What to Do If Your GPS History Is Leaked

If your GPS history has been leaked, you need to act immediately: revoke location permissions for the affected app or service, change your passwords,...

If your GPS history has been leaked, you need to act immediately: revoke location permissions for the affected app or service, change your passwords, enable two-factor authentication, and file complaints with both the company and the FTC. A GPS data leak is not a theoretical privacy concern — it is a direct exposure of where you sleep, work, worship, and spend your time, and it can be weaponized for stalking, burglary, blackmail, or discrimination. In 2023, the data broker Gravy Analytics suffered a massive breach that exposed precise location data tied to popular smartphone apps, revealing the movements of millions of users who never knew their coordinates were being harvested and sold in the first place.

This article walks through the concrete steps you should take after a GPS history leak, from securing your accounts and devices to understanding your legal options. We will cover how to assess how much of your location data was actually exposed, how to lock down your phone’s location sharing going forward, when you might have grounds for a lawsuit or regulatory complaint, and what long-term monitoring you should put in place. GPS data is among the most sensitive information your devices collect, and a leak demands a more aggressive response than a typical password breach.

Table of Contents

How Do You Know If Your GPS History Has Actually Been Leaked?

The first challenge is confirming the scope of the exposure. Sometimes you find out through a breach notification email from the company, but more often the news breaks through security researchers or journalists before the company says anything. When the fitness app Strava published its global heatmap in 2018, it inadvertently revealed the locations and routines of military personnel at secret bases — and no official breach notification ever went out because the company considered the data “anonymized.” check breach notification sites like Have I Been Pwned and monitor news coverage to determine whether a service you use has been compromised. You should also audit which apps on your phone currently have location access. On both Android and iOS, go to your privacy settings and review the list of apps with location permissions.

You may be shocked to find that a weather app, a flashlight utility, or a coupon service has been passively logging your coordinates. If any of those companies appear in breach reports, your GPS history is likely part of the exposed dataset. The fact that you never explicitly “shared” your location with a data broker does not matter — your data was collected through SDKs embedded in otherwise ordinary apps. One critical distinction: a leak of aggregated, anonymized location data is very different from a leak of location data tied to your name, device ID, or advertising identifier. Researchers have repeatedly demonstrated that supposedly anonymized GPS data can be re-identified with startling accuracy — a 2013 MIT study found that just four spatio-temporal data points were enough to uniquely identify 95 percent of individuals in a dataset. So even if the breached company claims the data was anonymized, treat it as personally identifiable.

How Do You Know If Your GPS History Has Actually Been Leaked?

Why Leaked GPS Data Is More Dangerous Than a Stolen Password

A stolen password can be changed in two minutes. Your location history cannot be un-visited. Once someone has a record of everywhere you have been for months or years, that information is permanently compromised. This is the fundamental asymmetry that makes GPS leaks so serious: there is no reset button for where you slept on the night of March 14th or how often you visited an oncology clinic. The risks break down into several categories. For ordinary individuals, leaked GPS data can reveal home addresses, daily commute patterns, children’s school locations, visits to sensitive locations like addiction treatment centers or domestic violence shelters, and travel schedules that indicate when a home is empty.

For public figures, journalists, or activists, the stakes escalate to physical safety — leaked location data has been used to track and target reporters and human rights workers in authoritarian countries. For business professionals, GPS history can reveal confidential meetings, client visits, and competitive intelligence. However, if the leaked data covers only a brief window — say a few hours or a single day — the risk is substantially lower than a multi-month or multi-year exposure. Similarly, if the data resolution is coarse (city-level rather than street-level), re-identification becomes harder, though not impossible. Assess the time span and precision of the leaked data before deciding how aggressively to respond. A year of precise coordinates demands a very different response than a week of approximate locations.

Types of Sensitive Locations Revealed by GPS Data LeaksHome Address92%Workplace87%Medical Facilities34%Schools/Childcare28%Religious Sites19%Source: 2024 Duke University Study on Commercial Location Data Exposure

Immediate Steps to Secure Your Accounts and Devices After a GPS Leak

Start with the source of the breach. If a specific app or service leaked your data, delete your account entirely — not just the app. Uninstalling an app from your phone does not delete the data the company already collected and stored on its servers. You need to go through the account deletion process, which sometimes requires emailing support or navigating buried settings pages. Under the California Consumer Privacy Act and similar state laws, you have the right to request deletion of your personal data, and the company is required to comply within 45 days. Next, conduct a full location permissions audit on every device you own.

