Skip to main content


How did the Ad Networks find my search?


So a bit ago I got an add for "canned rambutan". I had looked up Rambutan a few days prior after hearing it mentioned 10 hours into the video game Baby Steps. I wasn't using a VPN at the time and I didn't have fingerprinting protections active but I only mentioned it to a few sources (according to my browser history) all of which generally are implied to be private.

Which of these do you think is the reason the ad networks know?
- Wikipedia
- Startpage Search
- Duckduckgo Search
- My ISP
- Firefox
- My Firefox Extensions
- Kubuntu
- CachyOS
- The omnipotent algorithm connecting my mentions of Baby Steps with my progress through the game.
- Does this only make sense if my browser history is incomplete?
- Maybe I was using DNS over HTTPS via Cloudflare at the time of my search.

Any guesses as to where the weak link is?

This entry was edited (5 days ago)
in reply to FoundFootFootage78

Well, without a VPN your ISP sees every site you enter. I wasn't aware they might be selling that data for targeted ads, but it makes sense, why wouldn't them?
This entry was edited (4 days ago)
in reply to PiraHxCx

Looking it up my ISP isn't exactly trustworthy, but there have been no clear allegations. I'd say it's the most likely cause if not my Firefox extensions.

EDIT: I just got another theory, Cloudflare, I'll add it to the list.

This entry was edited (5 days ago)
in reply to FoundFootFootage78

If you're really crazy about your privacy I'd recommend getting rid of any extensions you don't 100% need (keep ublock origin though) as not only can they stalk you themselves but it can also help websites fingerprint you. Keeping your extensions to a minimum will help you blend in with the crowd, especially if you use a hardened browser like LibreWolf and/or Mullvad Browser
in reply to nkk

I use AdGuard rather than uBlock Origin for adblocking, because it allows me to opt-in and only block ads when they are aggressive enough to be annoying. But I've not been trying to minimize fingerprinting. The issue is just that everything I used in this instance came with either a tacit or explicit promise not to track me and I don't know which is lying.

Other extensions I use are:
1. Remove YouTube Suggestions
2. 10ten Japanese Reader (just now disabled)
3. Tampermonkey
4. Proton Pass (because my government services require 2FA, but only offer an official government app that uses the play integrity API, or a Passkey which is only natively supported on Windows or Mac)
5. Time Tracker - Web Habit Builder
6. Improve Crunchyroll (which seems to have stopped Crunchyroll from forcefully dropping my resolution to 144p).
7. SteamDB (just now disabled)

in reply to FoundFootFootage78

Do any extensions have permission to view your browsing data? You can check by opening the extension manager, clicking the extension and clicking the 'permissions and data' tab. I would suspect 5 and 6 the most, 1 might be suspect too. Those extensions by nature would need such permissions to some extent.
in reply to lattrommi

AdGuard, ProtonPass, TamperMonkey, Time Tracker, and 10ten have those permissions. The others don't. I don't think any of these extensions would be able to function without these permissions.
in reply to FoundFootFootage78

I've never used AdGuard but you can customize uBlock Origin to fit your needs and block specific things for specific websites. uBlock Origin is commonly used as a default in hardened browsers which would help you fit in with the crowd even more (although I realize you said you weren't going for anti-fingerprinting, just something to consider)

-

1) I switched to using Grayjay Desktop rather than my browser for YouTube

-

3) If you need a userscript manager, Violentmonkey is an open source alternative

-

4) Proton Pass has an app, yes less convenient without the autofill but better for privacy not to have the extension

-

6) Personally, I would just sail the seven seas

This entry was edited (4 days ago)
in reply to nkk

  1. I have Freetube installed but I found no reason to really use it when I have this browser extension and adblock (though I don't have one enabled for YouTube so I have no idea why I'm not seeing ads). I can probably do what Remove YouTube Suggestions does with Tampermonkey or Violentmonkey anyway so I might switch.
  2. Didn't realize Tampermonkey wasn't open source. I'll look into it when I can eventually be bothered.
  3. I can't use a Passkey on my phone. GrapheneOS doesn't support passkeys.
  4. Piracy isn't worth the hassle to me, though it's not like Crunchyroll has been much better lately.
in reply to FoundFootFootage78

1) If you want maximum privacy, Grayjay and Freetube don't link to accounts so Google doesn't know what you're doing (especially if you're on a VPN) but again, it's understandable if you don't feel that's worth it.

