Tag

trackers

Browsing

By Cal Jeffrey

TikTok doesn’t have as many trackers out there as Google and Facebook, but its ad platform is young

A hot potato: Data collection has become so ubiquitous that most people just assume that any website or app they use is tracking them. Indeed, even after Apple’s recent privacy crackdown, Meta has been caught in the act of scraping personal data via a loophole. However, even the savviest users might be surprised that TikTok is tracking them even though they have never used the company’s website or app.

According to a Consumer Reports (CR) investigation published last week, TikTok has been planting trackers called “pixels” on hundreds of websites. Partnering with security firm Disconnect, CR looked into about 20,000 websites searching for TikTok’s pixels specifically. The pool included the top 1,000 most visited websites and many of the biggest, .org, .edu, and .gov domains since those tend to have more sensitive user data.

The study found that hundreds of companies share data with TikTok. Some prime examples of websites allowing TikTok to embed pixels include the United Methodist Church, Weight Watchers, and Planned Parenthood. Perhaps most disturbing is the Arizona Department of Economic Security’s sharing of user data regarding visits to its domestic violence and food assistance pages. By the way, none of these groups would respond to CR’s requests for comment. Big surprise.

“I was genuinely surprised that TikTok’s trackers are already this widespread,” said Disconnect’s Chief Technology Officer Patrick Jackson. “I think people are conditioned to think, ‘Facebook is everywhere, and whatever, they’re going to get my data.’ I don’t think people connect that with TikTok yet.”

“The only reason this works is because it’s a secret operation. It shouldn’t be happening in the shadows.” — Disconnect

Consumer Reports says that the number of Meta and Google pixels it found dwarfs TikTok’s by a long shot. However, it pointed out that TikTok’s advertising platform is just getting started, whereas Google and Facebook/Meta have been at it for years.

Consumer Reports was mainly concerned with personal data from organizations with which users would likely have an issue, like hospitals or advocacy groups. Analysts looked closely at the identified TikTok pixels to see what information they shared. TikTok pixels regularly transmit visitor IP addresses, unique ID numbers, pages users view, and what they click and type. It also has access to search requests. All of this is regardless of whether or not the user has a TikTok account.

When asked for comment, TikTok spokeswoman Melanie Bosselait said, “Like other platforms, the data we receive from advertisers is used to improve the effectiveness of our advertising services.”

Bosselait added that her company does not create profiles to sell to advertisers. She also claims that data from non-TikTok users is only used for “aggregated reports that they send to advertisers about their websites.”

“We continuously work with our partners to avoid inadvertent transmission of [certain sensitive] data,” TikTok claims. This type of information would include anything about health conditions, personal finances, or children.

However, CR states that previous investigations have shown that even though sites like Meta and Goole have policies barring transmitting sensitive data, trackers often send it regardless. TikTok’s pixels are no different.

For example, CR looked at the national Girl Scouts domain and found that TikTok has a pixel on every page of the website that can transmit personal information if a child is visiting. The analysts also found that searching for “erectile dysfunction” on WebMD resulted in the tracker reporting the query back to TikTok.

Those are just a couple of examples that returned sensitive information to the company despite its privacy statements and rules. If users knew a website they do not even visit had access to this data, they’d likely be outraged.

“The only reason this works is because it’s a secret operation,” said Jackson. “Some people might not care, but people should have a choice. It shouldn’t be happening in the shadows.”

Some company executives were unaware of what data their firm was sharing or to whom. Consumer Reports informed the Mayo Clinic that its public website (not the patient portal) was sharing data with TikTok. Disconnect checked later to find that the clinic had removed the TikTok tracker but that the site still used a “considerable number” of other pixels, including those from Microsoft, Google, and others.

Currently, there is not much that consumers can do about this situation. However, CR notes that switching to more privacy-friendly browsers such as Firefox or Brave and strengthening security settings can reduce a lot of tracking. Privacy-protecting extensions are helpful too.

