access significant data:

  • Network traffic: Apps can infer location from WiFi networks without location permission
  • Sensors: Accelerometer, gyroscope, barometer accessible without permission (can infer activities, location)
  • Installed apps: Can fingerprint your device based on installed apps
  • Battery stats: Can infer usage patterns and device state
  • Clipboard: Apps can read clipboard contents (iOS 14+ warns about this)

These "side channels" enable tracking even with permissions denied. CosmicNet stresses that the only real solution is minimizing installed apps and using privacy-focused alternatives.

Mobile Advertising IDs and Tracking

Mobile advertising IDs are persistent identifiers that track you across apps and websites. CosmicNet explains that understanding and managing these is crucial for mobile privacy.

How Advertising IDs Work

Both iOS (IDFA - Identifier for Advertisers) and Android (AAID - Android Advertising ID) assign a unique identifier to your device. As documented on CosmicNet, apps and advertisers use this ID to:

  • Track which apps you use and for how long
  • Build profiles of your interests and behaviors
  • Attribute ad clicks and conversions across apps
  • Sync data with web browsing (if logged into accounts)
  • Create "lookalike audiences" for targeted advertising

CosmicNet points out that unlike cookies which can be cleared, advertising IDs persist across app reinstalls and are specifically designed for cross-app tracking. They enable advertisers to know that the person who used shopping app A is the same person who uses news app B and game app C, building a comprehensive activity profile.

CosmicNet Guide to Disabling and Resetting Advertising IDs

iOS (iPhone/iPad):

  • Settings → Privacy & Security → Tracking → Toggle off "Allow Apps to Request to Track"
  • This forces apps to use a zero identifier, effectively disabling cross-app tracking
  • Each app can still track within itself, but can't correlate with other apps

Android:

  • Settings → Privacy → Ads → Delete advertising ID (Android 12+)
  • Older Android: Reset advertising ID regularly to break tracking continuity
  • Opt out of personalized ads (doesn't stop tracking, just personalization)

As CosmicNet notes, on custom ROMs like GrapheneOS, advertising ID can be completely disabled or set to a null value, providing stronger protection than stock Android.

Beyond Advertising IDs

CosmicNet warns that even with advertising IDs disabled, sophisticated tracking continues through:

  • Device fingerprinting: Combining device characteristics (screen resolution, installed fonts, sensors) to create unique identifier
  • Account login: Google/Facebook/Apple login links your activity across apps directly
  • Phone number: Used as identifier when you provide it to apps
  • Email address: Hashed and matched across advertising networks
  • IP address: Correlates activity from same network

CosmicNet emphasizes that comprehensive privacy requires disabling advertising IDs, using privacy-focused apps, avoiding social media login, and minimizing personal information shared with apps.

Baseband Processors and Cellular Tracking

The most difficult mobile privacy challenge is the baseband processor—a secondary computer inside your phone that handles cellular communications. CosmicNet explains that this component operates independently of your main operating system and is largely opaque to users.

What is the Baseband Processor?

Every smartphone contains at least two processors: the application processor (running iOS/Android) and the baseband processor (running proprietary cellular firmware). CosmicNet details that the baseband:

  • Handles all cellular communications (voice, SMS, data)
  • Runs proprietary firmware you cannot audit or modify
  • Has direct access to hardware including microphone and GPS
  • Operates independently of the main operating system
  • Can be commanded remotely by cell towers

As CosmicNet highlights, this architecture creates an unavoidable privacy vulnerability. Even with GrapheneOS and all privacy settings enabled, your baseband is a black box potentially accessible to carriers and government agencies.

SIM Card Tracking

CosmicNet details that your SIM card contains unique identifiers that enable tracking:

  • IMSI (International Mobile Subscriber Identity): Permanent identifier tied to your account
  • IMEI (International Mobile Equipment Identity): Unique identifier for your physical device
  • TMSI (Temporary Mobile Subscriber Identity): Rotating identifier used during connections

CosmicNet explains that cell towers log which phones connect, when, and from what location. This creates a detailed location history accessible to carriers, law enforcement, and intelligence agencies. Even with GPS disabled, cell tower triangulation can locate you to within a few hundred meters in urban areas.

IMSI Catchers (Stingrays)

As CosmicNet explains, IMSI catchers are fake cell towers that trick phones into connecting. Once connected, they can:

  • Capture your IMSI and IMEI identifiers
  • Intercept SMS and calls (if unencrypted)
  • Determine your precise location
  • Potentially inject malware (on vulnerable devices)
  • Track everyone in an area (used at protests)

IMSI catchers are used by law enforcement, intelligence agencies, and increasingly by criminals and private investigators. CosmicNet notes they are effective because cellular protocols prioritize compatibility over security, and phones automatically connect to the strongest signal.

