Software

Apple arms web browser privacy torpedo, points it directly at Google's advertising model

Safari tech ready to be ignored by online ad giants like all other privacy proposals


Apple's WebKit team, which develops the plumbing beneath the iGiant's Safari browser, has proposed a way that online ads can be measured while maintaining the privacy of those browsing the internet.

The proposal is called Privacy Preserving Ad Click Attribution For the Web and its available for testing as an experimental feature in Safari Technology Preview 82+. It's a way of providing click attribution – linking an ad click to an event like a purchase – that lets advertisers measure ad effectiveness without relying on potentially invasive cross-site tracking.

"Critically, our solution avoids placing trust in any of the parties involved — the ad network, the merchant, or any other intermediaries — and dramatically limits the entropy of data passed between them to prevent communication of a tracking identifier," explains John Wilander, a web engineer at Apple, in a blog post.

In a typical scenario, an internet user conducting a Google Search might see an ad displayed in a list of search results and click on it to buy the advertised item. The store web page would request a tracking pixel from Google to report back user interactions, in order to attribute the purchase to the search ad.

The new WebKit mechanism would have Google, or whatever site is hosting the ad, store the ad click. The destination site would connect conversions – desired actions like a purchase – to the stored ad click. It would do so by using a tracking pixel request to Google that gets redirected back to the merchant site to confirm an ad campaign identified by a specific number worked.

The proposal limits ad campaign identifiers to a range from 0 to 63 in order to prevent the number from becoming a unique identifier.

The task of reporting the attribution to the ad source would fall to the browser. "Once the browser has matched a conversion against a stored ad click, it sets a timer, randomized between 24 and 48 hours," explains Wilander. "When that timer fires, the browser makes an ephemeral, stateless POST request to the same well-known location."

Handy, but marketing

The proposal is consistent with Apple's attempt to occupy the moral high-ground of technology by championing privacy at the expense of the surveillance capitalism embodied by Google and Facebook. Note this is for Western iThing users only, if you're a Chinese customer privacy is just a distant dream.

Augustine Fou, a cybersecurity and ad fraud researcher who advises companies about online marketing, expressed enthusiasm for Apple's ad tech in an email to The Register.

"The protocol is great, but it may be too big of a change for most ad tech to understand and then deploy," he said.

"Simple things like order numbers won't be leaked in plain text as query strings on the url; and important things like user IDs are also not leaked in the same way. For years, ad tech middlemen have been harvesting user IDs by simply reading them off the urls since they were literally in plain text and even conveniently marked for them."

Consumers may find Apple's promise of privacy appealing but the ad industry isn't exactly clamoring to know less. Fou said this isn't something the ad industry wants. "It will be ignored, delayed, suppressed, and argued against, like DNT and every other privacy initiative before it," he said.

One step forward and one step back for Apple's privacy campaign with latest Safari build

READ MORE

However, given recent political interest in revisiting ad tracking limitations, there's a chance regulators may get behind Apple's proposal.

The technology doesn't address ad fraud specifically – which is a broad topic – but could help reduce a specific form of it, ad attribution fraud. Fou explains that's when miscreants click the attribution URL repeatedly to ensure they are the last click and thus get paid the attribution bounty.

Apple's attribution scheme also isn't a complete privacy solution for the web; rather it needs to be considered in conjunction with other info-limiting systems like the company's Intelligent Tracking Protection.

Fou doesn't see the technology as a threat to Google's data gathering – look to Amazon for that. "Google can scan users' Gmails to see what items they bought," he said. "That is why Amazon removed the list of products from order confirmation emails and require the user to click and login to Amazon to see the order details."

If privacy-preserving attribution takes hold, the hardest hit companies are likely to be marketing attribution platforms, said Fou. ®

Send us news
38 Comments

Google gooses Safe Browsing with real-time protection that doesn't leak to ad giant

Rare occasion when you do want Big Tech to make a hash of it

US and Europe try to tame surveillance capitalism

Trade watchdog argues that browsing and location data are sensitive and deserve to be defended

Microsoft Copilot for Security prepares for April liftoff

Automated AI helper intended to make security more manageable

In the rush to build AI apps, please, please don't leave security behind

Supply-chain attacks are definitely possible and could lead to data theft, system hijacking, and more

IAB Europe's ad consent popups pose privacy problem

Court of Justice of the European Union says consent identifers are personal info, subject to GDPR

March Patch Tuesday sees Hyper-V join the guest-host escape club

Critical bugs galore among 61 Microsoft fixes, 56 from Adobe, a dozen from SAP, and a fistful from Fortinet

Infosec teams must be allowed to fail, argues Gartner

But failing to recover from incidents is unforgivable because 'adrenalin does not scale'

Forget TikTok – Chinese spies want to steal IP by backdooring digital locks

Uncle Sam can use this snooping tool, too, but that's beside the point

Row breaks out over true severity of two DNSSEC flaws

Some of us would be happy being rated 7.5 out of 10, just sayin'

FreeBSD Foundation hands out Beacon gongs for safer software

Multiple CHERI-related projects win money for important research that prizes safety over speed

Truck-to-truck worm could infect – and disrupt – entire US commercial fleet

The device that makes it possible is required in all American big rigs, and has poor security

Five Eyes tell critical infra orgs: Take these actions now to protect against China's Volt Typhoon

Unless you want to be the next Change Healthcare, that is