-

3) Ah got it, didn't realize you were using passkeys.

-

4) If you're willing to do a bit of setup, Stremio + RealDebrid ($40 a year) + Torrentio/AIOStreams is pretty much perfect to me (although if you watch a lot of super obscure shows maybe not the way to go as RealDebrid doesn't cache everything)

in reply to nkk

I'm not really interested in maximum privacy, at least right now. I'm slowly moving there though.
in reply to PiraHxCx

The ISP shouldn't even see the search term given basically everything on the internet uses https.

The ISP will see the domain names of the pages you visit if you use their DNS or some other unencrypted DNS but those are unlikely to contain the search term.

This entry was edited (5 days ago)
in reply to chgxvjh [he/him, comrade/them]

Even if you use encrypted DNS they'll still be able to see the domain in the SNI. Websites using ECH are very rare.
in reply to FoundFootFootage78

I would guess the likely culprits are

Firefox extensions

Search engines

Wikipedia

Other search results you may have opened or pre-loaded (not a default Firefox behaviour)

This entry was edited (5 days ago)
in reply to ryannathans

I don't think Wikipedia is a likely culprit. I haven't heard anything about them selling data.
in reply to FoundFootFootage78

You’ll need to provide all the sites you visited immediately after each of the ones you searched. Your origin header will give that info away freely. So if it’s in the query parameters of the URL, then you go to Facebook, it’s as easy as {k: v for k, v in (pair.split("=", 1) for pair in response.headers["origin"].split("?", 1)[-1].split("&"))}
This entry was edited (5 days ago)
in reply to partofthevoice

Firefox only stores the time of my most recent visit so I don't have that information anymore, so let's just assume I went to YouTube immediately afterwards.
in reply to FoundFootFootage78

Did you click on any search results?

I found that the Firefox Browser history is often incomplete.

This entry was edited (5 days ago)
in reply to FoundFootFootage78

Any extension could leak this information as well.

Is your default engine something other then the mentioned search engines? The search suggestion feature leaks information too.

in reply to chgxvjh [he/him, comrade/them]

I had removed all but Duckduckgo and Startpage from my browser.

My browser extensions are a good angle. If they're selling my data to fund themselves that'd explain some things.

in reply to FoundFootFootage78

How old is that game? Are there other people in your demographic who also play the game, and then searched for the same thing?
in reply to FoundFootFootage78

well, it would make no fucking difference if you had a vpn on, ALL IT DOES IS MOVE YOUR EXIT POINT. it cannot touch your browser traffic.

frustrates me to bo end the bullshit fucking ads/lies vpn companies peddle

in reply to Cyberflunk

If my exit point is my ISP, and my ISP is selling my data to advertisers (hypothetically), then a VPN would make a difference. That's why I mentioned it.
in reply to bananabread

And it also could not. Either way it wasn't active at the time so it's down to whether my ISP is selling it.
in reply to bananabread

I would trust Mullvad more than Verizon or ATT to not sell my data.

Wouldn't you?

in reply to bananabread

I would trust something like Mullvad more than ATT or Verizon to not sell my data, wouldn't you?

**this comment was posted like 6 times because all of the Lemmy instances I've been using have been super weird lately not letting me post comments and stuff so I kept trying and kept trying and then all of them pushed through at once.

This entry was edited (2 days ago)
in reply to Skankhunt420

You make it sound like it’s always the case but ISPs in some countries are less centralized/ not on the stock market and rather oldschool so I bet they don’t do anything with your data (yet). Think of utility companies.
in reply to tjoa

some countries


Ok, but what if you live in UK or USA? You can pretty much guarantee without the shadow of a doubt that every single one available is selling your data. In fact, I think their terms even say they will do that.

In a case like that I would 100% rather trust a paid VPN service from a country that isn't a privacy nightmare.

This entry was edited (4 days ago)
in reply to Skankhunt420

So your answer to „you can’t generalize vpn good, isp bad because not everyone is living in the UK and US“ is „but what if everyone does?!“ ok
in reply to tjoa

Even in other countries using something that is tested and proven for its no logs policy beats taking a stab in the dark and being hopeful that your ISP doesn't.

You said yourself you "bet" that ISPs in other countries don't do it but you don't know. Something like Mullvad has been proven not to keep logs which sounds a lot better than some dudes hunch.