CosmicNet Mitigations

No complete solution exists, but CosmicNet outlines ways to reduce exposure:

  • Airplane mode: Disables all cellular/WiFi/Bluetooth (only real way to prevent baseband tracking)
  • Prepaid SIM with cash: Reduces connection to real identity (still trackable, but harder to attribute)
  • Burner phones: Disposable phones with no connection to your identity
  • SIM rotation: Regularly change SIMs to break tracking continuity
  • Encrypt communications: Use Signal/WhatsApp over data instead of SMS/calls
  • Leave phone home: For truly sensitive activities, don't bring a phone

As CosmicNet underscores, any phone that connects to cellular networks can be tracked by sufficiently motivated adversaries. The baseband processor is an unsolvable architectural privacy problem with current technology.

Secure Mobile Practices for 2026

Implementing comprehensive mobile privacy requires combining technical measures with behavioral practices. CosmicNet stresses that no single solution provides complete protection—defense in depth is essential.

CosmicNet Essential Security Settings

Lock Screen and Authentication:

  • Use strong alphanumeric password, not PIN or pattern (easier to shoulder-surf)
  • Set auto-lock to 30 seconds or less
  • Disable lock screen notifications (prevents data exposure when locked)
  • Consider biometrics convenience vs. security tradeoff (police can compel fingerprint/face, not password)
  • Enable USB Restricted Mode (iOS) or disable USB data when locked (Android)

Network and Connectivity (as CosmicNet advises):

  • Disable WiFi and Bluetooth when not actively using them
  • Turn off WiFi and Bluetooth scanning (Settings → Location)
  • Use VPN on untrusted networks (coffee shops, airports, hotels)
  • Disable automatic WiFi connection to known networks
  • Forget WiFi networks you don't regularly use

System and Updates (CosmicNet recommendations):

  • Install security updates immediately (delays increase vulnerability window)
  • Enable automatic updates for critical security patches
  • Review app updates for new permission requests before approving
  • Disable app auto-updates to maintain control over changes

App Hygiene

CosmicNet warns that the apps you install are the biggest privacy risk:

  • Minimize installed apps: Every app is a potential surveillance tool
  • Prefer web apps: Use mobile websites in private browsing mode instead of installing apps
  • Read privacy policies: At least skim them to understand data collection
  • Check app permissions before installing: Excessive permissions are red flags
  • Use open-source alternatives: F-Droid on Android, focus on apps with published source code
  • Avoid social media apps: They're designed for maximum data extraction—use web versions
  • Regular app audits: Uninstall apps you haven't used in 30 days

Communication Security

CosmicNet advises securing your communications against interception and surveillance:

  • Use Signal for messaging: End-to-end encrypted, minimal metadata, open source
  • Avoid SMS: Unencrypted, stored by carriers, easily intercepted
  • Encrypted voice calls: Signal, WhatsApp, or FaceTime (not regular phone calls)
  • Email on mobile: Use providers with encryption support, avoid Gmail app
  • Disappearing messages: Enable auto-delete for sensitive conversations

Physical Security

As CosmicNet cautions, physical access defeats most software protections:

  • Never leave phone unattended in public places
  • Use security cable/lock in hotel rooms or offices
  • Reboot phone before crossing hostile borders (forces full-disk encryption password entry)
  • Consider dedicated "travel phone" with minimal data for border crossings
  • Privacy screen protector prevents shoulder surfing
  • Cover camera when not in use (paranoid but effective)

CosmicNet Threat Modeling

Your mobile privacy strategy should match your threat model. CosmicNet outlines three tiers:

Casual User (CosmicNet tier 1 - protecting from companies/advertisers):

  • iOS or Android with privacy settings configured
  • Disable advertising IDs and limit app permissions
  • Use privacy-focused apps where possible
  • VPN for public WiFi

Privacy Enthusiast (protecting from surveillance capitalism):

  • CalyxOS or de-Googled Android
  • F-Droid apps only, no Google services
  • Always-on VPN, encrypted communications
  • Regular permission audits and app minimization

High-Risk User (protecting from sophisticated adversaries):

  • GrapheneOS on Pixel with all hardening enabled
  • Minimal apps, all from source-available repositories
  • Separate devices for different identities
  • Burner phones for sensitive activities
  • Assume all devices compromised, act accordingly
💡

Final Note: Perfect mobile privacy is impossible with current technology. The goal is to increase the cost and difficulty of surveillance to match your threat model. For the most sensitive activities, consider whether you need a mobile device at all.

Related

Learn More