So a bit ago I got an add for “canned rambutan”. I had looked up Rambutan a few days prior after hearing it mentioned 10 hours into the video game Baby Steps. I wasn’t using a VPN at the time and I didn’t have fingerprinting protections active but I only mentioned it to a few sources (according to my browser history) all of which generally are implied to be private.
Which of these do you think is the reason the ad networks know?
Any guesses as to where the weak link is?
Privacy has become a very important issue in modern society, with companies and governments constantly abusing their power, more and more people are waking up to the importance of digital privacy.
In this community everyone is welcome to post links and discuss topics related to privacy.
much thanks to @gary_host_laptop for the logo design :)
It’s duckduckgo. Search duckduckgo.com with the term “restaurants near me.” You’ll often get responses that are close to your IP location.
That couldn’t happen unless DDG passes your IP address on to Bing. It’s possible they censor part of the IP and only pass part of it to Bing, but probably not.
(Go ahead! Try it!)
Since Bing sells to data brokers, data brokers know your IP is linked to a search for rambutan, even without fingerprinting your browser.
I’m not calling duckduckgo.com a honeypot… I’m also not calling it not a honeypot. But it knows too much for something supposedly private.
Any closed source firefox extension that has access to the browser display could be parsing the texts and selling it and your IP and other identifiers to data brokers. It’s part of how these extensions are profitable.
Cloudflare also does highly advanced fingerprinting and has a script called cloudflare insights, so it seems likely that any cloudflare activity is generating marketing data.
You say you were not using a vpn. Then the site has your ip and probably has meta/google ads or other shit running on it and links the product with your ip.
This data is added to some data broker/ ad network and you see an ad when you visit a site using this network as you have “signalled” interest in the product by viewing the product page the first time.
Except the only sites I visited where I mentioned rambutan were Duckduckgo, Startpage, and Wikipedia.
Have you considered confirmation bias?
It’s rambutan season and you saw an ad for rambutans. You haven’t mentioned that seeing the ad was weird so I gotta assume you see other ads they’re just not related to something that you searched for recently or something you recognize as being related to something you searched for recently.
I don’t see many ads, and the ads I do see are never food items. I think this canned rambutan was the first food ad I’ve seen in years.
I can’t even fathom this being a coincidence.
well, it would make no fucking difference if you had a vpn on, ALL IT DOES IS MOVE YOUR EXIT POINT. it cannot touch your browser traffic.
frustrates me to bo end the bullshit fucking ads/lies vpn companies peddle
Wasn’t Mullvad famously raided and found to keep no logs?
I’d sure trust that more than any ISP in UK or USA and I think you would be crazy not to as well.
One has a proven track record, the others undoubtedly do it and have been known to do it and tell you they do it.
It frustrates me to no end that people can’t understand that truth.
Even with TOR and shit they say don’t do that and I think that’s wrong. Sure sure, fingerprinting or whatever. I believe there is a much more tangible risk of your ISP knowing that you are connecting to TOR in the first place especially in countries like UK and USA.
Sure if you lived in Belize or something where it doesn’t matter it wouldn’t be a big deal but living in those two countries and even like Canada and Germany automatically makes you a target for using it.
Out of those options or a VPN I pay anonymously with Monero or mail cash to I would consider that much, much safer than any ISP.
I encourage you to look up what Snowden said about ATT helping the NSA during Prism which is absolutely still ongoing.
In fact, here you go heres a small part of it https://www.pbs.org/wgbh/frontline/article/how-att-helped-the-nsa-spy-on-millions/
But sure keep preaching about how VPNs don’t do anything and instead trust the companies that have direct interests to the governments they serve to stay in favor and that have your credit card and address on file. That is much more secure!
I didn’t say they didn’t do anything, bit the lies they peddle about protecting your browsing is shit, browsing is almost universally https now, you’re iso can’t see shit, except the IP address you’re connected to, a VPN just moves your exit point, that’s it, you’re iso knows you’re connected to a VPN also, btw
I didn’t say they didn’t do anything my rage is against the marketing
If my exit point is my ISP, and my ISP is selling my data to advertisers (hypothetically), then a VPN would make a difference. That’s why I mentioned it.
search data would be difficult to obtain for a service provider. it would require a retargeting campaign or something to extract your search values.
search data is already tls encapsulated at the browser. isp can see your tcp metdata, but not the data.
also… not the point. sorry
I should’ve known that but forgot. You’re right, my ISP shouldn’t be able to see anything but that I visited Wikipedia. They wouldn’t know that I searched for Rambutan.
