50 Apps That Track Everything

Big Brother Is Watching You

In George Orwell’s Nineteen Eighty-Four, citizens of the totalitarian state Oceania are constantly reminded “Big Brother is watching you.” As ominous as this mass surveillance of a fictional civilisation seems, are we complacently doing the same thing to ourselves?

VoucerCloud has released a list of fifty tracking apps (Infographic – See Below) for smart phones (via IT News Africa) , which offer users a multitude of ways to track themselves and their behaviours. Included in this list are apps that allow you to track your heart rate, sleeping habits, and various fitness behaviours, as well as resolutions and to-do lists. Most of these seem fairly harmless and might provide some interesting insight into your life; however there are also apps which allow you to track not only your own movements, but your partner’s movements. Certainly the suggestion is that one would have to willingly allow another to track them, but how easily might someone circumvent this consent? And perhaps you’re quite willing to have your spouse know your every move, but how secure is the data in these apps anyway?

Privacy & Security

A quick search for ‘privacy tracking’ brings up a list of sites which offer options to protect your privacy. It would seem people are particularly concerned with protecting their personal information online, with offerings such as Disconnect, Do Not Track and Blur. These applications and add-ons maintain that criminals and governments alike are tracking you online, and promise to block hackers and trackers while securing your private details. These seem like a good idea; I certainly don’t like the notion that my credit card number is floating around the web, and the appeal of blocking behavioural advertisements is great, but perhaps we should take a step back and evaluate all of the data we’re willingly offering up.

Viewing Choices & Ratings

Currently, I have apps loaded on my Android smart phone that track my viewing choices and ratings, the restaurants I frequent, to-do and to-buy lists, and my movements. I love the fact that Google Home pops up every now and then, telling me how long my drive to work is going to be, pointing out accidents on my route home, and reminding me of flight schedules with tips on the weather at my destination. It does all of this without me ever having requested it. I agreed to the terms, which I didn’t read, ages ago, and am now pleasantly surprised when my phone knows my moves before I do. Perhaps I am being naïve. When I was a child my mom wouldn’t even let me wear a necklace with my name on it for fear someone would use that information to kidnap me, and now I willingly offer far more to any stranger who’s interested.

Conspiracy Theory Types

There are a few people today who refuse to have Facebook and Twitter accounts; request that you keep photographs of them private on your own social pages; and generally remain disconnected from social media. These people are, to my understanding, in the minority, and I’ve always considered them overly mistrustful. Conspiracy theory types. However, as I read through this list of applications, I am forced to reconsider my position. There is an awful lot of information I am dishing out with little or no concern for my privacy and security, and while I can’t really imagine how this might harm me, perhaps I could do to take a leaf from the conspiracy theorists and be a little more aware. Then again, Reporter looks like a fun app! Perhaps it’s a good thing it’s only available for iOS…

Top-Tracking-Apps

By Jennifer Klostermann

Mark Ardito
OPEX is the new battleground I recently wrote in CloudTweaks about how cloud is forcing CIOs to work more closely with their C-suite colleagues to sell the benefits and its role as a business driver ...
Gilad David Maayan
Network Security in the Public Cloud What is Network Security? Network security is a strategic approach to securing an organization’s resources and data across the corporate network. It helps protect organizations of all sizes, industries, ...
Gilad David Maayan
What Is Cloud Deployment? Cloud deployment is the process of deploying and managing applications, services, and infrastructure in a cloud computing environment. Cloud deployment provides scalability, reliability and accessibility over the internet, and it allows ...
Gary Bernstein
WordPress Website Security You've spent time, effort, and money building your website, so don't let it become outdated and run-down by not taking proper care of it. Here are tips on WordPress Website security, speed, ...
Patrick Melampy
Cloud On-Ramp and Protecting Performance The expansion of remote work and the massive growth in usage of cloud-based applications have stressed existing infrastructure and put a keen focus on the performance of everyone’s network environment ...
Get Smarter
Higher Education A big challenge for professionals of all ages is time. Balancing the responsibilities of work and life leave little time for self-improvement in the form of education. But ongoing education is more than ...
Cybersecurity Bootcamps To Help Build Your Career
Cybersecurity Bootcamps We've discussed the importance of training and the hiring of cybersecurity professionals many times on CloudTweaks over the past 10+ years. Now more than ever as the world enters into a dark era ...
John Peluso
Save Your Organization on Cloud Costs Organizations of all sizes are currently navigating their plans to avoid the recent surge in cyber-attacks and data breaches and preparing for unforeseen setbacks. Building a sensible backup and ...
Answer To Everything.png
Holiday Photos.png
Cloud For Dummies.png
The Report.png

PLURALSITE

Pluralsight provides online courses on popular programming languages and developer tools. Other courses cover fields such as IT security best practices, server infrastructure, and virtualization. 

(ISC)²

(ISC)² provides IT training, certifications, and exams that run online, on your premises, or in classrooms. Self-study resources are available. You can also train groups of 10 or more of your employees.

CYBRARY

CYBRARY Open source Cyber Security learning. The world's largest cyber security community. Cybrary provides free IT training certificates. Courses for beginners, intermediates, and advanced users are available.