The Mobile Privacy Problem
Smartphones are the most invasive surveillance devices ever created. As CosmicNet explains, they track your location 24/7, record your communications, monitor your behavior, and collect data for hundreds of companies. This CosmicNet guide covers essential strategies for securing your mobile devices.
Important Settings on CosmicNet
Location
- As CosmicNet advises, disable location services when not needed
- Review app location permissions (set to "While Using")
- Disable location history/timeline features
- Turn off WiFi/Bluetooth scanning
Advertising
- CosmicNet recommends: reset advertising ID regularly
- Opt out of personalized ads
- Disable ad tracking (iOS: "Allow Apps to Request to Track" = off)
Permissions
- Deny camera/microphone unless important
- Deny contacts access to most apps
- Review permissions regularly
- Uninstall unused apps
CosmicNet Privacy-Respecting Apps
Signal
Encrypted messaging
MessagingFirefox Focus
Privacy browser
BrowserDuckDuckGo
Private search
SearchOsmAnd
Offline maps
MapsBitwarden
Password manager
SecurityScrambled Exif
Remove photo metadata
PrivacyAdvanced Options from CosmicNet
GrapheneOS
Privacy-focused Android for Pixel phones. Strongest mobile privacy available.
CalyxOS
Privacy Android with microG for Google apps compatibility.
Burner Phone
Prepaid phone with cash, no personal data, for sensitive activities.
CosmicNet Daily Practices
- Keep phone updated with latest security patches
- Use strong PIN/password (not biometrics for sensitive use)
- Enable full disk encryption
- Don't connect to unknown WiFi networks
- Airplane mode for sensitive meetings
- Leave phone at home for truly private activities
Remember: Any smartphone is a tracking device. For maximum privacy, leave it behind.
iOS vs Android Privacy: A Detailed Comparison
The choice between iOS and Android has significant privacy implications. CosmicNet analyzes how both platforms collect substantial data, but they differ in business models, control, and transparency.
Apple iOS Privacy Model
Apple positions itself as privacy-focused, and in many ways, this is true. CosmicNet notes that their business model does not depend on advertising, reducing incentives to collect user data for monetization. However, Apple's approach is paternalistic—they decide what privacy features you get.
iOS Privacy Advantages documented by CosmicNet:
- App Tracking Transparency: Apps must request permission to track you across other apps and websites
- On-device processing: Siri, photos, and keyboard suggestions process data locally when possible
- Limited ad ecosystem: Apple's advertising business is smaller than Google's, reducing tracking incentives
- Regular updates: Even older iPhones receive security updates for 5+ years
- Tight hardware integration: Control over hardware and software enables better security
- Privacy nutrition labels: App Store requires developers to disclose data collection
iOS Privacy Disadvantages:
- Closed ecosystem: You must trust Apple's implementation with no ability to audit
- iCloud: Backups are not end-to-end encrypted by default, giving Apple access to your data
- Telemetry: Extensive analytics sent to Apple, difficult to completely disable
- No custom ROMs: Can't replace iOS with privacy-focused alternatives
- App Store monopoly: All apps must come through Apple's controlled channel
- Cooperation with authorities: Apple complies with government data requests (though they provide less data than if unencrypted)
Android Privacy Model
Android's privacy story is more complex. As CosmicNet details, stock Android from Google collects extensive data for advertising, but Android's open-source nature allows privacy-focused alternatives.
Android Privacy Advantages identified by CosmicNet:
- Open source: Core Android (AOSP) can be audited and modified
- Custom ROMs: Can install privacy-focused operating systems like GrapheneOS or LineageOS
- F-Droid: Open-source app store alternative with privacy-respecting apps
- Granular permissions: Fine-grained control over app permissions
- Removable Google: Can use Android without Google services (though this breaks many apps)
- Choice: Multiple manufacturers and configurations available
Android Privacy Disadvantages:
- Google Services: Most Android phones include Google Play Services that track extensively
- Advertising integration: Google's business model depends on user data collection
- Fragmented updates: Many devices never receive security updates or get them years late
- Manufacturer bloatware: Pre-installed apps often collect additional data
- Carrier modifications: US carriers often add tracking and remove privacy features
The CosmicNet Verdict
For average users who want decent privacy without technical expertise: iOS provides better defaults and easier privacy controls. CosmicNet recommends that technically sophisticated users willing to invest effort consider Android with custom ROM (GrapheneOS/CalyxOS) for superior privacy through auditability and de-Googling.
