Skip to Content
Tech policy

Largest Study of Online Tracking Proves Google Really Is Watching Us All

Google’s Web trackers are present on the majority of the Web’s top million sites.

If you read or clicked anything online today, some part of Google probably knows about it.

That’s one lesson from the largest study yet of the technology that tracks people’s movements around the Web. When Princeton researchers logged the use of tracking code on the Internet’s million most popular websites, Google code was found on a majority of them.

Google Analytics, a product used to log visitors to websites that integrates with the company’s ad-targeting systems, was found on almost 70 percent of sites. DoubleClick, a dedicated ad-serving system from Google, was found on close to 50 percent of sites. The top five most common tracking tools were all Google-owned.

The new study, which was conducted using an open-source tool, also uncovered a stealthy new technique used by some small tracking companies that exploits the way browsers process audio, using it to “fingerprint” computers so they can be tracked around the Web. The researchers say the technology they used to collect their findings could help regulators and the developers of tools that block tracking, like some ad blockers.

Online publishers use tracking code from Google, Facebook, and many other companies to help target advertising. When a company’s code is embedded on many different sites, it can build up detailed profiles on individuals as they move around the Web, assigning them unique identifiers so they can be recognized again.

Researchers and privacy advocates say this practice deserves close scrutiny.

For example, a tracker that knows you recently browsed articles related to pregnancy, baby clothes, and miscarriage might indeed be able to find an ad you are likely to click. Because the systems that do this are automated, it is likely that no human looked at the data. But you may not feel comfortable with the idea of that information bouncing around a tangle of companies and algorithms outside your control.

Research has shown how Google’s ad-targeting system can use information in ways that might be seen as discriminatory: for example, by targeting men but not women with ads for high-paying jobs (see “Probing the Dark Side of Google’s Ad-Targeting System”). Documents leaked by Edward Snowden indicated that the National Security Agency tapped into Google’s online tracking systems as a way to identify surveillance targets.

The new study of online trackers was carried out by Arvind Narayanan, an assistant professor at Princeton, and grad student Steven Englehardt. They surveyed the one million sites using software developed at Princeton, called OpenWPM, which has been released for free. It automatically visits websites using the Firefox browser and logs any tracking technology it encounters.

Narayanan says the study turned up causes for both concern and hope.

For example, the researchers uncovered a new trick in which some companies silently send an audio signal to your browser. Minute differences in software and hardware mean the response can be used to identify your computer (try it out on yourself here). “There are ever more creative and intrusive types of fingerprinting being deployed,” says Narayanan.

But he adds that the dominance of Google and a handful of other giants could also help regulators and citizens keep tabs on the trackers keeping tabs on us. “Only a small number of companies have trackers that are really prevalent,” says Narayanan. “This suggests that external oversight and public pressure can lead to positive change.”

The consolidation of power in Web tracking should also make things easier for the maintainers of tools that block Web trackers. The Princeton study tested one such tool, the browser plug-in Ghostery, and found it effective.

Deep Dive

Tech policy

wet market selling fish
wet market selling fish

This scientist now believes covid started in Wuhan’s wet market. Here’s why.

How a veteran virologist found fresh evidence to back up the theory that covid jumped from animals to humans in a notorious Chinese market—rather than emerged from a lab leak.

Conceptual illustration showing a file folder with the China flag and various papers flying out of it
Conceptual illustration showing a file folder with the China flag and various papers flying out of it

The US crackdown on Chinese economic espionage is a mess. We have the data to show it.

The US government’s China Initiative sought to protect national security. In the most comprehensive analysis of cases to date, MIT Technology Review reveals how far it has strayed from its goals.

Professor Gang Chen of MIT
Professor Gang Chen of MIT

All charges against China Initiative defendant Gang Chen have been dismissed

MIT professor Gang Chen was one of the most prominent scientists charged under the China Initiative, a Justice Department effort meant to counter economic espionage and national security threats.

Harvard University professor Charles Lieber leaves federal court, Tuesday, Dec. 14, 2021
Harvard University professor Charles Lieber leaves federal court, Tuesday, Dec. 14, 2021

The China Initiative’s first academic guilty verdict raises more questions than it answers

Observers hoped that the trial of the prominent Harvard professor Charles Lieber would provide some clues into the future of the Department of Justice’s campaign against Chinese economic espionage.

Stay connected

Illustration by Rose WongIllustration by Rose Wong

Get the latest updates from
MIT Technology Review

Discover special offers, top stories, upcoming events, and more.

Thank you for submitting your email!

Explore more newsletters

It looks like something went wrong.

We’re having trouble saving your preferences. Try refreshing this page and updating them one more time. If you continue to get this message, reach out to us at customer-service@technologyreview.com with a list of newsletters you’d like to receive.