How mergers and acquisitions are hiding who actually is tracking us.
This post is one of our regular monthly blogs accompanying an update to the data displayed on WhoTracks.Me. In these posts we introduce what data has been added as well as point out interesting trends and case-studies we found in the last month. Previous month's posts can be found here: January 2018, December 2017.
We've updated the site today with data collected during January 2018. Due to increased distribution, we have over 115 million page loads this month, an increase of 15% over previous months (see Where does the data come from? for more background on our data collection). The regions from which we are getting data is also diversifying. While 70% of the data still comes from German users, we now have more significant US and international data. We plan to have sufficient data in the coming months in order to provide region-specific tracking breakdowns.
Picking out some of the biggest movers in the rankings this month, we first find Nexage down 262 places this month, and to one tenth of its reach in May last year. This is probably simply a winding down of the operation which was acquired by Millennial Media in 2014, who were acquired by AOL in 2015, who were acquired by Verizon also in 2015. Their landing page now redirects to One by AOL.
One of the challenges for us on whotracks.me is to make the link between tracker domain names, tracking products, and tracking companies. Nexage is an example of how many trackers lead you down a 'rabbit hole' of mergers and acquisitions until you find the company above it all. If we expand out the web of companies underneath Verizon who are also present on whotracks.me, we find 10 different trackers which can be linked: Adap.tv, ADTECH, Advertising.com, alephD, Convertro, Nexage and Vidible under AOL, and Brightroll and Flickr under Yahoo. Furthermore, Yahoo and AOL both have popular web portals (yahoo.com, aol.com and aol.de) to drive more traffic which they can track. This leads Verizon to be able to track at least 6% of web traffic, the 11th highest reach of any company in our dataset. You can now check the full list of companies sorted by their trackers' combined reach here.
A new entry at 546, Smarter Travel Media is another example of a smaller company with giants hiding behind it. The tracker is primarly present on tripadvisor and other travel sites, and infact they are a Tripadvisor company. Tripadvisor in turn is owned by Expedia. Above all of this stands InterActiveCorp (IAC) who own several other web brands, including Vimeo and Mindspark.
The final movers we would like to highlight this month are davebestdeals.com and eshopcomp.com, up 201 and 194 places respectively. Unfortunately we cannot yet trace the owners of these trackers---they are both registered with PrivacyGuard in Panama and have no visible landing page. In fact they are likely operated by the same entity as their domains point to the same CloudFront endpoints, for example on the
istatic subdomain for both domains.
The reason for the lack of transparency in this case is that they are malware. Looking at their profile pages we can see that they have a small presence across many sites, including sites which we know for certain would not have trackers like this in the page (e.g. Google sites, which will only ever contain Google's own trackers). These are likely browser extensions which include code to inject their tracking code in all of the pages the user visits, and send this information back to their servers. The user browsing history which they collect can then by sold on. The Web Of Trust extension was caught doing this in 2015, and our data shows that it is still a common practice (look for the 'Extensions' tracker category on this site).
This style of user history harvesting also has the advantage that it is not blocked by the majority of Ad-blocking and privacy tools. These domains are not on these blocklists, because the list maintainers will not encounter them - unless they happen to install the malware themselves. Therefore, currently only Cliqz and Ghostery 8's AI anti-tracking are detecting these trackers and preventing them from gathering user sessions - because they are using the same data to find trackers that whotracks.me uses.
This month we add data about the content-types loaded by trackers. This is based on values reported by the webRequest 'type' property. By reporting these values we can further characterise tracker behaviours, and quantify risks, such as which trackers are being permitted to load scripts on certain pages.
We add the following new columns for trackers, reported as the proportion of pages where the specific tracker or company loaded particular resource type(s) into the page:
<script> tag or web worker).
iframe: A subdocument (via
beacon: Requests sent through the Beacon API.
image: Image and imageset resources.
stylesheet: CSS files.
font: Custom fonts.
xhr: Requests made from scripts via the XMLHttpRequest or fetch APIs.
plugin: Requests of
object_subrequest types, which are typically associated with browser plugins such as Flash.
media: Requests loaded via
<audio> HTML elements.
With this data we can see that, for example, Google Analytics loads their script on each page load (98% of the time), then registers the visit via a pixel on 59% of page loads. We also see that on 6% of pages a request is also made via the Beacon API.
Similarly, if we look at the Webtrekk tracker, which is present on many popular German websites, we can see that on sensitive websites such as banking (dkb.de) and health insurance (tk.de), the tracker is loaded without scripts. This is at least an indication that in certain contexts website owners are taking care to minimise the potential risk of a third-party being compromised and gathering sensitive information from the page, or even collecting sensitive information by mistake.
As with previous additions to the dataset, we don't yet have these fields visualised on the site, but will be working this in the coming months. In the meantime, the raw data is available for you to explore yourself.