Does anybody with a STRONG BACKGROUND IN WEBSITE PRIVACY have time to vet this research? Are TikTok and Meta pixels REALLY doing the things claimed? I'm concerned it may be overstating things in an attempt to sell its tag monitoring tools.

https://jscrambler.com/blog/beyond-analytics-tiktok-meta-ad-pixels

The Collection of Commercial Intelligence: TikTok & Meta Ad Pixels

Jscrambler analyzed the TikTok and Meta ad pixels used on websites and found that their default behavior requires immediate attention.

Jscrambler
@dangoodin detailed cart checkout etc is swiftly becoming a hard requirement of advertisement partners. I hold immense dislike for it. They say they need it for “attribution” under contracts but it makes me deeply uncomfortable.

@dangoodin

Runtime analysis confirms what privacy researchers have warned about: Meta and TikTok ad pixels harvest product-level commerce data, scrape PII from checkout forms, and can transmit data before consent management platforms activate.

The hashing both platforms use? The FTC ruled in 2024 it does not constitute anonymisation. Deterministic SHA-256 hashes of emails and phone numbers are trivially matched against existing platform databases. The BetterHelp enforcement action proved this isn't theoretical.

The underrated risk: every merchant running these pixels feeds competitive intelligence — pricing, conversion rates, catalogue data — directly into platforms that sell targeting to their rivals.

One claim to treat with caution: Jscrambler reports Meta's automatic events feature captured partial payment card details (last four digits, expiry, cardholder name) from checkout pages. The mechanism is plausible — the feature scans visible DOM elements by default — but this specific finding hasn't been independently reproduced yet.

Source: Jscrambler Security Research Team, cross-verified against Meta's own documentation, FTC enforcement actions (BetterHelp, Nomi), and independent CMP vendor warnings.

https://jscrambler.com/blog/beyond-analytics-tiktok-meta-ad-pixels

#gprs #privacy #infosec

The Collection of Commercial Intelligence: TikTok & Meta Ad Pixels

Jscrambler analyzed the TikTok and Meta ad pixels used on websites and found that their default behavior requires immediate attention.

Jscrambler
@n_dimension @dangoodin I haven't read jscrambler claims, but one significant mitigating factor vs tracking pixels is that an array of browsers (prompted by Firefox back in 2019) have turned to first-party isolation (FPI) caching techniques: each site you visit (as represented in your Location bar) has a separate cache associated with it so that 3rd-party trackers have to send you different pixels/cookies for each site you visit.
@n_dimension @dangoodin This BTW is the entire reason why Google lost its lunch over tracking... Firefox implemented FPI then Safari and others followed suit. Feeling the pressure, Google then rolled out similar "Tracking Protection" in Chrome but with the infamous catch that you had to allow the browser itself to collect browsing data.

@n_dimension @dangoodin The jscrambler site seems to be saying that the "pixels" are actually programs that felch PII right off the pages where they exist.

IDK what to think about that. Clearly the websites including that Tiktok/Meta code are allowing it and are in effect "sharing data with our partners". That points to a general and massive cultural failure in IT, not the least of which is the browser architecture that would allow 3rd party scripts to do this.

Meta Pixel Lawsuits Are Out Of Control - Learn How To Stop Them

The rise of lawsuits centered around the use of Meta Pixel has created a challenging legal landscape for businesses and is a stark reminder from those who just recently dealt with the ADA lawsuits and needed to make changes to their websites to become compliant.   This tracking tool, which collects user data and integrates […]

Captain Compliance
Facebook Is Receiving Sensitive Medical Information from Hospital Websites – The Markup

Experts say some hospitals’ use of an ad tracking tool may violate a federal law protecting health information

@r0k @tasket @n_dimension @dangoodin I was part of a class action settlement a few years back from Kaiser, for a privacy breach, which it attributed to the Meta ad pixel. Maybe they were playing fast and loose with attribution because it allowed them to shift blame elsewhere, but I read it as a non-theoretical privacy risk associated with tracking via ad pixels.

@tasket @n_dimension @dangoodin

Let's ask this the other way around. Waterfox with Ghostery and PrivacyBadger running should give them very little to work with, correct? Or am I fooling myself?
(mind you, I use neither AI-Meta-Book nor Tiktok, but of course that doesn't mean that I'm not exposed to their scripts on any non-Mastodon page that I visit...)

@dirkhh I was going to mention uBlock Origin; it claims to block trackers so one would expect it blocks these as well.

@tasket
Well that was easy... added uBlock Origin.
There appears to be some overlap between it and ghostery, but ghostery claims that especially for ad-blocking they cover more...

I don't think having both will hurt me (except likely burning more CPU cycles.

Thanks

@dirkhh IIRC ghostery is based on a partnership with the adtech industry and has tried to monetize its use in the past. Their company was founded on the idea that ad tracking can be perfected, which IMO makes them true believers in something that is only capable of exploitation and misery.
@tasket
The things you learn on the fediverse. Did some reading on this and yeah... not good. Dang..

@dirkhh @tasket

privacy badger is worth a look

@joriki @tasket

Privacy Badger is awesome. And certainly from a highly reputable source.

@dirkhh @tasket

decentraleyes is another complementary addon

@dirkhh @tasket

otoh, every addon is a more likely unique fingerprint...

@joriki @dirkhh @tasket noscript can be a bit intrusive, but it works.
@tasket @dirkhh Yuck, well that's ghostery uninstalled, then!
@n_dimension @dangoodin given that #NSAbook literally deployed local "webservers" to enable Cross-#App - #Tracking on #Android and #iOS, I'm not surprised they didn't already invent an "airgapped data transfer protocol" for nonconsensual #tracker and #DataExfiltration...
@dangoodin it looks credible, given a 5 minute read and a few decades pottering around in the software industry. The behaviour (scraping data before consent) fits perfectly with other reported bad habits, e.g. https://localmess.github.io/
They probably justify it as, “Well, it’s called metadata, so it’s obviously ours.”
Covert Web-to-App Tracking via Localhost on Android

@dangoodin Generally speaking this article doesn't describe anything new or novel. You can accomplish most of what's detailed here with a Hubspot account.

The main difference for Meta and TikTok is how enormous the platforms are and how wide their data reach is for each user. But because their popular, their tracking gets more impressions than other sites.

There's really nothing hyperbolic here, unfortunately.

@dangoodin @briankrebs Checks out. If anything, it's only scratching the surface. Many (most?) businesses are unknowing accomplices.

https://news.ycombinator.com/item?id=47431194

Who's selling the data is the far more serious issue here. Behind this is a rema... | Hacker News

@dangoodin so it’s like a rainbow table for PII data of big social networks?