Warning: Some posts on this platform may contain adult material intended for mature audiences only. Viewer discretion is advised. By clicking ‘Continue’, you confirm that you are 18 years or older and consent to viewing explicit content.
Attached: 1 image
So this, from Firefox, is fucking toxic: https://mstdn.social/@Lokjo/112772496939724214
You might be aware Chrome— a browser made by an ad company— has been trying to claw back the limitations recently placed on ad networks by the death of third-party cookies, and added new features that gather and report data directly to ad networks. You'd know this because Chrome displayed a popup.
If you're a Firefox user, what you probably don't know is Firefox added this feature and *has already turned it on without asking you*
I can already see how Advertisers AND Websites will collude and break this one.
Specifically placed ads; targeted at specific website pages which a majority of their target grouping will visit.
Generate an ad that will specifically reside on a page deep inside of the site; think 4+ clicks deep; which is intensely personalized to their target. 1
Ad will trigger; register “Impression” and be boxed up into Differential Privacy set by the DAP.
Since that’s the only ad targeted for that specific page, any impression is an answer of 1 or ‘True’.
Through microtargeting of these deep pages they can learn a lot about what people do online and could potentially break Differential Privacy.
1 - In this example the URI being targeted could be something like https://www.example.com/zhuli/do/the/* in such a way that when you visit https://example.com/zhuli/do/the/thing/order.php is always recorded.
In theory this could be defeated easily if a fork of Firefox wanted to send lots of noise or someone decided to emulate many Firefox clients with false information.
I can already see how Advertisers AND Websites will collude and break this one.
1 - In this example the URI being targeted could be something like
https://www.example.com/zhuli/do/the/*
in such a way that when you visithttps://example.com/zhuli/do/the/thing/order.php
is always recorded.https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap#name-security-considerations
In theory this could be defeated easily if a fork of Firefox wanted to send lots of noise or someone decided to emulate many Firefox clients with false information.