Gravy Analytics Data Breach and Privacy By Design

Gravy Analytics Data Breach and Privacy By Design

The recent breach of Gravy Analytics—a major location data broker servicing government agencies and corporations alike—serves as a stark reminder of how vulnerable our personal information can be. Hackers reportedly stole precise location data, customer information, and internal system controls from one of the largest players in the location data industry.

This kind of breach highlights the tangible dangers of how location data is collected, stored, and used. This breach could expose
highly sensitive information about individuals, such as their daily commutes, school drop-offs, attendance at medical appointments, or participation in confidential meetings, making them vulnerable to threats like physical tracking, identity theft, or harassment.

It’s a chilling reality: our most private moments are at risk of being exploited.

But why are breaches like this so devastating? The problem lies in the way traditional smartphones and apps operate. Most device operating systems have built-in identifiers—unique ID trackers—that apps and advertisers use to follow your activities across platforms. These identifiers make it easy for companies to build extensive behavioral profiles of individuals, enabling invasive practices such as microtargeting, discriminatory profiling, or even the resale of sensitive data to third parties with unclear intentions. Even worse, this data can become a goldmine for hackers when companies fail to secure it properly. 

Protecting your privacy requires rethinking how smartphones handle personal data. Here's how devices can address these risks:

Eliminate Advertising ID Trackers

Our argument at Unplugged is that a system revolving around built-in advertising ID tracking is itself a flawed system, when the goal is to protect user privacy. Unlike conventional smartphones, the UP Phone does not have a built-in AD-ID tracker. This means apps and advertisers cannot assign a unique identifier to track your movements, behaviors, or preferences. Without this digital footprint, you are shielded from large portions of the pervasive tracking networks that feed the location data industry.

With that said, it is important to understand that your UP Phone still has an IMEI number. IMEI is a unique hardware identifier for mobile devices that can be used for network access, warranty, and unlocking. When you use any smartphone connected to a mobile network, you are communicating with cellular towers, and those systems know your approximate location. That is the nature of cellular technology. However, the type of location data exposed in the Gravy Analytics breach is typically deriving from activity around the AD-ID. When we eliminate that class of data and do not participate in user profiling, hackers and advertisers become more limited. They have no data to exploit.

Avoid Storing Sensitive Data on Servers 

The UP Phone minimizes data vulnerabilities by not storing sensitive user data on external servers. When sensitive data is stored on external servers or in the cloud, it becomes a prime target for hackers. Keeping data locally on devices can reduce exposure and strengthen individual control. 

Use Tracker-Blocking Technology 

The UP Phone’s built-in Privacy Center actively blocks trackers and invasive ads, cutting off the data pipelines that fuel breaches like the one at Gravy Analytics. This technology prevents apps and websites from secretly harvesting your information, offering you peace of mind when you use your device. 

Make Ethical Design Choices 

Privacy-first design principles prioritize ensuring that neither companies nor third parties can access personal data. This approach removes the incentive to monetize personal information, addressing the root of many privacy concerns.

Why This Matters 

Breaches like the one at Gravy Analytics highlight the urgent need for change, showing how this data could be used maliciously to expose individuals’ routines or endanger their safety. Sensitive data falling into the wrong hands doesn’t just lead to inconvenience; it can put lives at risk, from exposing activists and journalists to revealing the routines of everyday people. When you use a privacy-focused device like the UP Phone, you’re protecting not only yourself but also pushing back against a system that normalizes invasive data practices, making privacy a tangible priority.

Devices that prioritize privacy empower users to reclaim control over their digital lives, eliminating concerns about their data being weaponized against them. By eliminating ID trackers, preventing unnecessary data storage, and actively blocking invasive tracking, the UP Phone puts you back in control of your privacy.

Learn more about how the UP Phone can protect you and your family from breaches like these: https://unplugged.com/collections/all/. 



Explore UP Phone
Back to blog