META Spied on Browsing Data — Google Probing

People silhouetted against Meta logo background

Meta and Yandex have been secretly harvesting your browsing data for years through a major Android security loophole, linking your supposedly “anonymous” web activity directly to your personal identity without consent.

Key Takeaways

  • Meta (Facebook, Instagram) and Russian tech giant Yandex exploited an Android vulnerability to track users’ web browsing across multiple browsers, with Yandex doing so since 2017.
  • The tracking method connects supposedly anonymous web browsing to users’ real identities by linking tracking scripts to native smartphone apps through the device’s “localhost” connection.
  • Google is investigating these violations of its Play Store terms of service, while Meta has temporarily paused the tracking after being caught.
  • Popular browsers like Chrome, Firefox, and Edge were affected, with only privacy-focused browsers like DuckDuckGo and Brave offering some protection.
  • This security breach highlights how Big Tech continues to find new ways to harvest user data despite growing privacy regulations.

Years-Long Privacy Invasion Through Android Vulnerability

Android users have been unwittingly exposing their entire web browsing histories to Meta and Russian tech company Yandex through a sophisticated exploitation of security vulnerabilities. Yandex began this covert data collection operation in February 2017, while Meta implemented similar tracking methods in September 2024. The technique exploits a system loophole that allows apps with internet permissions to access the device’s “loopback address” (localhost), creating a direct pipeline of user data from web browsers to the companies’ apps installed on users’ phones.

The tracking affects anyone with Facebook, Instagram, or Yandex apps installed on their Android devices whenever they visit websites embedded with Meta Pixel or Yandex Metrica tracking scripts. These scripts, present on millions of websites, communicate through localhost ports to connect with the apps, completely bypassing Android’s normal privacy protections. This allows the companies to link anonymous browsing sessions with users’ real identities by connecting tracking cookies to device identifiers like Android Advertising IDs.

Big Tech Caught Red-Handed

The discovery of this privacy breach comes at a time when Big Tech companies face increasing scrutiny over their data collection practices. After researchers exposed the tracking method, Meta quickly moved to discontinue the practice by June 3, though the damage was already done. Google has confirmed it is investigating these actions, which clearly violate both the security principles of the Android platform and the privacy expectations users have when browsing the internet.

“The behavior violates the terms of service for its Play marketplace and the privacy expectations of Android users,” stated a Google representative.

Meta has acknowledged the issue but attempted to downplay it by framing it as a potential “miscommunication” about Google’s policies. The tracking code in Meta’s apps has been largely removed since the research went public, showing the company’s awareness of potential repercussions. Yandex has also promised to cease these operations following the public exposure of their practices.

Widespread Impact and Limited Protection

This tracking method affects all major browsers on Android devices including Chrome, Firefox, and Edge. Only privacy-focused browsers like DuckDuckGo and Brave offer some protection against this specific tracking method. Notably, researchers found no evidence of similar tracking on iOS devices, likely because Apple’s operating system places stricter restrictions on background app activity, demonstrating once again the superior privacy protections built into Apple products.

“We consider these to be violations of user privacy expectations,” stated Mozilla, confirming they are developing protections for Firefox users on Android against this tracking method.

The widespread adoption of Meta Pixel tracking scripts across millions of websites means the potential scope of this privacy violation is enormous. Every time users visited websites containing these tracking elements, their browsing data could be linked directly to their personal identities through the Facebook or Instagram apps on their phones, creating comprehensive profiles of their online activities without their knowledge or consent.

Corporate Damage Control

Meta quickly moved into damage control mode once their tracking methods were exposed. “We are in discussions with Google to address a potential miscommunication regarding the application of their policies. Upon becoming aware of the concerns, we decided to pause the feature while we work with Google to resolve the issue,” mentioned by Meta, in response to the allegations.

This latest privacy scandal highlights the ongoing battle between Big Tech’s insatiable appetite for user data and consumers’ right to privacy. The discovery also raises serious questions about the effectiveness of existing privacy tools and regulatory frameworks. If established companies like Meta and Yandex can exploit such vulnerabilities for years without detection, what other privacy breaches might be occurring unnoticed? The exploitation of system loopholes shows that even as privacy regulations tighten, tech giants continue finding creative ways to harvest user data to fuel their advertising empires.