-
-
Notifications
You must be signed in to change notification settings - Fork 388
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect and block tracking pixels #794
Comments
Can PB just blacklist known email tracker domains? Or should this be a toggle feature with a button and some indicator that it is working in emails? I found a list of trackers and am thinking you can stop 1x1 img from downloading if it comes from that domain? Anyway, I want to work on this, but don't know which way PB wants to go re: blacklist vs visible toggle button |
As a matter of principle, Privacy Badger must not maintain blacklists. This makes our job harder. This feature would probably be a new kind of tracking heuristic where Privacy Badger would decide whether certain image resources were tracking pixels (tiny image dimensions with a non-trivial query string?) and then learn to block the domain (probably) the pixels are served from. This might be the same task as #367 (comment). |
Related: #1635. |
I'm going to have a go at implementing this.
What decides if a query string is non-trivial? Possible conditions:
|
Since there is so much overlap between #2088 and this, should we put a hold on this issue for now? @bcyphers already opened a PR.
I was thinking of reusing either our HTML5 local storage entropy estimation function or the one for cookies. The main technical obstacle with general-purpose pixel detection seems to be that there doesn't seem to be a way to get image dimensions from inside |
Yeah, this is tough. I think we need to update the entropy function (per #2088), and after that it might be worth applying the same kind of heuristic to email pixels. @ghostwords I think querystring contents alone are fine; a tracker is a tracker whether it's attached to an invisible pixel or a banner graphic. To be less invasive, we could just try stripping off high-entropy query params from image requests in emails. |
Relevant study: "I never signed up for this! Privacy implications of email tracking" (from Proceedings on Privacy Enhancing Technologies 2018) |
Identify and block the presence of tracking pixels in emails opened using the browser.
The text was updated successfully, but these errors were encountered: