and Implementation , OSDI’10, Berkeley, CA, USA, 2010. USENIX Association.
 Kassem Fawaz, Huan Feng, and Kang G. Shin. Anatomization and protection of mobile apps’ location privacy threats. In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, 2015.
 Kassem Fawaz and Kang G. Shin. Locationprivacyprotection for smartphone users. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security , CCS ’14, 2014.
 FTC. Android flashlight app developer settles FTC charges it deceived
Konstantinos Chatzikokolakis, Catuscia Palamidessi and Marco Stronati
1 This work was partially supported by the European Union 7th FP project MEALS, by the project ANR-12-IS02-001 PACE, and by the INRIA Large Scale Initiative CAPPRIS.
 https://github.com/paracetamolo/elastic-mechanism .
 M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: differential privacy for location-based systems. In Proc. of CCS , pages 901–914. ACM, 2013.
 C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. di Vimercati, and P. Samarati. Locationprivacyprotection
location-based systems. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 901-914. ACM, 2013.
 C. A. Ardagna, M. Cremonini, E. Damiani, S. D. C. Di Vimercati, and P. Samarati. Locationprivacyprotection through obfuscation-based techniques. In Data and Applications Security XXI, pages 47-60. Springer, 2007.
 M. Bellare and P. Rogaway. Random oracles are practical: A paradigm for designing efficient protocols. In Proceedings of the 1st ACM conference on Computer and communications
Konstantinos Chatzikokolakis, Ehab ElSalamouny and Catuscia Palamidessi
. Chatzikokolakis, and C. Palamidessi, “Optimal geo-indistinguishable mechanisms for location privacy,” in Proc. of CCS , 2014.
 R. Shokri, “Privacy games: Optimal user-centric data obfuscation,” Proceedings on Privacy Enhancing Technologies , vol. 2015, no. 2, pp. 299–315, 2015.
 C. Dwork, “Differential privacy,” in Proc. of ICALP , vol. 4052 of LNCS , pp. 1–12, Springer, 2006.
 “Location guard.” https://github.com/chatziko/location-guard .
 K. Fawaz and K. G. Shin, “Locationprivacyprotection for smartphone users,” in Proc. of CCS
Wisam Eltarjaman, Rinku Dewri and Ramakrishna Thurimella
of the 22nd ACM SIGSAC Conference on Computer and Communications Security , pages 1298–1309, 2015.
 T. Xu and Y. Cai. Feeling-Based LocationPrivacyProtection for Location-Based Services. In Proceedings of the 16th ACM Conference on Computer and Communications Security , pages 348–357, 2009.
 Yelp Inc. Yelp API v3. https://www.yelp.com/developers/documentation/v3/business_search , 2017. [Online; accessed 1-March-2017].
Qatrunnada Ismail, Tousif Ahmed, Kelly Caine, Apu Kapadia and Michael Reiter
: Designing for a Party Not a Person. In Proceedings of The New Security Paradigms Workshop (NSPW) . 77–86. DOI: http://dx.doi.org/10.1145/2413296.2413304
 Paul D. Ellis. 2009. Thresholds for Interpreting Effect Sizes. (2009). http://www.polyu.edu.hk/mm/effectsizefaqs/thresholds_for_interpreting_effect_sizes2.html .
 Kassem Fawaz and Kang G Shin. 2014. Locationprivacyprotection for smartphone users. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security . ACM, 239–250.
 Adrienne Porter Felt, Erika Chin