A vpn is just another isp, which could also sell your data
I would trust something like Mullvad more than ATT or Verizon to not sell my data, wouldn’t you?
**this comment was posted like 6 tomes because all of the Lemmy instances I’ve been using have been super weird lately not letting me post comments and stuff so I kept trying and kept trying and then all of them pushed through at once.
You make it sound like it’s always the case but ISPs in some countries are less centralized/ not on the stock market and rather oldschool so I bet they don’t do anything with your data (yet). Think of utility companies.
Ok, but what if you live in UK or USA? You can pretty much guarantee without the shadow of a doubt that every single one available is selling your data. In fact, I think their terms even say they will do that.
In a case like that I would 100% rather trust a paid VPN service from a country that isn’t a privacy nightmare.
So your answer to „you can’t generalize vpn good, isp bad because not everyone is living in the UK and US“ is „but what if everyone does?!“ ok
Even in other countries using something that is tested and proven for its no logs policy beats taking a stab in the dark and being hopeful that your ISP doesn’t.
You said yourself you “bet” that ISPs in other countries don’t do it but you don’t know. Something like Mullvad has been proven not to keep logs which sounds a lot better than some dudes hunch.
But if you want to gamble with your privacy by all means do it but you shouldn’t act like you know what you’re talking about when you tell people to trust ISPs because you think if you’re in a certain country they don’t spy on you or sell your data.
deleted by creator
deleted by creator
deleted by creator
And it also could not. Either way it wasn’t active at the time so it’s down to whether my ISP is selling it.
If the EFF de anonymization tool can de anonymize your browser, then the ad network can too.
Try searching for something with tor browser - no javascript
This isn’t a matter for fingerprinting. I haven’t directly visited any sites about rambutan other than Startpage, Duckduckgo, and Wikipedia.
It’s DDG
how do you know?
deleted by creator
How old is that game? Are there other people in your demographic who also play the game, and then searched for the same thing?
September 2025
I don’t see ads but if I were to, and despite all my precautions some would be on topic based on my past behavior I would methodically dissect to find out the leak. Namely I would try to automate the process :
one of the sites you looked at while looking up rambutan? no vpn too, if a page you looked at was served ads by an ad provider they could track you with your ip, as well as assosciating you with a unique fingerprint since you dont have fingerprinting protection. if you only used wikipedia, there is a second rambutan season in some places from november to january, so its possible that they (the rambutan or fruit processing and agricultural industry) are just trying to pick up sales ahead of the season.
if you have sus extensions too.
I would guess the likely culprits are
Firefox extensions
Search engines
Wikipedia
Other search results you may have opened or pre-loaded (not a default Firefox behaviour)
I don’t think Wikipedia is a likely culprit. I haven’t heard anything about them selling data.
You’ll need to provide all the sites you visited immediately after each of the ones you searched. Your
originheader will give that info away freely. So if it’s in the query parameters of the URL, then you go to Facebook, it’s as easy as{k: v for k, v in (pair.split("=", 1) for pair in response.headers["origin"].split("?", 1)[-1].split("&"))}Firefox only stores the time of my most recent visit so I don’t have that information anymore, so let’s just assume I went to YouTube immediately afterwards.
I have noticed ublock origin block counter go up on Wikipedia but haven’t looked into why
I might be wrong but I believe the ‘other annoyances’ option in uBlock Origin removes the Wikipedia “donate” banner. That could be what that is.
Did you click on any search results?
I found that the Firefox Browser history is often incomplete.
As far as I can remember, only the Wikipedia one.
Any extension could leak this information as well.
Is your default engine something other then the mentioned search engines? The search suggestion feature leaks information too.
I had removed all but Duckduckgo and Startpage from my browser.
My browser extensions are a good angle. If they’re selling my data to fund themselves that’d explain some things.