But if you want to gamble with your privacy by all means do it but you shouldn't act like you know what you're talking about when you tell people to trust ISPs because you think if you're in a certain country they don't spy on you or sell your data.

This entry was edited (3 days ago)
in reply to FoundFootFootage78

search data would be difficult to obtain for a service provider. it would require a retargeting campaign or something to extract your search values.

search data is already tls encapsulated at the browser. isp can see your tcp metdata, but not the data.

also.. not the point. sorry

in reply to Cyberflunk

I should've known that but forgot. You're right, my ISP shouldn't be able to see anything but that I visited Wikipedia. They wouldn't know that I searched for rambutan.
This entry was edited (4 days ago)
in reply to Cyberflunk

This entry was edited (4 days ago)
in reply to Skankhunt420

I didn't say they didn't do anything, bit the lies they peddle about protecting your browsing is shit, browsing is almost universally https now, you're iso can't see shit, except the IP address you're connected to, a VPN just moves your exit point, that's it, you're iso knows you're connected to a VPN also, btw

I didn't say they didn't do anything my rage is against the marketing

in reply to FoundFootFootage78

If the EFF de anonymization tool can de anonymize your browser, then the ad network can too.

Try searching for something with tor browser - no javascript

in reply to Florencia (she/her)

This isn't a matter for fingerprinting. I haven't directly visited any sites about rambutan other than Startpage, Duckduckgo, and Wikipedia.
in reply to ☂️-

Use duckduckgo.com to search "restaurants near me"

Unless they use a complex system to look up geolocation for all queries and forward an approximate version of that to Bing, then Bing is getting IP addresses and search terms.

This entry was edited (3 days ago)
in reply to FoundFootFootage78

one of the sites you looked at while looking up rambutan? no vpn too, if a page you looked at was served ads by an ad provider they could track you with your ip, as well as assosciating you with a unique fingerprint since you dont have fingerprinting protection. if you only used wikipedia, there is a second rambutan season in some places from november to january, so its possible that they (the rambutan or fruit processing and agricultural industry) are just trying to pick up sales ahead of the season.

if you have sus extensions too.

in reply to FoundFootFootage78

I don't see ads but if I were to, and despite all my precautions some would be on topic based on my past behavior I would methodically dissect to find out the leak. Namely I would try to automate the process :

  • identify a place showing ads
  • take an action, e.g. search or browser, on a verifiable unique topic (in order to prevent from generic suggestions, e.g medication during flu season)
  • verify if the ads become relevant
  • enable/disable any of the tools used, repeat
in reply to FoundFootFootage78

You say you were not using a vpn. Then the site has your ip and probably has meta/google ads or other shit running on it and links the product with your ip.

This data is added to some data broker/ ad network and you see an ad when you visit a site using this network as you have "signalled" interest in the product by viewing the product page the first time.

This entry was edited (4 days ago)
in reply to JoeKrogan

Except the only sites I visited where I mentioned rambutan were Duckduckgo, Startpage, and Wikipedia.
in reply to FoundFootFootage78

Have you considered confirmation bias?

It’s rambutan season and you saw an ad for rambutans. You haven’t mentioned that seeing the ad was weird so I gotta assume you see other ads they’re just not related to something that you searched for recently or something you recognize as being related to something you searched for recently.

in reply to stupid_asshole69 [none/use name]

I don't see many ads, and the ads I do see are never food items. I think this canned rambutan was the first food ad I've seen in years.

I can't even fathom this being a coincidence.

in reply to FoundFootFootage78

It's duckduckgo. Search duckduckgo.com with the term "restaurants near me." You'll often get responses that are close to your IP location.

That couldn't happen unless DDG passes your IP address on to Bing. It's possible they censor part of the IP and only pass part of it to Bing, but probably not.

(Go ahead! Try it!)

Since Bing sells to data brokers, data brokers know your IP is linked to a search for rambutan, even without fingerprinting your browser.

I'm not calling duckduckgo.com a honeypot... I'm also not calling it not a honeypot. But it knows too much for something supposedly private.

Any closed source firefox extension that has access to the browser display could be parsing the texts and selling it and your IP and other identifiers to data brokers. It's part of how these extensions are profitable.

Cloudflare also does highly advanced fingerprinting and has a script called cloudflare insights, so it seems likely that any cloudflare activity is generating marketing data.

This entry was edited (4 days ago)
in reply to FoundFootFootage78

Out of what you say, probably cloudflare or incomplete history. Have a great day!