How I tracked myself down using leaked location data in the in-app ads, and what I found along the way.

  • FauxLiving@lemmy.world
    link
    fedilink
    arrow-up
    13
    ·
    edit-2
    9 hours ago

    Great article. It should be noted that your web browser allows websites to do this with javascript.

    Also, since this tracking isn’t really trying to hide, people have compiled lists of the dns names of the destinations of these requests.

    If you host a DNS server and you take that list and return NULL for everyone on the list. Then clients on your network who have ad tracking software will try to look up the destination to send your data and your DNS will tell them that there is nowhere to send the data and so the data isn’t delivered. So, all of the smart TVs, game consoles, refrigerators, toasters and doorknobs which automatically send data but you cannot configure will fail because they use DNS also.

    This sounds complicated to do, but I’m just describing Pi-hole (https://pi-hole.net/). It only takes a few minutes to setup the container and change your router’s DHCP configuration in order to give out the address of the Pi-hole DNS server.

    Assuming you’re on Linux, which you are because you’re a reader of a c/Privacy… right?