Australia markets closed
  • ALL ORDS

    6,788.70
    -132.70 (-1.92%)
     
  • ASX 200

    6,574.70
    -125.50 (-1.87%)
     
  • AUD/USD

    0.6533
    -0.0112 (-1.69%)
     
  • OIL

    79.43
    -4.06 (-4.86%)
     
  • GOLD

    1,651.70
    -29.40 (-1.75%)
     
  • BTC-AUD

    29,145.89
    -143.41 (-0.49%)
     
  • CMC Crypto 200

    434.61
    -9.92 (-2.23%)
     
  • AUD/EUR

    0.6737
    -0.0013 (-0.19%)
     
  • AUD/NZD

    1.1363
    -0.0000 (-0.00%)
     
  • NZX 50

    11,434.82
    -83.50 (-0.72%)
     
  • NASDAQ

    11,311.24
    -190.40 (-1.66%)
     
  • FTSE

    7,018.60
    -140.92 (-1.97%)
     
  • Dow Jones

    29,590.41
    -486.27 (-1.62%)
     
  • DAX

    12,284.19
    -247.44 (-1.97%)
     
  • Hang Seng

    17,933.27
    -214.68 (-1.18%)
     
  • NIKKEI 225

    27,153.83
    -159.30 (-0.58%)
     

Facebook and Instagram apps can track users via their in-app browsers

·Contributing Reporter
·2-min read
Benoit Tessier / reuters

If you visit a website you see on Facebook and Instagram, you've likely noticed that you're not redirected to your browser of choice but rather a custom in-app browser. It turns out that those browsers inject javascript code into each website visited, allowing parent Meta to potentially track you across websites, researcher Felix Krause has discovered.

"The Instagram app injects their tracking code into every website shown, including when clicking on ads, enabling them [to] monitor all user interactions, like every button and link tapped, text selections, screenshots, as well as any form inputs, like passwords, addresses and credit card numbers," Krause said in a blog post.

His research focused on the iOS versions of Facebook and Instagram. That's key because Apple allows users to opt in or out of app tracking when they first open an app, via its App Tracking Transparency (ATT) introduced in iOS 14.5. Meta has previously said that the feature was "a headwind on our business 2022... on the order of $10 billion."

Meta said that the injected tracking code obeyed users preferences on ATT. "The code allows us to aggregate user data before using it for targeted advertising or measurement purposes," a spokesperson told The Guardian. "We do not add any pixels. Code is injected so that we can aggregate conversion events from pixels. For purchases made through the in-app browser, we seek user consent to save payment information for the purposes of autofill."

Krause noted that Facebook isn't necessarily using the javascript injection to collect sensitive data. However, if the apps opened a users' preferred browser like Safari or Firefox, there would be no way to do a similar javascript injection on any secure site. By contrast, the approach used by the Instagram and Facebook in-app browsers "works for any website, no matter whether it's encrypted or not," he said.

According to Krause's research, WhatsApp doesn't modify third-party websites in a similar way. As such, he suggests that Meta should do the same with Facebook and Instagram, or just use Safari or another browser to open links. "It's what's best for the user, and the right thing to do." For more, check out the summary of his findings here.