{"id":23388,"date":"2024-10-11T07:28:58","date_gmt":"2024-10-11T11:28:58","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=23388"},"modified":"2024-11-05T14:55:08","modified_gmt":"2024-11-05T10:55:08","slug":"running-apps-privacy-settings-part1-common","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/23388\/","title":{"rendered":"Run for your data: Privacy settings in jogging apps"},"content":{"rendered":"<p>Fitness apps, by their very nature, have access to a wealth of personal data, especially data that tracks outdoor activities \u2014 primarily running. During tracking, they collect a ton of data \u2014 heart rate and other physical activity metrics, step count, distance covered, elevation changes, and, of course, geolocation \u2014 to give you a detailed analysis of your workout.<\/p>\n<p>And people rarely jog in random locations; their routes usually repeat and are often close to home, work, school, <span style=\"text-decoration: line-through\">military base<\/span>\u2026 Essentially, places they go to often and, most likely, at regular times. What happens if this information falls into the wrong hands?<\/p>\n<p>The consequences can be catastrophic. For instance, a few years ago, a map published by a certain running app <a href=\"https:\/\/www.theguardian.com\/world\/2018\/jan\/28\/fitness-tracking-app-gives-away-location-of-secret-us-army-bases\" target=\"_blank\" rel=\"nofollow noopener\">revealed the locations of several secret military facilities<\/a>. And in the summer of 2023, a hitman allegedly <a href=\"https:\/\/edition.cnn.com\/2023\/07\/11\/europe\/russian-submarine-commander-killed-krasnador-intl\/index.html\" target=\"_blank\" rel=\"nofollow noopener\">used this data<\/a> to shoot to death Russian submarine commander Stanislav Rzhitsky during his run.<\/p>\n<p>Of course, the leakage of geolocation data can be dangerous not only for military personnel. It\u2019s easy to imagine scenarios where it could lead to trouble not only for obvious targets \u2014 such as celebrities, political figures, or top company executives \u2014 but for ordinary people too.<\/p>\n<p>Once they\u2019ve got their hands on your movement data, attackers can readily use it for blackmail and intimidation. If the victim hears that the criminal knows all their movements and where they live, they\u2019re significantly more likely to get scared and comply with any demands.<\/p>\n<p>In addition to direct threats, geolocation info complements perfectly data leaked from other apps, or collected through <a href=\"https:\/\/www.kaspersky.com\/blog\/doxing-of-women\/46812\/\" target=\"_blank\" rel=\"noopener nofollow\">doxing<\/a> \u2014 making targeted attacks much more potent. Don\u2019t think that you\u2019re not important enough for scammers to prepare a complex attack: anyone can become a victim, and the criminals\u2019 end goal isn\u2019t always financial gain.<\/p>\n<p>But it\u2019s not just geolocation data that running apps collect and analyze. Like all fitness apps, they monitor activity and physical condition, which can reveal a lot about a person\u2019s health. This information can also be used in a social engineering attack \u2014 because the more an attacker knows about their victim, the more sophisticated and effective their actions can be.<\/p>\n<p>So, it\u2019s essential to take due care when choosing your running app and setting up its privacy \u2014 and our tips will help you do just that.<\/p>\n<h2>General tips for choosing a running app and configuring its privacy<\/h2>\n<p>The first thing you absolutely shouldn\u2019t do is install every running tracker in existence and then choose the one you like best. This way, you\u2019ll hand over your personal data to everyone, significantly increasing the risk of it falling into the wrong hands. The fewer apps you use, the lower the risk of a data leak \u2014 but remember, no company can guarantee 100% data security.<\/p>\n<p>Some companies invest more in the security of their users than others, and preference should be given to those who take data protection and anonymization seriously. To ensure this, carefully read the privacy policy of your chosen app: responsible developers will specify what data the app collects, for what purpose, which data might be shared with third parties, and what rights users have regarding their personal data. It\u2019s also worth searching online or asking an AI assistant if the app you\u2019re interested in has been involved in any data leaks \u2014 simply type the app\u2019s name plus \u201cdata breaches\u201d or \u201cdata leak\u201d into a search engine. And, of course, checking user reviews is also a must.<\/p>\n<p>Once you\u2019ve chosen and installed an app, the next thing to do is configure its privacy settings. Unfortunately, many running apps share collected data \u2014 including your geolocation \u2014 with the entire internet by default. You\u2019ll find links to detailed instructions on how to set up privacy for the most popular running apps \u2014 Strava, Nike Run Club, MapMyRun, adidas Running, and ASICS Runkeeper \u2014 at the end of this post.<\/p>\n<p>As with any other app, it\u2019s a good idea to use your smartphone\u2019s operating system features to minimize tracking. For example, on iOS, when you first launch the app, you can block it from tracking your activity in other apps. Don\u2019t ignore this option.