4/17/2023 0 Comments Adguard 6k![]() This simple setup allows web analytics firms to load their scripts inside a browser without revealing their real domain to the browser itself, but also to any ad-blocking extension users might be using.įurthermore, as a side-effect of loading tracking scripts via a subdomain on the main website, the tracking scripts are now also considered first-party content instead of third-parties. On a website, implementing CNAME cloaking required that website owners create a subdomain such as, which silently redirects to the analytics company's main domain (i.e., ). This redirection usually takes place on a DNS server and is invisible to end-users who just receive the IP address of b., without knowing that a DNS CNAME-based redirection even took place.ĬNAME cloaking became a popular technique with online web analytics and tracking companies in 2020 when browser makers slowly started to deploy built-in ad-blocking and anti-tracking features to their software.Īs the number of web users using anti-tracking features increased, online tracking companies adapted by switching to CNAME cloaking. Standing for Canonical Name, CNAMEs are a type of entry inside DNS records that allow a domain to redirect a query to another domain entry.įor example, a CNAME for a. can be used to redirect DNS queries to b. Named CNAME Cloaking, the technique abuses CNAME. The list, made available on GitHub, is the largest and most comprehensive of its kind, allowing users to deploy defenses against a technique that has been slowly adopted by an increasing number of web analytics companies to track users as they move across the internet. ![]() Ad-blocker and privacy software maker AdGuard has published today a list of online trackers that abuse the CNAME cloaking technique to bypass browser privacy defenses and track users across the internet. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |