Step 1: When you type a website address or click a link to a page, your browser sends a request to the address for the data needed to assemble the website on your screen.
Step 2: The website notices your incoming request and records your computer's visit. It also assigns your computer a unique ID. In this example your ID is "456". In reality, the unique ID is likely much longer.
Note: The internet cookie's purpose is to provide information to the website so that the website remembers you when you visit again. If the website can uniquely identify you, the cookie can be used to store information that can make your browsing easier. For example, the cookie may remember your username, password, or shopping cart contents. This is a first-party cookie because it was sent by the website you were visiting.
Step 1: When you type a website address or click a link to a page, your browser sends a request to the address for the data needed to assemble the website on your screen.
How They Track You
Step 1: When you type a website address or click a link to a page, your browser sends a request for the data needed to assemble the website on your screen. The data will include all content, including any ads.
Step 2: The website notices your incoming request and records your computer's visit. It assigns your computer a unique ID. In this example your ID is "456". In reality, your unique ID is likely much longer.
Step 7: From now on, if you visit any other website associated with the ad company that placed the cookie, their cookie will notify the company's website of your presence and resume tracking you. Your clicks and activity are sent to the ad company by the cookie and added to the data profile they are assembling on you.
Step 1: When you type a website address or click a link to a page, your browser sends a request for the data needed to assemble the website on your screen. The data will include all content, including any ads.
Step 1: Visit a new website with your browser. This time your browser is set to block third-party cookies.
Step 2: The new website has sold ad space to two different ad companies. One is the same ad company from the previous example. The other ad company is new to you.
The new ad company is now able to track your activity on any website they are associated with by exploiting the existing-tracking-cookie-still-tracks-even-if-third-party-cookies-are-blocked-on-your-browser loophole. Pop-ups are no longer needed to track you, but you will likely still receive them.
Step 1: Visit a new website with your browser. This time your browser is set to block third-party cookies.
Step 1: Visit the same website from previous examples with your browser. The content and ads all generate without issue. The ad company places the tracking cookie on your computer. However, this time the ad has an embedded code telling the tracking cookie to relay information to a second ad company (usually a business partner).
Step 2: The second ad company has no relationship with the site you visited, but they still receive the same data about your visit just like the first ad company that does have a relationship.
Step 1: Visit the same website from previous examples with your browser. The content and ads all generate without issue. The ad company places the tracking cookie on your computer. However, this time the ad has an embedded code telling the tracking cookie to relay information to a second ad company (usually a business partner).
Step 1: Visit a social media site (Facebook, Twitter, etc). Because this site is visited directly, it has first-party status and places its own third-party tracking cookie on your computer when you visit. This allows the site to get around any third-party cookie blocking.
Step 2: After visiting the social media site, you navigate to different websites that feature a social media sharing button for the social site you just visited. Allowing this sharing button to load on a website - you don't even have to click it - allows the tracking cookie to send information back to the social site. The social site starts building a tracking log of your activity. Even worse - the social site can attach this information to your personal info you've provided them.
Step 1: Visit a social media site (Facebook, Twitter, etc). Because this site is visited directly, it has first-party status and places its own third-party tracking cookie on your computer when you visit. This allows the site to get around any third-party cookie blocking.
How a Website Works Without Tracking
A simplified explanation of how your computer typically communicates with a website.
How You Are Most Commonly Tracked
A basic introduction to third-party tracking by an advertising company.
How You Can Be Tracked Even If You Block Third-Party Cookies
Even when you think you are protected, you are vulnerable.
How You Can Be Tracked By Multiple Trackers With One Cookie
There's no telling how many are watching.
How You Can Be Tracked By Social Media
You know those social media sharing buttons? Convenient, right? For them, perhaps.
The above slideshows did not cover all the ways you can be tracked, but they do cover the most common. Other methods include:
-
Flash cookies, which are cookies that are generated using a different method.
-
Web bugs, which are tiny points the size of a pixel on a website that facilitate tracking much like ads.
-
Other, newer methods are always being devised. As you read this, Google is working on cookieless tracking.