Get the latest tech news

"Localhost tracking" explained. It could cost Meta €32B


You just can't finish off Zuckerberg.

Meta devised an ingenious system (“localhost tracking”) that bypassed Android’s sandbox protections to identify you while browsing on your mobile phone — even if you used a VPN, the browser’s incognito mode, and refused or deleted cookies in every session. The Meta Pixel script also sends the _fbp value in a request to https://www.facebook.com/tr along with other parameters such as page URL (dl), website and browser metadata, and the event type(ev) (e.g., PageView, AddToCart, Donate, Purchase). “The Meta Pixel script also sends the _fbp value in a request to https://www.facebook.com/tr along with other parameters such as the page URL (dl), website and browser metadata, and the event type (ev) (e.g., PageView, AddToCart, Donate, Purchase).”

Get the Android app

Or read this on Hacker News

Read more on:

Photo of Meta

Meta

Photo of Localhost tracking

Localhost tracking

Related news:

News photo

Meta Is Creating a New AI Lab To Pursue 'Superintelligence'

News photo

Meta Is Creating a New A.I. Lab to Pursue ‘Superintelligence’

News photo

Meta Set to Throw Billions at Startup That Leads AI Data Market