by sebastian_z on 6/3/25, 12:12 PM with 343 comments
by tomhow on 6/4/25, 5:50 AM
by merek on 6/3/25, 1:39 PM
1. User logged into FB or IG app. The app runs in background, and listens for incoming traffic on specific ports.
2. User visits website on the phone's browser, say something-embarassing.com, which happens to have a Meta Pixel embedded. From the article, Meta Pixel is embedded on over 5.8 million websites. Even in In-Cognito mode, they will still get tracked.
3. Website might ask for user's consent depending on location. The article doesn't elaborate, presumably this is the cookie banner that many people automatically accept to get on with their browsing?
4. > The Meta Pixel script sends the _fbp cookie (containing browsing info) to the native Instagram or Facebook app via WebRTC (STUN) SDP Munging.
You won't see this in your browser's dev tools.
5. Through the logged-in app, Meta can now associate the "anonymous" browser activity with the logged-in user. The app relays _fbp info and user id info to Meta's servers.
Also noteworthy:
> This web-to-app ID sharing method bypasses typical privacy protections such as clearing cookies, Incognito Mode and Android's permission controls. Worse, it opens the door for potentially malicious apps eavesdropping on users’ web activity.
> On or around May 17th, Meta Pixel added a new method to their script that sends the _fbp cookie using WebRTC TURN instead of STUN. The new TURN method avoids SDP Munging, which Chrome developers publicly announced to disable following our disclosure. As of June 2, 2025, we have not observed the Facebook or Instagram applications actively listening on these new ports.
by voidUpdate on 6/3/25, 12:46 PM
by orbital-decay on 6/3/25, 12:36 PM
>Google says it's investigating the abuse
That's a bit ironic, considering how they're using any side channel they could lay their hands on (e.g. Wi-Fi AP names) to track everyone. Basically every large app vendor with multiple apps does something similar to circumvent OS restrictions as well.
by kriro on 6/3/25, 1:49 PM
Maybe it's time to invent a tax that starts at 0% and goes up 1-X% every time your hand is cought in the cookie jar. And add a corresponding website where you can clearly see all violations by company.
by bnpxft on 6/3/25, 2:55 PM
Not only our their websites painful which discourages use, websites are more sandboxed.
by dylan604 on 6/3/25, 1:55 PM
*: Meta Pixel script was last seen sending via HTTP in Oct 2024, but Facebook and Instagram apps still listen on this port today. They also listen on port 12388 for HTTP, but we have not found any script sending to 12388.
**: Meta Pixel script sends to these ports, but Meta apps do not listen on them (yet?). We speculate that this behavior could be due to slow/gradual app rollout.
So, could some other app send data to these ports with a fake message? I'm asking for a friend that likes to do things for science.by GrantMoyer on 6/3/25, 1:17 PM
by bravesoul2 on 6/3/25, 2:23 PM
Quick test and if I serve on 8080 on the Userland app it can be accessed from both profiles. So probably yes.
This means an infected app on your personal profile could exchange data with a site visited from a second profile.
by paxys on 6/3/25, 1:55 PM
by chedabob on 6/3/25, 7:44 PM
There is a cert for it in the logs: https://crt.sh/?q=yandexmetrica.com
by diebeforei485 on 6/10/25, 9:40 PM
That would not be an issue for genuine uses of WebRTC.
by neilv on 6/3/25, 9:00 PM
Unfortunately, even if they did have such rules, in this case, Meta is a too-big-to-deplatform tech company.
(Also, even if it wasn't Meta, sketchy behavior of tech might have the secret endorsement of IC and/or LE. So, making the sketchiness stop could be difficult, and also difficult to talk about.)
by matthberg on 6/3/25, 1:48 PM
Web apps talking to LAN resources is an attack vector which is surprisingly still left wide open by browsers these days. uBlock Origin has a filter list that prevents this called "Block Outsider Intrusion into LAN" under the "Privacy" filters [1], but it isn't enabled on a fresh install, it has to be opted into explicitly. It also has some built-in exemptions (visible in [1]) for domains like `figma.com` or `pcsupport.lenovo.com`.
There are some semi-legitimate uses, like Discord using it to check if the app is installed by scanning some high-number ports (6463-6472), but mainly it's used for fingerprinting by malicious actors like shown in the article.
Ebay for example uses port-scanning via a LexisNexis script for fingerprinting (they did in 2020 at least, unsure if they still do), allegedly for fraud prevention reasons [2].
I've contributed some to a cool Firefox extension called Port Authority [3][4] that's explicitly for blocking LAN intruding web requests that shows the portscan attempts it blocks. You can get practically the same results from just the uBlock Origin filter list, but I find it interesting to see blocked attempts at a more granular level too.
That said, both uBlock and Port Authority use WebExtensions' `webRequest` [5] API for filtering HTTP[S]/WS[S] requests. I'm unsure as to how the arcane webRTC tricks mentioned specifically relate to requests exposed to this API; it's possible they might circumvent the reach of available WebExtensions blocking methods, which wouldn't be good.
0: https://news.ycombinator.com/item?id=44170099
1: https://github.com/uBlockOrigin/uAssets/blob/master/filters/...
