{"id":56131,"date":"2024-05-20T17:51:00","date_gmt":"2024-05-20T17:51:00","guid":{"rendered":"http:\/\/b6523ecb-8499-4133-b959-881e357eae9e"},"modified":"2024-05-20T17:51:00","modified_gmt":"2024-05-20T17:51:00","slug":"are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/","title":{"rendered":"Are you being tracked? What new privacy features from Apple and Google can (and can&#8217;t) tell you"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/8c889cc06cd972673cdd3e2bc88fa30ac6720098\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=768\" alt=\"AirTag in hand in the dark\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/c48014f74116218e25c66af5c04d25f53c4a8cff\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1024\" alt=\"AirTag in hand in the dark\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\" alt=\"AirTag in hand in the dark\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\" alt=\"AirTag in hand in the dark\" width=\"1280\" height=\"853.3333333333333\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div><figcaption> <span class=\"c-shortcodeImage_credit g-outer-spacing-top-xsmall u-block\">BRENDAN SMIALOWSKI\/AFP via Getty Images<\/span><\/figcaption><\/figure>\n<p>Earlier this month, Apple and Google <a href=\"https:\/\/www.zdnet.com\/article\/ios-and-android-owners-will-now-be-alerted-if-an-unknown-tracker-is-moving-with-them\/\" rel=\"follow\">rolled out<\/a> enhanced privacy features that monitor Bluetooth-enabled tracking devices to&nbsp;<a href=\"https:\/\/www.apple.com\/ca\/newsroom\/2024\/05\/apple-and-google-deliver-support-for-unwanted-tracking-alerts-in-ios-and-android\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">iOS<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/security.googleblog.com\/2024\/05\/google-and-apple-deliver-support-for.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"c-regularLink\">Android<\/a>&nbsp;users. These features will alert users if someone else&#8217;s AirTag, Find My Device network-compatible tracker tag, or other industry specification-compatible Bluetooth tracker is moving with them.&nbsp;<\/p>\n<p><strong>Also:&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/best-airtag-accessories\/\" rel=\"follow\">The best AirTag accessories you can buy<\/a><\/strong><\/p>\n<p>But the system is opaque, consisting of a few alerts that the user is shown when something potentially out of the ordinary is detected.&nbsp;<\/p>\n<p>So how does your smartphone know that a Bluetooth tracker is monitoring your location? Will this system generate a blizzard of false-positive alerts caused by other people&#8217;s trackers in your vicinity? Let&#8217;s break down everything you need to know.&nbsp;<\/p>\n<div id=\"6e34cc89-06d7-42c3-b90b-44228a5f6263\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9\">\n<div class=\"c-ShortcodeContent\" readability=\"38\">\n<p>The features rolled out this month are available on iPhones running iOS 17.5 and Android devices running version 6.0 and above, and apply to all Bluetooth trackers, regardless of the platform the device is paired with.<\/p>\n<p>iPhones running iOS 14.5 or later already have the ability to detect unknown AirTags.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p><strong>Also: <a href=\"https:\/\/www.zdnet.com\/article\/google-unveils-new-android-15-security-updates-what-you-need-to-know\/\" rel=\"follow\">Google unveils new Android 15 security updates: What you need to know<\/a><\/strong><\/p>\n<div id=\"3bdb415e-10d2-4e62-a92d-5a34eb71e96e\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.645161290323\">\n<div class=\"c-ShortcodeContent\" readability=\"40.645161290323\">\n<p>For now, Apple AirTags are detectable natively on iPhone and Android, but Google and Apple&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/ios-and-android-owners-will-now-be-alerted-if-an-unknown-tracker-is-moving-with-them\/\" rel=\"follow\">confirmed<\/a> that other Bluetooth tag manufacturers, including Chipolo, eufy, Jio, Motorola, and Pebblebee, have committed that future tags will be compatible with this detection protocol.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"6192bb67-77b5-434e-b8da-13e1d6f213ec\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9\">\n<div class=\"c-ShortcodeContent\" readability=\"38\">\n<p>The privacy features work by identifying whether a foreign tag is in near-owner mode (connected to its owner&#8217;s smartphone) or separated mode (not connected to its owner&#8217;s smartphone). They also factor in how long the tracker remains in proximity to another person&#8217;s device.<\/p>\n<p>Under normal circumstances, it can take up to 24 hours for the features to generate an unknown tracker notification.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"c3909321-fa1d-48f2-a07c-c316991b305a\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9.3642857142857\">\n<div class=\"c-ShortcodeContent\" readability=\"38.442857142857\">\n<p>If you don&#8217;t have a smartphone to receive unknown tracker notifications, Apple AirTags are also programmed to emit a specific sound when they are traveling with you and not their owner (you can hear an example in this&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=c0TVHPHRjXg\" class=\"c-regularLink\">video<\/a>).<\/p>\n<p>However, it is important to know that it is possible for someone to disable the AirTag&#8217;s speaker so it cannot make sounds.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p><strong>Also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/apple-quietly-promoted-an-excellent-iphone-feature-i-never-knew-existed\/\" rel=\"follow\"><strong>Apple quietly promoted an excellent iPhone feature I never knew existed<\/strong><\/a><\/p>\n<div id=\"d39f4cf2-24b2-4996-9f36-d87671e6b7e3\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10\">\n<div class=\"c-ShortcodeContent\" readability=\"40\">\n<p>Yes, and most are easily explained. For example, someone lent you some luggage or keys and accidentally forgot to remove their tracker tag.<\/p>\n<p>Note that other Apple Bluetooth devices that use the company&#8217;s Find My network, like wireless headphones, can also trigger these alerts.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"8c47b670-fb20-4c61-b7a5-e8d19a27c784\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"6.5\">\n<div class=\"c-ShortcodeContent\" readability=\"33\">\n<p>Yes &#8212; AirGuard is one option, and it&#8217;s available for both iPhone and Android platforms.<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<p><!