In 2018, respecting your usersâ privacy should be easy, right? After the revelations made by Snowden about the NSA practices and all other that followed, web hosting providers and other services changed their practices, right? Thatâs what we thoughtâââand the illusion didnât last for long. Today we take you on a little data tour: whoâs collecting them, how, and for what?
SETTING UP THEÂ CONTEXT
You might know it; else we recommend you to read the manifestoâââwe recently launched a publication, EcoCrypto, that respects its users and their attention.
Regarding their attention, thatâs our issue. However, when it comes to respecting our usersâ privacy, itâs much bigger than us: we must double check each third party service we use to ensure theyâre not abusing our (and your) trust.
When we published the manifesto, we realized how little people knew about the systematized data harvest that happens online. We decided to write an article to provide a comprehensive overview of the main tracking solution currently enforced pretty much everywhere on the web. At the end of the article, we propose two sets of recommendations. The first one is for everyone: the very basics on how to protect your privacy online. The second one is specific to webmasters: how to respect your usersâ privacy.
THE TRACKERÂ MANIA
Each additional tracker is one more guest at the feast held on our privacy.
Letâs start with the basics: whatâs a tracker? Essentially, itâs a small script one can place on his/her websiteâââit allows the different services used to collect data on the visitors, therefore enabling new services for the webmaster.
A tracker is like a snitch for a third partyâââeach additional tracker is one more guest at the feast held on our privacy.
A SMALL DOZEN OF TRACKERS, THEÂ MINIMUM?
Note: To stay true to the original article (written in French for a French public), we kept French websites as examples. The situation is similar all around the globe, even worse in some countries .
Any media website is using at the very least a dozen trackers. No need to trust us, check by yourself using Ghostery: it lets easily you visualized all the trackers present on a website.
Here is a little tracker-tour of a selection of the most visited websites in France:
- leMonde.fr \[Franceâs #2 (audience) daily national newspaper\]âââ32 different trackers
- leFigaro.fr \[#1 Daily national newspaper\]ââ**â35**
- Mediapart \[Online only publication\]âââ21
- lâExpress \[Weekly magazine\]âââ49
- tf1.fr \[#1 Private TV channel\]ââ**â35**
- France2.fr \[#1 Public TV channel\]âââ18
- Agence France Presse (AFPâââFrench news agency)âââ12
- Finally, the cleanest of the bunch, lâHumanitĂ©, still has 10 different trackers.
Note: The measure was made on July the 18th, on the Homepage of every website. Remember to disable any adblocker or script blocker to see all the trackers on a given website.
Elle.fr
âââ53 trackers; Liberation.fr
\[Daily newspaper\]âââ40Â trackers
Quite often, the people working on/for these websites donât even know about the trackers. We reached out to French crypto publications to let them know about their privacy-intrusive practices. All said they were âsurprisedâ to discover how extensive the net was. Some might say they were laughing at our faceâââyou are the judges.
From this little visit to the horror gallery we can conclude two things:
- The owners/webmasters of 99% of internet websites are apparently not even thinking about respecting their user privacy.
- The users of these websites donât know about the tracking and its consequences. Therefore, they donât ask/push for practices that would be both cleaner and more respectful of their privacy.
If there is any change coming up, it will come from the users: we need to be demanding and uncompromising. To do so, one must know what one is fighting againstâââletâs start a quick tour of some of the shadiest practices taking place in the online tracking world.
A TYPOLOGY OF THEÂ TRACKERS
There are several different types of trackers, hereâs an overview:
- Advertising trackers: These trackers allow webmasters (and advertising services) to collect additional data when a user goes on a websiteâââthis data is then used to increase the effectiveness of the ads. The most common are Double Click and Facebook Ads. Weâll give more details on a subsection of the advertising trackersâââthe pixelsâââa little below.
- Statistics services trackers: the most famous is Google Analytics, but there are many others. Theyâll have their section.
- Social networks trackers: they allow for a direct integration of social media on a website, such as liking a Facebook page from a media website. It means that the user is identified (through his/her Facebook/Twitter/X profile). One last thing: no need to interact with the buttons to be recognizedâââthatâs the whole beauty of the mechanism. Smile! Youâre being spied on.
VISITOR STATS⊠AND AN EXTREMELY DETAILED PROFILE
Each webmaster has the same issue: he/she needs stats to know the most visited pages or articles, where his/her users are coming from, how many are they⊠To do so, the go-to is to implement Google Analytics.
The value proposition of Google Analytics is pretty straightforward: Google is an expert on data collection and processing, youâre probably not. Implement this little script and Google will do most of the work for you: collecting the data, processing it, or presenting it in comprehensive dashboards. Itâs convenient, and most (if not all) websites now use it. The issue? All the data is going through Google, putting it another way: Google is now collecting data on 99% of any websites users, straight at the source (on the website).
