TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Ask HN: Does anyone know of a tool to see what data is sent to 3rd parties

9 pointsby oseibonsuover 4 years ago
I remember a tool from years ago that would analyze what data a website was sending to 3rd parties. Does anyone remember what it was called or know of something similar.

5 comments

abqexpertover 4 years ago
You can use <a href="https:&#x2F;&#x2F;www.wireshark.org" rel="nofollow">https:&#x2F;&#x2F;www.wireshark.org</a> to see HTTP traffic and MITM yourself for HTTPS(<a href="https:&#x2F;&#x2F;unit42.paloaltonetworks.com&#x2F;wireshark-tutorial-decrypting-https-traffic&#x2F;" rel="nofollow">https:&#x2F;&#x2F;unit42.paloaltonetworks.com&#x2F;wireshark-tutorial-decry...</a>). That will only work for the data that you send to them yourself. You can&#x27;t possibly see any data that they send to third parties that they send through their servers.
mtmailover 4 years ago
Disconnect browser extension had a graph which domains are requested, is it that you remember? <a href="https:&#x2F;&#x2F;commons.wikimedia.org&#x2F;wiki&#x2F;File:Screengrab_of_%27Disconnect%27,_(an_internet-browser_addon),_visualizing_the_many_trackers_on_the_website_%27abovetopsecret%27_(on_141127)-cropped.png" rel="nofollow">https:&#x2F;&#x2F;commons.wikimedia.org&#x2F;wiki&#x2F;File:Screengrab_of_%27Dis...</a>
axismundiover 4 years ago
<a href="https:&#x2F;&#x2F;themarkup.org&#x2F;blacklight" rel="nofollow">https:&#x2F;&#x2F;themarkup.org&#x2F;blacklight</a>
relaunchedover 4 years ago
There are lots of ways to do that. You can look at the developer tools provided by your browser. You can also run your browser through an intercepting proxy like burp or zap. The latter gives you the ability to intercept and step over actions, so you can really slow things down. I&#x27;d recommend using on of them.
soaredover 4 years ago
The manual option is using ghostery and clicking in to each pixel URL to look at the paramaters. Many times the data is not obfuscated (in a facebook pixel you can see things like val=Ford, when you&#x27;re browsing a page for a Ford truck)