SDKs, RTB, and JavaScript: How Google and Cell Towers Track You Beyond Your Fingerprint

Post date: March 24, 2026 · Discovered: April 17, 2026 · 3 posts, 23 comments

Location tracking routinely bypasses direct GPS permissions via embedded Software Development Kits (SDKs) and Real-Time Bidding (RTB) ad networks, yielding GPS coordinates even outside the US.

The conversation reveals a deep suspicion of corporate data handling. Some users argue that providers like Google/Apple should stop selling raw data because doing so undermines their ad-selling business model (Auli). Conversely, others cite inherent infrastructural vulnerabilities, noting that cell providers already possess location data for basic service, or that IP geolocation combined with accelerometers allows mapping against street layouts (tal).

Consensus points to a pervasive, multi-vector surveillance environment. Location data acquisition is not limited to user-facing apps; it flows through the web browser via JavaScript and can be mapped from core services like cell towers. The primary fault line remains trust: whether current tech giants are constrained by their own business models, or if their foundational infrastructure is inherently compromised.

Key Points

SUPPORT

Location data is extracted via vectors beyond direct GPS permissions.

The community identified SDKs, RTB advertising, and browser JavaScript as major non-obvious collection points.

OPPOSE

Corporate self-limitation prevents the sale of raw location data.

Auli stated that Google selling raw location data would fundamentally limit its ability to sell ads.

SUPPORT

Basic service provision inherently compromises location privacy.

tal argued that cell providers already know location for basic service, and IP/accelerometer matching is possible.

SUPPORT

Web browsers are active tracking endpoints.

FauxLiving pointed out that tracking occurs via JavaScript embedded in the web browser itself, not just within dedicated apps.

SUPPORT

Mitigation can target ad infrastructure at the network level.

FauxLiving suggested blocking ad destinations across IoT devices using Pi-hole DNS manipulation.

Source Discussions (3)

This report was synthesized from the following Lemmy discussions, ranked by community score.

92
points
Everyone knows your location: tracking myself down through in-app ads
[email protected]·12 comments·11/21/2025·by the_abecedarian·timsh.org
35
points
How commercially-available phone location data is used by ICE (and other law enforcement agencies)
[email protected]·0 comments·1/8/2026·by cypherpunks·lemmy.ml
17
points
If I dont live in the US and also dont use any apps that track location or have that permission, is it still available to data brokers?
[email protected]·11 comments·3/24/2026·by cheese_greater