Feature Image Credit: TikTok App by Solen Feyissa, Data Value Chain by Open Data Watch

By Cal Jeffrey

Sourced from TECHSPOT

By .

Brave wants to protect its users from a practice known as CNAME cloaking

Privacy-focused web browser Brave has unveiled improvements to its service designed to protect users from even the most sophisticated trackers.

Built upon the notion that advertisements should be optional and web browsing private, Brave is committed to allowing its users to protect their metadata, shield activity from internet service providers (ISPs) and block ad trackers.

In its latest blog post, the company sets out a new feature that mitigates against a technique used by trackers known as CNAME cloaking – a process whereby a tracking domain masquerades as a genuine subdomain of whatever site the user has landed on.

With the rollout of Brave 1.17, to be completed by November 17, the browser will protect more effectively against this threat by cross-referencing CNAME records with canonical name records.

“If the request has a CNAME record, and the same request under the canonical domain would be blocked, then the request is blocked,” stated the firm.

Brave browser update

As explained in the blog post, one way Brave prevents trackers from monitoring its users’ activity online is by blocking domains that are known to pose a threat to user privacy.

However, this process boils down to a game of cat-and-mouse; trackers are always hunting for ways to circumvent these protections, and privacy services are always working to increase their level of sophistication.

“Some trackers use a technique called ‘CNAME cloaking’ to make their tracking code look like a ‘first-party’, more trusted resource,” explained the firm.

“Others use [the technique] to serve their code from unexpected or frequently changing origins, in combination with techniques like domain generation algorithms.”

According to Brave, the privacy community has long been aware of these techniques, but only relatively recently have trackers begun to capitalize on the fact that ad blocking extensions do not have access to CNAME information.

Served under a first-party subdomain, trackers can gain even more information about users’ browsing habits than previously possible, with privileged access to cookies and other local identifiers.

With Brave 1.17, the new CNAME uncloaking feature will be toggled on by default and, beyond safeguarding user privacy, should also deliver a small saving to network bandwidth and CPU cycles at the same time.

Feature Image Credit: Brave

By

Sourced from techradarpro

By

Firefox will now block thousands of web trackers by default, protecting users from many websites, analytics companies, and advertisers that want to follow their paths across the web. The change should speed up the browser and keep users’ web habits more private, while nudging advertisers toward less invasive practices.

The changes are a big deal for privacy, but Mozilla doesn’t push the envelope quite as far as Apple did when it added a similar feature to Safari a couple years ago. Apple’s browser blocks nearly all third-party trackers by default, rather than just known trackers collected on a blacklist. Apple also limits tracker from being used by third parties at all if you haven’t interacted with the website they originate from in a full day.

Apple’s approach goes further to preserve privacy, but it may also mean more headaches for users. Many pieces of the web rely on cookies, a key tracking tool, to keep people logged in or serve them relevant information. By aggressively blocking cookies, Apple risks disrupting the experience on some websites, albeit with the benefit of severely limiting how much information about a user each website is able to access.

Mozilla is trying to strike a middle ground, by only blocking known trackers and not all cookies in general. A spokesperson says the company found that blocking all cookies “leads to scenarios where some websites may not function properly,” and so it chose this partial approach to prevent “potential usability issues.” Anyone who wants more protection can go into Firefox’s settings and change the tracking blocking settings from “standard” — the default setting — to “strict.”

Tracker blocking will be on by default for all new Firefox users starting today, and it’ll become the default for everyone already using Firefox in “the coming months.” If you already use Firefox and want to take advantage of the feature, which has been built-in since October, you can go into settings and enable it before Mozilla flips the switch for everyone.

While Firefox isn’t leading the pack when it comes to blocking trackers, it’s still leaps and bounds ahead of Google’s Chrome browser, which is just starting to dabble in features that can limit tracking. Google has a vested interest in keeping some amount of web tracking alive — the company survives off of ads, which are often targeted — whereas Mozilla and Apple don’t, so Chrome is likely to continue lagging behind.

Feature Image Credit: Mozilla

By

Sourced from The Verge