50 Apps That Track Everything

Big Brother Is Watching You

In George Orwell’s Nineteen Eighty-Four, citizens of the totalitarian state Oceania are constantly reminded “Big Brother is watching you.” As ominous as this mass surveillance of a fictional civilisation seems, are we complacently doing the same thing to ourselves?

VoucerCloud has released a list of fifty tracking apps (Infographic – See Below) for smart phones (via IT News Africa) , which offer users a multitude of ways to track themselves and their behaviours. Included in this list are apps that allow you to track your heart rate, sleeping habits, and various fitness behaviours, as well as resolutions and to-do lists. Most of these seem fairly harmless and might provide some interesting insight into your life; however there are also apps which allow you to track not only your own movements, but your partner’s movements. Certainly the suggestion is that one would have to willingly allow another to track them, but how easily might someone circumvent this consent? And perhaps you’re quite willing to have your spouse know your every move, but how secure is the data in these apps anyway?

Privacy & Security

A quick search for ‘privacy tracking’ brings up a list of sites which offer options to protect your privacy. It would seem people are particularly concerned with protecting their personal information online, with offerings such as Disconnect, Do Not Track and Blur. These applications and add-ons maintain that criminals and governments alike are tracking you online, and promise to block hackers and trackers while securing your private details. These seem like a good idea; I certainly don’t like the notion that my credit card number is floating around the web, and the appeal of blocking behavioural advertisements is great, but perhaps we should take a step back and evaluate all of the data we’re willingly offering up.

Viewing Choices & Ratings

Currently, I have apps loaded on my Android smart phone that track my viewing choices and ratings, the restaurants I frequent, to-do and to-buy lists, and my movements. I love the fact that Google Home pops up every now and then, telling me how long my drive to work is going to be, pointing out accidents on my route home, and reminding me of flight schedules with tips on the weather at my destination. It does all of this without me ever having requested it. I agreed to the terms, which I didn’t read, ages ago, and am now pleasantly surprised when my phone knows my moves before I do. Perhaps I am being naïve. When I was a child my mom wouldn’t even let me wear a necklace with my name on it for fear someone would use that information to kidnap me, and now I willingly offer far more to any stranger who’s interested.

Conspiracy Theory Types

There are a few people today who refuse to have Facebook and Twitter accounts; request that you keep photographs of them private on your own social pages; and generally remain disconnected from social media. These people are, to my understanding, in the minority, and I’ve always considered them overly mistrustful. Conspiracy theory types. However, as I read through this list of applications, I am forced to reconsider my position. There is an awful lot of information I am dishing out with little or no concern for my privacy and security, and while I can’t really imagine how this might harm me, perhaps I could do to take a leaf from the conspiracy theorists and be a little more aware. Then again, Reporter looks like a fun app! Perhaps it’s a good thing it’s only available for iOS…

Top-Tracking-Apps

By Jennifer Klostermann

Dan Teichman
Cloud-Native Communications Historically, Communication Service Providers (CSPs) networks ran on purpose-built hardware. However, in the early 2000s organizations started to update their infrastructure, moving to virtualization. Now, providers are looking to take the next step, ...
Dmitry Chekalin
How Much Should a Modern Website Cost? A website is a valuable instrument for growing your business. Your website presents your brand to users. Also, it compels your prospects to become your customers. So, how ...
Bitcoin electricity
Bitcoin Heating? Bitcoin mining or cryptocurrency mining has been widely vilified for it’s environmental impact. Why it does draw a huge amount of energy, more and more of it is coming from renewable sources and ...
Gary Bernstein
Managing Your Internal IT Your company's internal IT team is responsible for keeping things running smoothly, and they deserve all the support you can give them. Here are ten ways to make their lives easier ...
Rakesh Soni
Customer Experience: Living In A Connected World and Winning the IoT Race IoT and smart interconnected systems have already created an invisible aura of convenience, usability, and a rich user experience around us. However, when ...

SECURITY TRAINING

  • Isc2

    ISC2

    (ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees. If you want a job in cybersecurity, this is the route to take.

  • App Academy

    App Academy

    Immersive software engineering programs. No experience required. Pay $0 until you're hired. Join an online info session to learn more

  • Cybrary

    Cybrary

    CYBRARY Open source Cyber Security learning. Free for everyone, forever. The world's largest cyber security community. Cybrary provides free IT training and paid IT certificates. Courses for beginners, intermediates, and advanced users are available.

  • Plural Site

    Pluralsite

    Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization.