In the sequel,we provide a comparative analysis, based on a proof of
concept study, in which the implementation and distribution of a location tracking malware is attempted.
Our study has proven that, under circumstances, allsmartphone platforms could be used by average developers as privacy attack vectors, harvesting data from the device without the users knowledge and consent.