“…Most of these works are orthogonal to our system as their motivation and techniques differ. Examples of such work include, but are not limited to, recommending new frameworks/privacy metrics [35], [25], [36], [37], [38], [39], [40], location obfuscation [1], [2], [3], [4], [5], location cloaking [6], generating dummy locations [7], [8], [9], [10], [11], [41], tainting sensitive data [42], [43], dynamic analysis [44], [45], static code analysis [46], [47], [48], [49], permissions analysis [50], and application retrofitting [51], [52], [53].…”