<\/p>\n<p>In addition, don\u2019t grant the running app access to data that it doesn\u2019t need to function \u2014 such as photos, calls, messages, or contacts. To reduce the amount of location data collected, don\u2019t allow fitness trackers (or most other apps, for that matter) to monitor your geolocation continuously \u2014 choose the \u201cOnly while using the app\u201d option, available on iOS and the latest versions of Android. You can set this when you first launch the app, or later by reviewing all the app\u2019s permissions in your smartphone\u2019s settings or, for Android devices, in <a href=\"https:\/\/me-en.kaspersky.com\/mobile-security?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kdaily_wpplaceholder_sm-team___kisa____3d7d2c33c4c17a10\" target=\"_blank\" rel=\"noopener\">Kaspersky for Android<\/a>.<\/p>\n<p>In general, it\u2019s a good idea to regularly check your smartphone\u2019s <a href=\"https:\/\/www.kaspersky.com\/blog\/new-kaspersky-for-android-2023\/48019\/\" target=\"_blank\" rel=\"noopener nofollow\">privacy and security settings<\/a> to see which apps have access to which data.<\/p>\n<p>Keep in mind that privacy settings won\u2019t protect you from being tracked if someone guesses your account password. Unfortunately, none of the most popular running apps currently support two-factor authentication \u2014 although they really should. Therefore, the best thing you can do to protect your account is to create a long and complex password \u2014 preferably at least 16 characters long. Of course, it should be unique. To ensure you don\u2019t forget this combination of characters, save it in a <a href=\"https:\/\/me-en.kaspersky.com\/password-manager?icid=me-en_kdailyplacehold_acq_ona_smm__onl_b2c_kasperskydaily_wpplaceholder____kpm___\" target=\"_blank\" rel=\"noopener\">password manager<\/a>\u00a0\u2014 which, by the way, can also generate a highly secure random password for you.<\/p>\n<h2>Privacy settings for popular running apps<\/h2>\n<p>We\u2019ve selected the most popular jogging apps and prepared recommendations on how to set up privacy in each of them. <a href=\"https:\/\/www.kaspersky.com\/blog\/subscribe\/\" target=\"_blank\" rel=\"noopener nofollow\">Subscribe to our blog<\/a> to make sure you don\u2019t miss the instructions for your running tracker. As we publish the privacy setup guides, we\u2019ll be updating this post with the relevant links. The following apps will be covered:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part2-strava\/52409\" target=\"_blank\" rel=\"noopener nofollow\">Strava<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part3-nike-run-club\/52442\/\" target=\"_blank\" rel=\"noopener nofollow\">Nike Run Club<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part4-mapmyrun\/52454\/\" target=\"_blank\" rel=\"noopener nofollow\">MapMyRun<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part5-adidas-running-2\/52486\/\" target=\"_blank\" rel=\"noopener nofollow\">adidas Running (formerly Runtastic)<\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part6-asics-runkeeper\/52508\/\" target=\"_blank\" rel=\"noopener nofollow\">ASICS Runkeeper<\/a><\/li>\n<\/ul>\n<p>To learn how to set up privacy for other apps \u2014 from browsers and social networks to operating systems \u2014 visit our website <a href=\"https:\/\/privacy.kaspersky.com\/?utm_source=kdaily&amp;utm_medium=blog&amp;utm_campaign=gl_kd-banner_ap0072&amp;utm_content=banner&amp;utm_term=gl_kdaily_organic_hwzuab72aq5ynvk\" target=\"_blank\" rel=\"noopener\">Privacy Checker<\/a>.<\/p>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kpm-download\">\n","protected":false},"excerpt":{"rendered":"<p>Running apps know a lot about their users, so it&#8217;s worth setting them up to ensure your data doesn&#8217;t fall into the wrong hands. Here\u2019s how.<\/p>\n","protected":false},"author":398,"featured_media":23389,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1225,9],"tags":[2088,109,191,825,2226,2644,426,43,805,45,738,521,783],"class_list":{"0":"post-23388","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-privacy","8":"category-tips","9":"tag-tips","10":"tag-apps","11":"tag-data","12":"tag-fitness-trackers","13":"tag-geolocation","14":"tag-location","15":"tag-mobile-devices","16":"tag-privacy","17":"tag-settings","18":"tag-smartphones","19":"tag-surveillance","20":"tag-threats","21":"tag-tracking"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/23388\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/running-apps-privacy-settings-part1-common\/28125\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/running-apps-privacy-settings-part1-common\/28277\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/running-apps-privacy-settings-part1-common\/38357\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/running-apps-privacy-settings-part1-common\/52403\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/running-apps-privacy-settings-part1-common\/28378\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/running-apps-privacy-settings-part1-common\/34231\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/running-apps-privacy-settings-part1-common\/33870\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/privacy\/","name":"privacy"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23388","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=23388"}],"version-history":[{"count":4,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23388\/revisions"}],"predecessor-version":[{"id":23497,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/23388\/revisions\/23497"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/23389"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=23388"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=23388"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=23388"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}