2: https://nullsweep.com/why-is-this-website-port-scanning-me/
3: https://addons.mozilla.org/firefox/addon/port-authority
4: https://github.com/ACK-J/Port_Authority
5: https://developer.mozilla.org/en-US/docs/Mozilla/Add-ons/Web...
by lgats on 6/3/25, 2:27 PM
by b0a04gl on 6/4/25, 10:41 AM
kinda makes me nostalgic for simpler times—when tracking meant throwing 200 trackers into a <script> tag and hoping one stuck. now it’s full-on black ops.
i swear, i’m two updates away from running every browser in a docker container inside a faraday cage.
by pabs3 on 6/3/25, 12:57 PM
by 1vuio0pswjnm7 on 6/3/25, 11:03 PM
Further, Netguard plus Nebulo in non-VPN mode can stop unwanted connections to Meta servers
by jedahan on 6/4/25, 1:03 PM
by josephcsible on 6/3/25, 5:17 PM
by tomhow on 6/3/25, 9:46 PM
by like_any_other on 6/3/25, 2:15 PM
[1] https://arstechnica.com/security/2025/06/meta-and-yandex-are...
[2] https://en.wikipedia.org/wiki/Pentium_III#Controversy_about_...
by ugh123 on 6/3/25, 10:26 PM
by rvnx on 6/3/25, 12:28 PM
by Aissen on 6/3/25, 2:46 PM
by barbazoo on 6/3/25, 2:28 PM
by lostmsu on 6/3/25, 12:49 PM
by ggeorgovassilis on 6/4/25, 5:06 AM
127.0.0.0/8
::1/128
I'll update here with any issues.
by lachlan_gray on 6/3/25, 2:22 PM
by dmantis on 6/3/25, 2:39 PM
I wonder whether local ports opened in isolated "work" android profile are accessible by main profile.
by time4tea on 6/4/25, 10:09 PM
(Other bad guys are around too)
by jeroenhd on 6/3/25, 1:14 PM
Now that the mechanism is known (and widely implemented), one could write an app to notify users about attempted tracking. All you need to do is to open the listed UDP ports and send a notification when UDP traffic comes in.
For shit and giggles I was pondering if it was possible to modify Android to hand out a different, temporary IPv6 address to every app and segment off any other interface that might be exposed just because of shit like this (and use CLAT or some fallback mechanism for IPv4 connectivity). I thought this stuff was just a theoretical problem because it would be silly to be so blatant about tracking, but Facebook proves me wrong once again.
I hope EU regulators take note and start fining the websites that load these trackers without consent, but I suspect they won't have the capacity to do it.
by qwertox on 6/3/25, 12:54 PM
I'm surprised they're allowed to listen on UDP ports, IIRC this requires special permissions?
> The Meta (Facebook) Pixel JavaScript, when loaded in an Android mobile web browser, transmits the first-party _fbp cookie using WebRTC to UDP ports 12580–12585 to any app on the device that is listening on those ports.
Borders on criminal behavior.
Apparently this was a European team of researchers, which would mean that Meta very likely breached the GDPR and ePrivacy Directive. Let's hope this gets very expensive for Meta.
by username135 on 6/3/25, 2:29 PM
by aembleton on 6/3/25, 2:36 PM
by Xiol32 on 6/3/25, 12:50 PM
by hofrogs on 6/3/25, 3:51 PM
by red_admiral on 6/4/25, 10:04 AM
by Yizahi on 6/4/25, 10:11 AM
I've just opened my feed in FB and let's see what ads will be today:
Group Dull Men's Club - some garbage meme dump, neither interesting nor selling any product or service.
Women emigrant group - I'm a male and in different location.
Rundown - some NN generated slop about NN industry
Car crash meme group from a different location.
Math picture meme group
LOTR meme group
Photo group with a theme I'm not interested
Repeat of the above
Another meme group
Roland-Garros page - I've never watched tennis or wrote about it. My profile has follows of a different sport pages altogether. None of those rise in the ads.
Another fact/meme group
Repeat
Repeat
Another fact/meme group
Expat group from incorrect location
And so on it goes. Like, who pays for all this junk? Who coordinates targeting? Why do they waste both their and mine capacity for something that useless both for me and Facebook? I would understood if FB had ads of products/services, or something that loosely follows by likes. But what they have is a total 100% miss. It's mindboggling.
by never_inline on 6/4/25, 11:12 AM
by neuroticnews25 on 6/3/25, 1:03 PM
by octo888 on 6/4/25, 10:14 AM
by qwertox on 6/3/25, 5:00 PM
If it were so, Google should be knowingly be allowing this to happen and be a co-conspirator. I mean, they surveil our devices as if it were their home. Impossible that they're not aware.
[0] https://netzpolitik-org.translate.goog/2025/databroker-files...
by paxys on 6/3/25, 2:29 PM
by bravesoul2 on 6/3/25, 1:54 PM
by hereme888 on 6/4/25, 4:11 AM
I hope a judge gives them a warning.
by jurgenkesker on 6/3/25, 4:07 PM
by maeil on 6/3/25, 3:30 PM
It could be an idea to, you know, stop doing these things. Would be great to see another few $billion fine for this one.
by worik on 6/3/25, 8:10 PM
by captn3m0 on 6/3/25, 3:02 PM
No response from Google. Being used by dozens of apps in the wild.
Edit: Original Research link: https://peabee.substack.com/p/everyone-knows-what-apps-you-u... (HN: https://news.ycombinator.com/item?id=43518866 , 482 comments)
by robin_reala on 6/3/25, 2:29 PM
by hulitu on 6/3/25, 1:42 PM
Thank god that Microsoft and Google don't do this. Oh, wait... /s
by bix6 on 6/3/25, 1:15 PM