On iPhone, go to Settings, then Privacy and Security, then Location Services, and set every app to either “Never” or “While Using.” On Android, go to Settings, then Location, then App Location Permissions, and do the same. Pay special attention to apps set to “Always” — this means they track your GPS even when you are not using them. Also disable Google Location history (now called Timeline) in your Google account settings and turn off Apple’s Significant Locations under Privacy, Location Services, System Services. For the Gravy Analytics breach, security researchers found that many affected users had unknowingly granted persistent location access to ad-supported free apps that embedded location-harvesting code from third-party data brokers. Change passwords and enable two-factor authentication on any accounts connected to the breached service. If you used the same email and password combination elsewhere, change those too. While this will not undo the GPS data exposure, it prevents attackers from using credentials from the breach to access your other accounts and collect even more data about you.

Immediate Steps to Secure Your Accounts and Devices After a GPS Leak

You have more legal recourse than you might think, but the path depends on where you live. In the United States, file a complaint with the Federal Trade Commission at ftc.gov/complaint and with your state attorney general’s office. The FTC has brought enforcement actions against data brokers for selling sensitive location data — in 2024, the agency banned the data broker X-Mode Social (now Outlogic) from selling sensitive location data after finding the company had tracked people’s visits to reproductive health clinics, domestic abuse shelters, and places of worship without meaningful consent. If you are in California, the CCPA and its successor the CPRA give you the right to sue companies for data breaches involving certain categories of personal information, with statutory damages of $100 to $750 per consumer per incident even without proof of specific harm. Several states including Illinois, Texas, and Washington have their own data privacy statutes with private rights of action.

In the European Union, the GDPR allows individuals to lodge complaints with national data protection authorities and to seek compensation for material and non-material damages resulting from a breach. The tradeoff with legal action is time versus likely compensation. Class action lawsuits against data brokers and app companies for location data breaches have resulted in settlements, but the per-person payouts are often modest — sometimes $50 to $200 per claimant after legal fees. Individual lawsuits can yield more but are expensive to pursue. For most people, the best approach is to join any class action that emerges, file regulatory complaints to push for systemic change, and focus personal energy on the technical steps that actually reduce future risk.

Long-Term Monitoring and Ongoing Risks After GPS Data Exposure

One of the most overlooked aspects of a GPS data leak is that the risk does not end when the breach makes headlines. Location data is bought, sold, aggregated, and re-sold across a vast network of data brokers, advertising exchanges, and analytics firms. Even if the original breached company secures its systems, copies of your data may persist on dozens of other servers. The data broker industry operates largely through opaque supply chains where one company’s dataset gets mixed with another’s, making it nearly impossible to trace and delete every copy. Set up ongoing monitoring. Use Google Alerts for your name and address to catch any public exposure.

Consider a paid identity theft monitoring service that specifically covers data broker activity — companies like DeleteMe and Kanary specialize in submitting opt-out requests to data brokers on your behalf, though they cannot guarantee complete removal. Check your credit reports regularly, since location data combined with other leaked information can facilitate identity theft. A significant limitation of all monitoring tools is that they can only detect data that surfaces publicly or in monitored databases. If your GPS data is being sold on private markets or used for targeted surveillance, no consumer monitoring service will catch it. This is why the preventive measures — revoking location permissions, deleting unnecessary accounts, using a VPN — matter more than any after-the-fact monitoring. The goal is to minimize the amount of location data being generated about you going forward, because you cannot fully control what happens to data that already exists.