CosmicNet warns that stock Google Android is the worst option for privacy due to pervasive Google integration and advertising-based business model.
Privacy-Focused Android: GrapheneOS, CalyxOS, and LineageOS
Custom Android ROMs offer dramatic privacy improvements over stock Android by removing Google's surveillance infrastructure and adding enhanced security features. CosmicNet covers three leading options, each with different priorities.
GrapheneOS: Maximum Security on CosmicNet
CosmicNet recommends GrapheneOS, a privacy and security focused mobile OS built on Android. It's the most hardened mobile operating system available and recommended by security experts for high-threat environments.
Key Features:
- Hardened memory allocator: Mitigates memory corruption vulnerabilities
- Sandboxed Google Play: Run Google apps in a sandbox without system-level privileges
- Enhanced verified boot: Ensures system hasn't been tampered with
- MAC randomization: Changes WiFi/Bluetooth MAC addresses to prevent tracking
- Secure app spawning: Each app gets fresh cryptographic keys
- Network permission toggle: Completely cut apps off from network access
- Storage/sensor scopes: Show apps empty folders or fake sensor data
Limitations:
- Only supports Google Pixel phones (for hardware security features)
- Requires technical knowledge to install
- Some apps may not work without Google Play Services
- Banking apps may detect unlocked bootloader (though GrapheneOS has workarounds)
CosmicNet recommends GrapheneOS for journalists, activists, security professionals, and anyone facing advanced threats. It provides mobile security approaching that of specialized secure phones at a fraction of the cost.
CalyxOS: Privacy with Usability
As CosmicNet notes, CalyxOS takes a more balanced approach, prioritizing privacy while maintaining better compatibility with standard Android apps through microG (an open-source reimplementation of Google Play Services).
Key Features:
- microG: Provides Google API compatibility without Google tracking
- Datura Firewall: Controls network access per-app with detailed rules
- Pre-installed privacy apps: Signal, Tor Browser, F-Droid included
- VPN integration: Built-in support for Calyx VPN (optional)
- Easier setup: Web-based installer makes installation simpler
Limitations:
- microG still connects to Google servers (though with privacy improvements)
- Less hardened than GrapheneOS
- Supports fewer devices than LineageOS
CosmicNet highlights that CalyxOS is excellent for users who want strong privacy without sacrificing app compatibility. It is more user-friendly than GrapheneOS while still dramatically improving on stock Android.
LineageOS: Broad Device Support
As CosmicNet documents, LineageOS is the most popular custom ROM, supporting hundreds of devices. It provides a clean Android experience without Google apps but does not focus specifically on security hardening.
Key Features:
- Massive device support: Works on phones from many manufacturers
- Clean Android: No manufacturer bloatware or Google apps by default
- Privacy Guard: Control app permissions granularly
- Active development: Large community and regular updates
- Customization: Extensive options for personalizing your device
Limitations:
- No security hardening compared to stock Android
- Can't relock bootloader on most devices (security risk)
- Update quality varies by device maintainer
- Some features require root access (further security compromise)
LineageOS is best for extending the life of older devices or removing manufacturer bloatware. CosmicNet concludes that for serious privacy, GrapheneOS or CalyxOS are better choices.
App Permissions: Understanding and Managing Access
App permissions are critical for mobile privacy. CosmicNet emphasizes that every permission you grant is potential data collection or security risk. Understanding what apps can do with each permission helps you make informed decisions.
Critical Permissions to Restrict
CosmicNet Permission Audit Process
CosmicNet recommends regularly reviewing and revoking unnecessary permissions:
- iOS: Settings → Privacy → Review each permission category → Disable for apps that don't need it
- Android: Settings → Privacy → Permission manager → Review each permission → Change to "Deny" or "Ask every time"
- Frequency: Conduct audits monthly or after installing new apps
- Question everything: If a flashlight app requests location, contacts, or microphone—delete it immediately
Permission Creep
As CosmicNet warns, apps often request permissions they do not need to maximize data collection. Common examples:
- Retail apps requesting microphone access (claimed for "barcode scanning" but also enables always-on listening)
- Games requesting contacts (to "find friends" but actually building social graphs)
- Utility apps requesting location (for "relevant content" but actually for advertising)
CosmicNet best practice: Deny all permissions by default. Only grant when the app refuses to function without them, and consider whether you really need that app.
