Article Details
Scrape Timestamp (UTC): 2025-06-03 23:26:00.993
Source: https://www.theregister.com/2025/06/03/meta_pauses_android_tracking_tech/
Original Article Text
Click to Toggle View
Meta pauses mobile port tracking tech on Android after researchers cry foul. Zuckercorp and Yandex used localhost loophole to tie browser data to app users, say boffins. Security researchers say Meta and Yandex used native Android apps to listen on localhost ports, allowing them to link web browsing data to user identities and bypass typical privacy protections. Following the disclosure, researchers observed that Meta's Pixel script stopped sending data to localhost and that the tracking code was largely removed. The move may help Meta avoid scrutiny under Google Play policies, which prohibit covert data collection in apps. "We are in discussions with Google to address a potential miscommunication regarding the application of their policies," a Meta spokesperson told The Register. "Upon becoming aware of the concerns, we decided to pause the feature while we work with Google to resolve the issue." Meta's spokesperson did not respond to a request to elaborate on the company's discussions with Google. What the researchers found In a report published Tuesday, computer scientists affiliated with IMDEA Networks (Spain), Radboud University (The Netherlands), and KU Leuven (Belgium) describe how the US social media giant and the Russian search engine were observed using native Android apps to gather web cookie data via the device's loopback interface, commonly known as localhost. Localhost is a loopback address that a device can use to make a network request to itself. It's commonly used by software developers to test server-based applications like websites on local hardware. The researchers – Aniketh Girish (PhD student), Gunes Acar (Assistant Professor), Narseo Vallina-Rodriguez (Associate Professor), Nipuna Weerasekara (PhD student), and Tim Vlummens (PhD student) – say they found native Android apps, including Facebook and Instagram, and Yandex's Maps and Browser – that listen silently on fixed local ports for tracking purposes. "These native Android apps receive browsers' metadata, cookies and commands from the Meta Pixel and Yandex Metrica scripts embedded on thousands of websites," the computer scientists explain. "These JavaScripts load on users' mobile browsers and silently connect with native apps running on the same device through localhost sockets." As these native apps access device identifiers like the Android Advertising ID or handle user identities in Meta apps, the researchers say, they're able to link mobile browsing sessions and web cookies to user identities. Essentially, by opening localhost ports that allow their Android apps to receive tracking data, such as cookies and browser metadata, from scripts running in mobile browsers, Meta and Yandex are able to bypass common privacy safeguards like cookie clearing, Incognito Mode, and Android's app permission system. The technique also violates assumptions about the scope of first-party cookies, which aren't supposed to be able to track browsing activity across different websites. According to the researchers, "the method we disclose allows the linking of the different _fbp cookies to the same user, which bypasses existing protections and runs counter to user expectations." With regard to Meta, the tracking process involves scripts associated with Meta Pixel, analytics code used by marketers to gather data about interactions with websites. Various APIs and protocols can be used to implement the described app-web eavesdropping scheme. These include: SDP munging, which involves manually modifying Session Description Protocol (SDP) messages before the data gets passed to the browser; real-time communications protocols Websocket and WebRTC; Session Traversal Utilities for NAT (STUN), an address discovery mechanism; and Traversal Using Relays around NAT (TURN), a router restriction bypass method. The researchers describe Meta's approach thus: Researchers observed Meta implementing this technique starting in September 2024, transmitting data via HTTP. Third-party developers working with Meta APIs noted and questioned the behavior in forum posts at the time. HTTP-based data transmission using this technique supposedly ended the following month, but other methods of transmission (WebSocket, WebRTC STUN (w/ SDP Munging), and WebRTC TURN (w/o SDP Munging)) were identified in subsequent months. Presently, however, Meta's use of these techniques appears to have halted. According to the researchers, "As of June 3rd 7:45 CEST, Meta/Facebook Pixel script is no longer sending any packets or requests to localhost. The code responsible for sending the _fbp cookie has been almost completely removed." Yandex's use of localhost-based tracking dates back to 2017, according to the researchers. The Register sought to ask Yandex media relations about the researchers' claims but our inquiry was bounced as spam. The report authors note that their disclosure to Android browser vendors has led to several mitigations. Chrome 137, which shipped May 26, 2025, includes countermeasures to block the SDP Munging technique used by Meta Pixel, though these have only been made available to a subset of users participating in a gated field trial. A fix is currently being developed for Mozilla Firefox. Brave is unaffected as it requires consent for localhost use. And DuckDuckGo has modified its blocklist to stop Yandex's scripts. Beyond these, the authors suggest a Google proposal to create a new "local network access" permission that could help mitigate localhost-based tracking in the future. A prior proposal along these lines ran into technical barriers.
Daily Brief Summary
Security experts uncovered that Meta and Yandex exploited Android localhost ports to connect web browsing data to specific user identities.
This technique allowed both companies to circumvent standard privacy measures including cookie clearing and Incognito Mode.
Following the revelations, Meta halted the disputed tracking process, and adjusted their systems to avoid potential violations of Google Play's data collection policies.
The research highlighted that components like Meta Pixel and Yandex Metrica embedded in websites could silently transfer user data to native apps through localhost connections.
The researchers' findings prompted browser vendors like Chrome and Mozilla to develop countermeasures; DuckDuckGo and Brave also took steps to thwart this tracking method.
Investigative findings into these practices were published by notable computer scientists across several European institutions.
Meta's spokesperson acknowledged the issue and mentioned ongoing discussions with Google to clarify and address policy applications and potential miscommunications.