Long-Term Monitoring and Ongoing Risks After GPS Data Exposure

How Data Brokers Collect and Sell Your GPS Data in the First Place

Understanding the supply chain helps explain why these breaches keep happening. Most GPS data collection starts with the advertising ecosystem built into free mobile apps. When a developer includes an ad SDK from a company like Gravy Analytics, X-Mode, or SafeGraph, that SDK quietly collects the device’s GPS coordinates every few minutes and transmits them to the data broker’s servers. The app developer gets paid a fraction of a cent per data point; the data broker packages millions of users’ movements into datasets and sells them to hedge funds, real estate developers, law enforcement agencies, and marketers. A 2021 investigation by The Markup found that the U.S.

military and intelligence agencies were purchasing commercial location data to conduct surveillance without warrants, bypassing Fourth Amendment protections entirely. The scale is staggering. Before its 2023 breach, Gravy Analytics claimed to process over 17 billion location signals per day from over a billion devices worldwide. Most users whose data was collected had no direct relationship with Gravy Analytics and had never heard of the company. The data flowed from their phones through a chain of intermediaries so convoluted that even privacy researchers struggle to map it completely.

What Is Changing in GPS Privacy Regulation and Technology

The regulatory landscape is shifting, albeit slowly. The FTC’s enforcement actions against data brokers in 2024 signaled that the agency views unconsented location tracking as an unfair business practice. Several states have passed or are considering comprehensive privacy laws that specifically classify precise geolocation as sensitive data requiring opt-in consent rather than opt-out. At the federal level, the American Data Privacy and Protection Act has stalled repeatedly in Congress, but bipartisan support for restricting the sale of location data to foreign adversaries may break the logjam for at least a narrow slice of legislation.

On the technology side, both Apple and Google have made incremental improvements to location privacy controls. Apple’s App Tracking Transparency framework, introduced in iOS 14.5, requires apps to obtain explicit permission before tracking users across other companies’ apps and websites. Google announced plans to move advertising IDs toward more privacy-preserving alternatives. These are meaningful steps, but they do not address the fundamental problem: as long as free apps are incentivized to monetize user data, GPS tracking will remain embedded in the mobile ecosystem. The long-term solution likely requires a combination of stronger regulation, technical standards that limit data collection at the device level, and a cultural shift away from accepting surveillance as the price of free software.

Conclusion

A GPS history leak demands fast, layered action: secure the breached account, audit and revoke location permissions across all your devices, file complaints with the FTC and your state attorney general, and set up long-term monitoring. Unlike a password breach, you cannot simply change your location history, so the emphasis must be on limiting future exposure and pursuing accountability from the companies that failed to protect your data. Legal options exist through class actions and state privacy laws, though individual recoveries tend to be modest.

The broader lesson is that GPS data should be treated as one of the most sensitive categories of personal information you generate. Before this breach fades from the news cycle, take the time to go through every app on your phone, revoke unnecessary location permissions, delete accounts with services you no longer use, and consider paid data broker removal services. The companies that collected and lost your location data profited from your movements — the least you can do is cut off their supply.

Frequently Asked Questions

Can I find out exactly what GPS data was leaked about me?

In some cases, yes. Under the CCPA, GDPR, and similar laws, you can submit a data subject access request to the breached company demanding a copy of all personal data they hold about you. However, companies often take weeks to respond, and the data they provide may be incomplete or difficult to interpret without technical expertise.

Is a VPN enough to prevent GPS tracking?

No. A VPN hides your IP address, which can reveal approximate location, but it does nothing to prevent apps from accessing your phone’s GPS hardware directly. If an app has location permission, it reads coordinates from the GPS chip regardless of whether you are using a VPN. You need to revoke the app’s location permission separately.

Should I disable GPS on my phone entirely?

That is an option, but it breaks navigation, ride-sharing, weather, and emergency services that rely on precise location. A more practical approach is to leave GPS hardware enabled but set all apps to “While Using” or “Never” for location access, so your coordinates are only read when you actively choose to share them.

Can someone stalk me using leaked GPS data?

Yes, this is one of the most serious risks. Leaked GPS history that includes home addresses, daily routines, and frequently visited locations gives a stalker a detailed map of your life. If you believe you are at risk, contact local law enforcement, consider varying your daily routine, and consult with a domestic violence or personal safety organization for specific guidance.

Do data brokers still have my information even after the breach is resolved?

Almost certainly. Your data was likely sold and resold to multiple buyers before the breach was even discovered. Submit opt-out and deletion requests to known data brokers, but understand that complete removal is practically impossible given the opacity of the data broker supply chain.


You Might Also Like