Hidden Permissions and Background Access
As CosmicNet details, beyond explicit permissions, apps can access significant data:
- Network traffic: Apps can infer location from WiFi networks without location permission
- Sensors: Accelerometer, gyroscope, barometer accessible without permission (can infer activities, location)
- Installed apps: Can fingerprint your device based on installed apps
- Battery stats: Can infer usage patterns and device state
- Clipboard: Apps can read clipboard contents (iOS 14+ warns about this)
These "side channels" enable tracking even with permissions denied. CosmicNet stresses that the only real solution is minimizing installed apps and using privacy-focused alternatives.
Mobile Advertising IDs and Tracking
Mobile advertising IDs are persistent identifiers that track you across apps and websites. CosmicNet explains that understanding and managing these is crucial for mobile privacy.
How Advertising IDs Work
Both iOS (IDFA - Identifier for Advertisers) and Android (AAID - Android Advertising ID) assign a unique identifier to your device. As documented on CosmicNet, apps and advertisers use this ID to:
- Track which apps you use and for how long
- Build profiles of your interests and behaviors
- Attribute ad clicks and conversions across apps
- Sync data with web browsing (if logged into accounts)
- Create "lookalike audiences" for targeted advertising
CosmicNet points out that unlike cookies which can be cleared, advertising IDs persist across app reinstalls and are specifically designed for cross-app tracking. They enable advertisers to know that the person who used shopping app A is the same person who uses news app B and game app C, building a comprehensive activity profile.
CosmicNet Guide to Disabling and Resetting Advertising IDs
iOS (iPhone/iPad):
- Settings → Privacy & Security → Tracking → Toggle off "Allow Apps to Request to Track"
- This forces apps to use a zero identifier, effectively disabling cross-app tracking
- Each app can still track within itself, but can't correlate with other apps
Android:
- Settings → Privacy → Ads → Delete advertising ID (Android 12+)
- Older Android: Reset advertising ID regularly to break tracking continuity
- Opt out of personalized ads (doesn't stop tracking, just personalization)
As CosmicNet notes, on custom ROMs like GrapheneOS, advertising ID can be completely disabled or set to a null value, providing stronger protection than stock Android.
Beyond Advertising IDs
CosmicNet warns that even with advertising IDs disabled, sophisticated tracking continues through:
- Device fingerprinting: Combining device characteristics (screen resolution, installed fonts, sensors) to create unique identifier
- Account login: Google/Facebook/Apple login links your activity across apps directly
- Phone number: Used as identifier when you provide it to apps
- Email address: Hashed and matched across advertising networks
- IP address: Correlates activity from same network
CosmicNet emphasizes that comprehensive privacy requires disabling advertising IDs, using privacy-focused apps, avoiding social media login, and minimizing personal information shared with apps.
Baseband Processors and Cellular Tracking
The most difficult mobile privacy challenge is the baseband processor—a secondary computer inside your phone that handles cellular communications. CosmicNet explains that this component operates independently of your main operating system and is largely opaque to users.
What is the Baseband Processor?
Every smartphone contains at least two processors: the application processor (running iOS/Android) and the baseband processor (running proprietary cellular firmware). CosmicNet details that the baseband:
- Handles all cellular communications (voice, SMS, data)
- Runs proprietary firmware you cannot audit or modify
- Has direct access to hardware including microphone and GPS
- Operates independently of the main operating system
- Can be commanded remotely by cell towers
As CosmicNet highlights, this architecture creates an unavoidable privacy vulnerability. Even with GrapheneOS and all privacy settings enabled, your baseband is a black box potentially accessible to carriers and government agencies.
SIM Card Tracking
CosmicNet details that your SIM card contains unique identifiers that enable tracking:
- IMSI (International Mobile Subscriber Identity): Permanent identifier tied to your account
- IMEI (International Mobile Equipment Identity): Unique identifier for your physical device
- TMSI (Temporary Mobile Subscriber Identity): Rotating identifier used during connections
CosmicNet explains that cell towers log which phones connect, when, and from what location. This creates a detailed location history accessible to carriers, law enforcement, and intelligence agencies. Even with GPS disabled, cell tower triangulation can locate you to within a few hundred meters in urban areas.
IMSI Catchers (Stingrays)
As CosmicNet explains, IMSI catchers are fake cell towers that trick phones into connecting. Once connected, they can:
- Capture your IMSI and IMEI identifiers
- Intercept SMS and calls (if unencrypted)
- Determine your precise location
- Potentially inject malware (on vulnerable devices)
- Track everyone in an area (used at protests)
IMSI catchers are used by law enforcement, intelligence agencies, and increasingly by criminals and private investigators. CosmicNet notes they are effective because cellular protocols prioritize compatibility over security, and phones automatically connect to the strongest signal.