If each website were a bar, the Google Analytics situation would be similar to having a Google Home with the mic always on at the very center of the room. Itâs already annoying and problematic when itâs just a few bars/websites. However, now, since almost all websites use this mechanism, it became the web all-seeing eye / all-hearing ear.
Anyone who handled a website with Google Analytics implement knows what weâre talking about: the amount of data available on any user is staggering. Itâs hard to give a precise number because each implementation of Google Analytics is different. Google itself boasts about its 400 different âmetrics and dimensionsââââhere is the list.
Webmaster rejoice! We suggest an alternative at the end of the article.
ONLINE ADVERTISING AND USER PRIVACY: STRICTLY IRRECONCILABLE
When we talked about advertising trackers, it was a rapid overview. Allow us to zoom in a little here. First, some basics about online advertising:
- Itâs paid by action: cost per click, per thousand views, per specific action (register, download an appâŠ)
- All actions are not equalâââa click can come from someone completely outside your main target or on the contrary from the potentially perfect customer
- Online advertising campaigns can be adjusted in real time and at any time.
When the basics are clearly stated, itâs easy to understand that there is a choice to be made between privacy and online advertising. To optimize the online ads, one must collect more and more data to improve his/her targeting and avoid unnecessary expenses.
Online media and social networks often get quite lyrical about their âfight to protect usersâ privacyââââdonât let yourself be fooled. All the most visited websites are big users of online advertising services and use many trackers: in short, they have no respect for their usersâ privacy. Even worse: they are making money out of its violation.
THE SPY-PIXEL
Still unconvinced? You think that âethical advertisingâ is a thing? Let us zoom on a specific kind of trackers: the advertising âPixels,â such as the Facebook Pixel. Once again, itâs a little script that works a bit like Google Analytics. The webmaster implements the pixel on his/her website and gain access to extra (advertising-related) statistics and services.
On of the main interest for webmasters is that all the data collected will be available straight in Facebook Adsâââit makes it much easier to optimize the ads: itâs a mandatory tracker for anybody who is dedicating a significant budget to the platform. Thanks to the pixel, the website owner can make the connection between the ads on Facebook and actions undertook on his website: signups, purchases, downloads, and others.
One of the problems with the Facebookâs pixel is the same as Google Analytics: since the pixel is now everywhere, Facebook is collecting data right at the source on most of the most visited websites.
An example of a retargeting scenario using Facebook (source: Lyfe Marketing)
Besides, the pixel allows a specific kind of advertising campaigns called âretargetingâ: the term refers to any ad where the targeting is made using the previous behavior of the prospects. A typical retargeting flow using Facebook (Pixel and Ads service) looks like that:
- You go to a given website, letâs say a lawnmower shop.
- Smile, someoneâs is spying on you! Thanks to the pixel, youâre immediately recognized, your âFacebook IDâ (unique identifier of your Facebook profile) is added to a retargeting list.
- You go on Facebook and discover incredible sales of lawnmower straight in your newsfeed.
THE LITTLE GIFTS DISCOVERED BY THEÂ WAY
Before we delve into our recommendations, let us examine a concrete example that tells a lot about the challenge it became to respect the privacy of your website users online.
Ever heard of WordPress? Itâs a framework (~engine) allowing you to create blogs and websites easilyâââthis is what we use on EcoCrypto⊠for now.
A default WordPress installation uses a service called Gravatar: thanks to it, each user (=anybody who write articles or comment on one) can have his/her very own profile picture.
Even better, users can go on gravatar.com, create their account and set their profile picture onceâââTada! Your picture is now on every WordPress using Gravatar without having you to set it up again. Nice, right?
Except that the reality behind the gimmick is quite ugly. Gravatar uses the email to match its user with his/her profile picture. It means that by default, anyone commenting on a Wordpress sees his/her email getting a free round-trip to Gravatarâs servers. With the round trip, Gravatar can build a list of the users of every WordPress installationâââstill looking for that sweet custom profile pic?
Many alternatives exist, and they can be set up in a few clicks, but since Gravatar is enabled on all installations, itâs still widely used. The default installation, combined with the widespread ignorance of the practice allows Auttomatic (Gravatarâs developers) to stuff itself with the emails of its users unknowingly collected over the years. To go further, hereâs an interesting read on Gravatarâs privacy issues.
This kind of scenario repeats itself over and over again when it comes to privacy. Everyone agrees with and supports the concept, yet only a few really look into it. On the business side, the ârespecting your usersâ privacyâ theme is nothing else than a potential communication topic: itâs rarely enforced at the software level.
SO, WHAT CAN WEÂ DO?
