this post was submitted on 12 Nov 2024
692 points (96.4% liked)

Memes

45779 readers
1946 users here now

Rules:

  1. Be civil and nice.
  2. Try not to excessively repost, as a rule of thumb, wait at least 2 months to do it if you have to.

founded 5 years ago
MODERATORS
 
you are viewing a single comment's thread
view the rest of the comments
[–] ReversalHatchery@beehaw.org 18 points 3 weeks ago (12 children)

google through only the web, what a fucking joke. if you have a google account check your activity history. it will list the times you have opened an app.

if you don't have a google account but your phone has google services, don't be afraid that you can't check it, they're still harvesting it.

want to avoid it?
Step 0: don't by samsung. xiaomi neither, they plan to make you unable to execute the next step.
Step 1: unlock your phone. take ownership into your hands. but back up your photos, the 2FA Authenticator app's data and whatever else is important, because it will get deleted.
Step 2: install a privacy oriented custom ROM.
Step 3: profit

keep bank services contained in the firefox browser. if they don't allow access there, switch banks, you'll be better off with a smaller one anyways.

[–] undefined@lemmy.hogru.ch 1 points 3 weeks ago (2 children)

I’m a broken record: block Google (or whomever) with network-based blocking (IP and/or DNS), these guys have third-party tracking in virtually every website and app.

[–] ReversalHatchery@beehaw.org 1 points 3 weeks ago (1 children)

as an additional measure, sure. but these blocks are not hard to circumvent, so it's not enough in itself

[–] undefined@lemmy.hogru.ch 1 points 3 weeks ago (1 children)

They’re not hard to circumvent, sure but then why am I so effectively blocking almost everything not tied to the “real” first-party domains?

[–] ReversalHatchery@beehaw.org 0 points 3 weeks ago (1 children)

because they don't yet circumvent it. but also, are you completely sure everything is blocked? DoT, DoH traffic and such?

[–] undefined@lemmy.hogru.ch 1 points 3 weeks ago* (last edited 3 weeks ago)

Well I MITM myself quite often to confirm it. I’m also smashing together hundreds of blocklists, and I always check the network tab of my browser’s developer tools and very rarely see anything coming from third-party domains.

Sure, sometimes assets are on the actual domain I’m visiting (or its CDN) but most of the time, even tracking scripts there are broken because they still call the blocked scripts.

By the way, it’s hilarious that everyone wants to fight so hard about this yet when someone says “use an adblocker” nobody says anything as if it’s the end-all solution.

I didn’t say “I have a bulletproof, surefire way to fix this.” I said “use network-based blocking.” However effective that is is up to the person implementing it; you have no idea how effective my setup is because you don’t have access to its configuration.

[–] _pi@lemmy.ml 1 points 3 weeks ago* (last edited 3 weeks ago) (1 children)

Almost every B2C company I've worked at, I've written or had my devs write proxies for whatever trackers we use. The reality is that every company to whom this data matters to figure out their business model will proxy their trackers. If they don't they need to fire their lead engineers.

It's actually pretty easy to disguise this traffic even to the point where you can use the originating server/cdn to interleave the tracking with the content source.

[–] undefined@lemmy.hogru.ch 1 points 3 weeks ago (1 children)

Proxy? Is it that hard to figure out how to bundle and serve assets from the same domain? 😂

[–] _pi@lemmy.ml 0 points 3 weeks ago (1 children)

It's not about serving assets it's about hiding telemetry from adblockers, dns filters, ip lists, etc.

[–] ReversalHatchery@beehaw.org 2 points 2 weeks ago

businesses are truly developing malware

load more comments (9 replies)