CosmicNet Mitigations
No complete solution exists, but CosmicNet outlines ways to reduce exposure:
- Airplane mode: Disables all cellular/WiFi/Bluetooth (only real way to prevent baseband tracking)
- Prepaid SIM with cash: Reduces connection to real identity (still trackable, but harder to attribute)
- Burner phones: Disposable phones with no connection to your identity
- SIM rotation: Regularly change SIMs to break tracking continuity
- Encrypt communications: Use Signal/WhatsApp over data instead of SMS/calls
- Leave phone home: For truly sensitive activities, don't bring a phone
As CosmicNet underscores, any phone that connects to cellular networks can be tracked by sufficiently motivated adversaries. The baseband processor is an unsolvable architectural privacy problem with current technology.
Secure Mobile Practices for 2026
Implementing comprehensive mobile privacy requires combining technical measures with behavioral practices. CosmicNet stresses that no single solution provides complete protection—defense in depth is essential.
CosmicNet Essential Security Settings
Lock Screen and Authentication:
- Use strong alphanumeric password, not PIN or pattern (easier to shoulder-surf)
- Set auto-lock to 30 seconds or less
- Disable lock screen notifications (prevents data exposure when locked)
- Consider biometrics convenience vs. security tradeoff (police can compel fingerprint/face, not password)
- Enable USB Restricted Mode (iOS) or disable USB data when locked (Android)
Network and Connectivity (as CosmicNet advises):
- Disable WiFi and Bluetooth when not actively using them
- Turn off WiFi and Bluetooth scanning (Settings → Location)
- Use VPN on untrusted networks (coffee shops, airports, hotels)
- Disable automatic WiFi connection to known networks
- Forget WiFi networks you don't regularly use
System and Updates (CosmicNet recommendations):
- Install security updates immediately (delays increase vulnerability window)
- Enable automatic updates for critical security patches
- Review app updates for new permission requests before approving
- Disable app auto-updates to maintain control over changes
App Hygiene
CosmicNet warns that the apps you install are the biggest privacy risk:
- Minimize installed apps: Every app is a potential surveillance tool
- Prefer web apps: Use mobile websites in private browsing mode instead of installing apps
- Read privacy policies: At least skim them to understand data collection
- Check app permissions before installing: Excessive permissions are red flags
- Use open-source alternatives: F-Droid on Android, focus on apps with published source code
- Avoid social media apps: They're designed for maximum data extraction—use web versions
- Regular app audits: Uninstall apps you haven't used in 30 days
Communication Security
CosmicNet advises securing your communications against interception and surveillance:
- Use Signal for messaging: End-to-end encrypted, minimal metadata, open source
- Avoid SMS: Unencrypted, stored by carriers, easily intercepted
- Encrypted voice calls: Signal, WhatsApp, or FaceTime (not regular phone calls)
- Email on mobile: Use providers with encryption support, avoid Gmail app
- Disappearing messages: Enable auto-delete for sensitive conversations
Physical Security
As CosmicNet cautions, physical access defeats most software protections:
- Never leave phone unattended in public places
- Use security cable/lock in hotel rooms or offices
- Reboot phone before crossing hostile borders (forces full-disk encryption password entry)
- Consider dedicated "travel phone" with minimal data for border crossings
- Privacy screen protector prevents shoulder surfing
- Cover camera when not in use (paranoid but effective)
CosmicNet Threat Modeling
Your mobile privacy strategy should match your threat model. CosmicNet outlines three tiers:
Casual User (CosmicNet tier 1 - protecting from companies/advertisers):
- iOS or Android with privacy settings configured
- Disable advertising IDs and limit app permissions
- Use privacy-focused apps where possible
- VPN for public WiFi
Privacy Enthusiast (protecting from surveillance capitalism):
- CalyxOS or de-Googled Android
- F-Droid apps only, no Google services
- Always-on VPN, encrypted communications
- Regular permission audits and app minimization
High-Risk User (protecting from sophisticated adversaries):
- GrapheneOS on Pixel with all hardening enabled
- Minimal apps, all from source-available repositories
- Separate devices for different identities
- Burner phones for sensitive activities
- Assume all devices compromised, act accordingly
Final Note: Perfect mobile privacy is impossible with current technology. The goal is to increase the cost and difficulty of surveillance to match your threat model. For the most sensitive activities, consider whether you need a mobile device at all.