We tried to stay concise and not delve too much into the technical detailsâââweâve omitted many practices, this article is not exhaustive at all. Dozens, probably hundreds of different tricks and mechanisms exist to track and spy on users online. Some are much more insidious and harder to counter than others, such as fingerprinting.
What inspired this article is the surprisingly hard journey to set up a simple blog that respects its readersâ privacy. Weâve left this topic to the experts, and because of that we are reaching a situation where violating the privacy is now the normâââand those who want to respect it struggle. All of this happening while Apple, Google, Facebook and others are painting themselves as âprivacy championâ in front of the general audience, while they are the first to systemize the very end of the idea of privacy. We should fight back, or maybe we should have ten years ago already? Itâs never too late!
TOOLBOX: THE BARE MINIMUM TO PROTECT YOURÂ PRIVACY
The good news (there is one!) is that protecting your privacy necessitates that you block all the adsâââas well as the script that detects if you have an adblocker or not. Stealth has a bright side!
What follows is the bare minimum setup, you must go much further to be really covered, if ever possible:
1. BLOCK THEÂ ADS
For Chrome users, we recommend the Nano Adblocker + Nano Defender (anti ad-block defuser) combo: itâs easy to set up and works well. Firefox users can use uBlock Origin for similar results.
Note: Whatever adblocker you chose, donât forget to enable the EasyList corresponding to your country. Hereâs a demo GIF for the French list:
You can try your setup by visiting any media website with the adblocker enabled; youâll see a lot of free space! Insidious ads such as sponsored posts (ânative advertisingâ as professionals call them) are not blockedâââbeware.
2. LIST AND BLOCK THEÂ TRACKERS
Ads are only the start. Now we need to tackle the trackers. The good news is that there are very extensions to take care of this for you.
Privacy Badger is developed by the EFFâââthe Electronic Frontier Foundation, a nonprofit that has been defending civil liberties in the digital word for yearsâââitâs not enough to blindly trust them, but it does provide reassurance. You donât need any specific setting, but you might want to have a look at the trackers list (by clicking on the extension icon) and disable those you donât need. At the beginning of the article, we mentioned Ghosteryâââit also works quite well, and might be easier to use for some.
3. USE HTTPS, EVERYWHERE
When you visit a website that uses HTTPS, the exchanges between your browser and the website are encrypted. HTTPS is now widespread, but its implementation on certain websites is quite messy: theyâll make you switch back and force between the secured and regular HTTP. HTTPS Everywhere, another browser extension from the EFF solves the issue: it forces websites to use HTTPS whenever itâs available.
ADDITIONAL NOTES ON PRIVACYÂ TOOLS
If you want to be even safer, use Firefox instead of Google Chrome. If youâre looking for sensitive stuff online, use TOR at least, itâs super easy to set up. Finally, if you want to be a little safer, look for more sensitive stuff, or leak critical information please check TAILSâââan operating system (Linux based) made for privacy. Before going to the dark side of the web, READ and document yourself.
To keep the article short-ish, we limited ourselves to three tools. To really cover your digital steps, youâll have to go much further.
We could have easily listed a hundred of different tools relevant for different situationsâââit would be pointless. You need to be able to pick the most suitable tools for your usage by yourself. To do so, there is no other way than lifting the hood to delve into the technical stuff. Privacy is not given nowadays; you must fight for it.
All around the globe, nonprofits are doing their part with their means. The EFF edits a Surveillance Self Defense guide which could be an excellent place to start.
RESPECTING USERS PRIVACY AS A WEBMASTER
If you are handling a website, the most critical action you could start with is breaking free from Google Analytics. We have chosen Matomo, an open-source and self-hosted analytics solution. The self-hosted part means that the data stays on our servers: itâs essential.
Depending on your hosting provider, setting up Matomo might be more or less accessible. If your hosting provides supports Softaculous, the installation will be done in a few clicks. Else, you might need to learn a thing or two on server management.
The other actions you can undertake will depend on the services and framework you use. Rather than a list of tools, let us suggest a methodology:
- Third-party services minimization: reduce to the very minimum the number of third-party services you use. Each new service is a potential risk both for your website security and for your usersâ privacy. Even a decent, honest service can go rogue in a flash, and it wonât warn you about it.
- Investigate any third-party service you do implement: despite 1/, youâll have to use some third-party services. Look into the developers of these services, their other products, the reviews. There might even be other people who audited their code and talked about it. Use open-source services whenever itâs possible.
- Forget about online advertising on the main services (Social media, GoogleâŠ)âââyou canât reach cost-efficiency on these services without violating your usersâ privacy.
- Ask for help! More and more people are getting âprivacy-fluentâ and would be happy to help a well-intentioned webmaster to establish a decent setup.
This article is the translation of an original (French) EcoCrypto.fr story.