By embedding tracking code into millions of websites, Meta’s Pixel and Yandex Metrica have been able to map Android users’ browsing habits with their persistent identities (that is to say, with the account holder logged in). This method bypasses privacy protections offered by Android’s permission controls and even browsers’ Incognito Mode, affecting all major Android browsers. The international research team has disclosed the issue to several browser vendors, who are actively working on mitigations to limit this type of abuse. For instance, Chrome’s mitigation is scheduled to go into effect very soon.

These tracking companies have been doing this bypass for a long time: since 2017 in the case of Yandex, and Meta since September 2024. The number of people affected by this abuse is high, given that Meta Pixel and Yandex Metrica are estimated to be installed on 5.8 million and 3 million sites, respectively. It is also worth noting that evidence of this tracking practice has been observed only on Android.

  • Colloidal@programming.dev
    link
    fedilink
    arrow-up
    2
    ·
    3 days ago

    I don’t why the downvotes, this looks quite relevant. From what I understood, the Facebook app runs a web server exposing an API, which is used by any website with the Meta Pixel tracking lib to connect to it and query a persistent user ID. So if I don’t use the Facebook app, their tracking is based only on my browser fingerprint, correct?

    • cm0002@lemmy.worldOP
      link
      fedilink
      arrow-up
      3
      ·
      3 days ago

      I pissed off the Tankie Triad LMAO

      Though the instances and accounts have been defederated/banned now, votes aren’t typically reverted. So my posts from the last day or so will be unexplainably downvoted lol

      But in general yea, but that fingerprint can be rather detailed, everything from hardware configuration to cookies to even what doesn’t load (e.g. you have an ad blocker)