Well, without a VPN your ISP sees every site you enter. I wasn’t aware they might be selling that data for targeted ads, but it makes sense, why wouldn’t them?
That’s not true, your ISP might see your DNS and unencrypted web traffic sure but web searches use HTTPS so ISPs aren’t reading the query or results
Aren’t they seeing all the urls you access?
No, unless you browse http website. They’ll only see the domain name in the request SNI or during the DNS request.
But see ip you connect to. Reverse dns using own dns could show set of url possible on ip.
Reverse DNS would only show domain name, not URL. And even then a lot of websites are sharing IPs. No point in doing that when you’ve got SNI.
True only domain. TIL about sni. But vpn still protect against sni analysis no?
With a VPN it’s the VPN that has access to the list of domain you visit instead of your ISP. Whether you should put your trust in your ISP or a VPN is another question.
…and if you use DoH, they won’t even see DNS.
I would argue that you don’t need a VPN. It’s just another entity that can see your traffic, and there’s no reason to trust them over your ISP. They’re all for-profit companies.
https://www.pcmag.com/news/mullvad-vpn-hit-with-search-warrant-in-attempted-police-raid
Yeah you’re right man the VPN that got raided and proven to keep no logs is the exact same as ATT that helped the NSA spy on everyone in the USA and has your credit card and address on file.
https://www.pbs.org/wgbh/frontline/article/how-att-helped-the-nsa-spy-on-millions/
Sure something like NordVPN wouldn’t be trustworthy but come on, saying all VPNs are just as trustworthy as ISPs is absolutely insane
But they’ll still see the SNI.
Not for long. That’s about to get fixed with encrypted client hello.
Yes but ECH/ESNI have been around for some time now, even if the official spec is recent, but adoption is stil l very low.
Looking it up my ISP isn’t exactly trustworthy, but there have been no clear allegations. I’d say it’s the most likely cause if not my Firefox extensions.
EDIT: I just got another theory, Cloudflare, I’ll add it to the list.
If you’re really crazy about your privacy I’d recommend getting rid of any extensions you don’t 100% need (keep ublock origin though) as not only can they stalk you themselves but it can also help websites fingerprint you. Keeping your extensions to a minimum will help you blend in with the crowd, especially if you use a hardened browser like LibreWolf and/or Mullvad Browser
I use AdGuard rather than uBlock Origin for adblocking, because it allows me to opt-in and only block ads when they are aggressive enough to be annoying. But I’ve not been trying to minimize fingerprinting. The issue is just that everything I used in this instance came with either a tacit or explicit promise not to track me and I don’t know which is lying.
Other extensions I use are:
I’ve never used AdGuard but you can customize uBlock Origin to fit your needs and block specific things for specific websites. uBlock Origin is commonly used as a default in hardened browsers which would help you fit in with the crowd even more (although I realize you said you weren’t going for anti-fingerprinting, just something to consider)
I’m not really interested in maximum privacy, at least right now. I’m slowly moving there though.
Do any extensions have permission to view your browsing data? You can check by opening the extension manager, clicking the extension and clicking the ‘permissions and data’ tab. I would suspect 5 and 6 the most, 1 might be suspect too. Those extensions by nature would need such permissions to some extent.
AdGuard, ProtonPass, TamperMonkey, Time Tracker, and 10ten have those permissions. The others don’t. I don’t think any of these extensions would be able to function without these permissions.
Microsoft serves ads through duckduckgo that could connect the search to your IP perhaps if you clicked one
I’m pretty sure I never clicked on one. And I’ve turned off Firefox link previews too IIRC.
It doesn’t matter if you click on it. The ad space auction is already done.
Apparently Startpage and Duckduckgo use contextual advertising (rather than targeted advertising) so the advertisers on an unrelated website shouldn’t know I was looking up rambutan.
If you do searches on DDG, which is powered by Bing, you get responses that are relevant to your IP-based location, which means something about your IP is being passed to Bing aka Microsoft. That’s how.
The ISP shouldn’t even see the search term given basically everything on the internet uses https.
The ISP will see the domain names of the pages you visit if you use their DNS or some other unencrypted DNS but those are unlikely to contain the search term.
Even if you use encrypted DNS they’ll still be able to see the domain in the SNI. Websites using ECH are very rare.