Adtech relies on the OpenRTB 2.5/2.6 spec for tracking, you would have removed 1 identifier out of a hundred (one that isn’t really used anyway given SSAI is so popular).
Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:
Yeah, multi-hop is pointless for tracking.
…IP addresses and multi-hop don’t matter…
Broad statements that don’t take into consideration the threat model of other users. Servers you connect to might not be using source IP in any way to track. You might be leaking so many other identifiers, that its completely useless to worry about multi-hop. But this is not true for everyone in every situation.
Unrelated, but absence of evidence is not evidence of absence.
So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated.
Also, you’re saying you have an absence of evidence, ergo you have no evidence.
Having no evidence does not qualify as evidence.
Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:
Just because an identifier exists doesn’t mean it is used.
BidRequest.imp[i].tagid exists, but advertisers don’t use it.
I think you are confusing having an option with something being mandatory.
And Tor nodes are not the same thing as VPN multi-hop. If you think that they are, wow!
VPN multi-hop is you connecting to a provider’s server that connects to another one of the provider’s server then out.
It’s all the provider’s network.
And again, if you connected your Firefox browser to Tor, we could still track you.
You’d get cookied or localStorage() tracked.
When you disconnect from Tor, that stuff is still present in your browser.
Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?
EDIT:
I just realized you think that Tor is built using multi-hop VPN.
Its a real life Dunning-Kruger effect! I’ve never encountered this.
You are going to do something really stupid and end up in prison.
I’m unsure what evidence you are referring to.
Evidence, or it isn’t true.
Unrelated, but absence of evidence is not evidence of absence.
Anyways, your own statement:
Removing an identifier that is used. (1/100 = matters, “isn’t really used” != unused). This contradicts your other statements:
Broad statements that don’t take into consideration the threat model of other users. Servers you connect to might not be using source IP in any way to track. You might be leaking so many other identifiers, that its completely useless to worry about multi-hop. But this is not true for everyone in every situation.
If its worth anything to you, the Tor Project seems to think multi-hop and IP addresses matter for protecting against tracking.
So, I’m not allowed to ask you for proof of your statement? And if its unrelated, then why did you post it? Its unrelated. Also, you’re saying you have an absence of evidence, ergo you have no evidence. Having no evidence does not qualify as evidence.
Just because an identifier exists doesn’t mean it is used.
BidRequest.imp[i].tagid
exists, but advertisers don’t use it. I think you are confusing having an option with something being mandatory.And Tor nodes are not the same thing as VPN multi-hop. If you think that they are, wow! VPN multi-hop is you connecting to a provider’s server that connects to another one of the provider’s server then out. It’s all the provider’s network.
And again, if you connected your Firefox browser to Tor, we could still track you. You’d get cookied or localStorage() tracked. When you disconnect from Tor, that stuff is still present in your browser. Almost like the number of hops you take or the IP address used doesn’t seem to really matter, huh?
EDIT: I just realized you think that Tor is built using multi-hop VPN. Its a real life Dunning-Kruger effect! I’ve never encountered this. You are going to do something really stupid and end up in prison.