Follow π prompts below to explore how trackers and other embedded scripts collect, store, and identify your data in the browser.
Websites can access a lot of information about visitors using basic technologies of the internet.
π View data from your device accessed with only Javascript.
window.navigator into the Console and press return to see from where the data (Example 1-1) was captured.π Every web page you view on the internet has access to your IP address.
This method is easy to spot. When you click an ad or share a website extra URL parameters, like utm_source, utm_campaign, are added to the end of the link. These parameters can pass data about your activity to analytics and advertising tools to track the effectiveness of marketing campaigns.
π Examine the two example URLs containing link tracking parameters.
A tracker is any code that collects data on users. The Ghostery tracker blocker describes 12 categories of trackers, including advertising, analytics, widgets, and telemetry. As you might guess, the most prevalent trackers are built by large ad companies like Google, Facebook, Amazon, and Adobe. While some trackers are necessary to remember your login status, those that collect your data to sell it or manipulate you are most certainly not.
π Some trackers are obvious from their visual components, such as the embedded widgets and media on this page (Facebook and X buttons, Youtube video).
Nothing to see here. π This method is invisible unless you examin the source code.
Cookies are used by websites to store information in your browser. Cookies provide essential services, like remembering your identity so websites will remember you are logged in or store your preferences. However, they also let sites track you, even if they only know you by this identifier.
π Follow the prompts to view saved cookies
criticalwebdesign.github.io and look for cookies prefixed with cwd Example 4-1 displays this data (the date, hour, minute, and seconds when you visited this page). Refresh the page to update the date. Try deleting the cookie and reloading the page to see what happens.
document.cookie = "msg=hello, world!;"
console.log(document.cookie)
//-> "msg=hello, world!; ..."
The Web Storage API associates data values with keys (like JSON) to make it easier to retrieve or update data in the browser.
π Explore Local Storage data in your browser
cwd Example 5-1 shows this data (when you visited this page). Refresh the page to update the date. Try deleting the row and reloading the page to see what happens.nyt-wordle-moogle).
localStorage.setItem("abc", 123)
localStorage.getItem("abc")
//-> 123
One data point that can't be directly accessed from your online activity is your identity. When you login to a web service (that presumably knows your name) a unique string of characters called a token is saved inside a cookie in your client. The cookie is sent with every request to that service to identify you and connect your activity across each browser and device. You won't, for example, have to repeatedly enter your name and password across every page of that site, and the site will customize your experience using your activity. Your YouTube recommendations and history (and targeted ads) across devices will be the same. This is called deterministic tracking.
A tracker attempting to collect your data may not know your real name but that won't stop them from creating a profile for you and assigning tracking IDs to match your activity. Whether you are logged in or not, cross-device tracking can connect you to your activity and manipulate your behavior across all your browsers, apps, and devices. For example, if you click a link in an email or webpage with link tracking parameters it can link your profiles, even anonymous profiles, across devices.
_fbc is the name used by the cookie for the Meta Tracking Pixel (see below) used by Facebook and others to track users across the web._ga is an identifier used by Google Analytics to track users.
π These are set by other domains in DevTools > Application.
With the web progressively being less accepting of third party cookies, even if you are not logged-into a service and careful about your actions, companies can still use probabilistic tracking to identify you from your anonymous activity. By using browser fingerprinting to consider collections of unique attributes about user devices (like browser version, device type, operating system, IP addresses, browsing patterns, and more) this algorithmically-enhanced method employed by most ad targeting campaigns has "a 97.3 percent chance of accurately identifying users across devices." Much like many other methods listed above, this tactic is invisible, yet requires no cookies or embedded code to identify your activity across the web
π Find out how easy it is to track you using only your fingerprint
Nothing to see here. π This method is invisible.
You can't see it because it's invisible, but this 1x1 pixel image is one of the sneakiest forms of tracking out there. A Tracking pixels are image files that use request headers to collect data and identify users. They don't need Javascript to run and can even inform marketers when and whether you opened their emails.
π Find a tracking pixel in DevTools
π This tracking pixel
has been edited to allow you to see it.
π See how advertisers categorize you
Unique ID Parent Name Tier 1 Tier 2 Tier 3 Tier 4
16 1 Auto Type Automotive Auto Type
17 16 Budget Cars Automotive Auto Type Budget Cars
18 16 Certified Pre-Owned Cars Automotive Auto Type Certified Pre-Owned Cars
19 16 Classic Cars Automotive Auto Type Classic Cars
20 16 Concept Cars Automotive Auto Type Concept Cars
21 16 Driverless Cars Automotive Auto Type Driverless Cars
22 16 Green Vehicles Automotive Auto Type Green Vehicles
23 16 Luxury Cars Automotive Auto Type Luxury Cars
24 16 Performance Cars Automotive Auto Type Performance Cars
It's worth noting here an interesting detail about ad blockers, which usually function by intercepting and preventing requests for ad networks from embedded scripts and resources. To do this they must maintain lists (known as blocklists) in order to know which domains are tracking and trying to manipulate users.
...
adnologies":{
"properties":["adnologies.com","heias.com"],
"resources":["adnologies.com","heias.com"]},
"Adobe":{
"properties":["adobe.com","livefyre.com","marketo.com","tmogul.com","tubemogul.com","typekit.com"],
"resources":["2o7.net","adobe.com","adobedc.net","adsymptotic.com","auditude.com","demdex.com","demdex.net","dmtracker.com","efrontier.com","everestads.net","everestjs.net","everesttech.net","fyre.co","hitbox.com","livefyre.com","marketo.com","marketo.net","mktoresp.com","omniture.com","omtrdc.net","scene7.com","sitestat.com","tmogul.com","touchclarity.com","tubemogul.com","typekit.com"]},
"Adomik":{
"properties":["adomik.com"],
"resources":["adomik.com"]},
"AdOnion":{
"properties":["adonion.com"],
"resources":["adonion.com"]},
...
π View and discuss inspiring cultural examples
Critical Web Design by xtine burrough and Owen Mundy (MIT Press) forthcoming