Companies, government organizations and criminal hackers use intrusive methods to harvest data from smartphones. Worst of all, many of these tactics occur without the smartphone user's knowledge and consent. By following these steps, you can limit the amount of data that can be accessed and travel without your movements being tracked.
Source: http://www.visualistan.com/