----><\/p>\n<div id=\"bb6e10af-48e5-4455-a259-4f601e47bbe6\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"9\">\n<div class=\"c-ShortcodeContent\" readability=\"38\">\n<p>They can be anywhere you can hide something the size of a quarter, but common locations include purses or handbags, clothing (pockets or in the lining), inside or underneath vehicles, and behind license plates.&nbsp;<\/p>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"522b6d87-e0b3-48b8-90a1-b23a29337a02\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.986486486486\">\n<div class=\"c-ShortcodeContent\" readability=\"41.079905992949\">\n<p>Users will be given the option to make the tracker play a sound in order to find it (note that the tracker&#8217;s speaker might have been disabled in order to make it harder to locate).<\/p>\n<p>You&#8217;ll also receive a limited amount of information on the tracker&#8217;s owner, along with instructions on how to disable the tracker (which usually involves removing the battery). Note that the owner information might be fake, but do take screenshots of the information if you feel you might want to involve law enforcement.<\/p>\n<p>Before you disable a tracker, consider the following:<\/p>\n<ul>\n<li>If you disable a tracker, the owner will be alerted and will likely conclude that you found it.<\/li>\n<li>If you have any concerns about your safety, contact law enforcement or the&nbsp;<a href=\"https:\/\/www.thehotline.org\/\" class=\"c-regularLink\">National Domestic Violence Hotline<\/a>. If you&#8217;re not in the US, a global list of domestic violence hotlines can be found&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_domestic_violence_hotlines\" class=\"c-regularLink\">here<\/a>.&nbsp;<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<div id=\"f852a787-9b98-47bd-a77f-da4edc2ed38a\" class=\"c-shortcodeListicle g-outer-spacing-bottom-medium\">\n<div class=\"c-shortcodeListicle_conten\"><!----> <!----> <\/p>\n<div readability=\"10.986486486486\">\n<div class=\"c-ShortcodeContent\" readability=\"41.079905992949\">\n<p>Users will be given the option to make the tracker play a sound in order to find it (note that the tracker&#8217;s speaker might have been disabled in order to make it harder to locate).<\/p>\n<p>You&#8217;ll also receive a limited amount of information on the tracker&#8217;s owner, along with instructions on how to disable the tracker (which usually involves removing the battery). Note that the owner information might be fake, but do take screenshots of the information if you feel you might want to involve law enforcement.<\/p>\n<p>Before you disable a tracker, consider the following:<\/p>\n<ul>\n<li>If you disable a tracker, the owner will be alerted and will likely conclude that you found it.<\/li>\n<li>If you have any concerns about your safety, contact law enforcement or the&nbsp;<a href=\"https:\/\/www.thehotline.org\/\" class=\"c-regularLink\">National Domestic Violence Hotline<\/a>. If you&#8217;re not in the US, a global list of domestic violence hotlines can be found&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/List_of_domestic_violence_hotlines\" class=\"c-regularLink\">here<\/a>.&nbsp;<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/div>\n<h3><\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How does your phone know that a Bluetooth tracker is monitoring you? What should you do if you find one? We answer all your questions about the new iOS and Android Bluetooth tracking features, and more.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-56131","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you being tracked? What new privacy features from Apple and Google can (and can&#039;t) tell you 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you being tracked? What new privacy features from Apple and Google can (and can&#039;t) tell you 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-20T17:51:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Are you being tracked? What new privacy features from Apple and Google can (and can&#8217;t) tell you\",\"datePublished\":\"2024-05-20T17:51:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\"},\"wordCount\":802,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\",\"name\":\"Are you being tracked? What new privacy features from Apple and Google can (and can't) tell you 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\",\"datePublished\":\"2024-05-20T17:51:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage\",\"url\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\",\"contentUrl\":\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you being tracked? What new privacy features from Apple and Google can (and can&#8217;t) tell you\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you being tracked? What new privacy features from Apple and Google can (and can't) tell you 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/","og_locale":"en_US","og_type":"article","og_title":"Are you being tracked? What new privacy features from Apple and Google can (and can't) tell you 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2024-05-20T17:51:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Are you being tracked? What new privacy features from Apple and Google can (and can&#8217;t) tell you","datePublished":"2024-05-20T17:51:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/"},"wordCount":802,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/","url":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/","name":"Are you being tracked? What new privacy features from Apple and Google can (and can't) tell you 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280","datePublished":"2024-05-20T17:51:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/bcef71501d02c799ab2f9282a9403833942ce08f\/2024\/05\/20\/356b3f9d-6490-452c-8696-26aebcde7dc4\/gettyimages-1247144200.jpg?auto=webp&amp;width=1280"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/are-you-being-tracked-what-new-privacy-features-from-apple-and-google-can-and-cant-tell-you\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Are you being tracked? What new privacy features from Apple and Google can (and can&#8217;t) tell you"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56131","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=56131"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/56131\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=56131"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=56131"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=56131"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}