Main content

GPS Spoofing

Menu

Loading wiki pages...

View
Wiki Version:
# GPS Spoofing ___ The researcher utilized the mobile application *Fake GPS GO Location Spoofer Free* (v. 4.9.4), published by IncorporateApps, to alter the global positioning system (GPS) on a Samsung Galaxy S8+ (SM-G955U) running Android 8.0.0. Instructions on how to spoof the GPS signal were found on the developer’s website. A pilot test demonstrated that if the spoofing app was engaged prior to using the three geosocial networking (GSN) smartphone applications ("apps"), then the researcher’s profile remained in the spoofed location upon closing them. Location accuracy was verified using *Google Maps* prior to opening the GSN apps. During data collection, the researcher's personal profiles were [modified to advertise the study](https://osf.io/esxz7/wiki/Recruitment/) and remained logged into the GSN apps within [ZIP codes](https://osf.io/esxz7/wiki/ZIP%20Codes/) throughout the day. This strategy allowed interested users to contact the researcher about the study. Spoofed locations lasted longer when GSN apps were not actively used to chat with prospective participants. Active communication tended to reset the GPS of the Android device to its actual location. When this occurred, it was necessary to close the GSN apps, stop the spoofing, start it again, reopen the GSN apps, and refresh them. Occasionally, this process had to be repeated once or twice for the GPS to be properly re-spoofed.
OSF does not support the use of Internet Explorer. For optimal performance, please switch to another browser.
Accept
This website relies on cookies to help provide a better user experience. By clicking Accept or continuing to use the site, you agree. For more information, see our Privacy Policy and information on cookie use.
Accept
×

Start managing your projects on the OSF today.

Free and easy to use, the Open Science Framework supports the entire research lifecycle: planning, execution, reporting, archiving, and discovery.