TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

How Verizon's Advertising Header Works

146 pointsby jonathanmayerover 10 years ago

23 comments

userbinatorover 10 years ago
It&#x27;s one thing for your ISP to be collecting information about you; it&#x27;s totally another thing for your ISP to be silently modifying your data by adding a tracking header <i>and sending it to all other sites you visit</i>.<p>Modifying application-level data is something an ISP should never do. What if I happened to be using the exact same header name for some other purpose for a web app API? This should be considered illegal tampering with the content of communications.<p>The &quot;encrypt everything&quot; proponents are missing the point: yes, encryption (and steganography) can be used to bypass this easily, but I don&#x27;t want to have to explicitly defend against my ISP modifying my data.
评论 #8506871 未加载
gojomoover 10 years ago
Notably: the exact same device ID (X-UIDH) is injected into HTTP requests from different browsers&#x2F;apps, or browser tabs in &#x27;privacy&#x27; or &#x27;incognito&#x27; mode. Also, if you&#x27;re using &#x27;personal hotspot&#x27;, any HTTP traffic from a connected desktop&#x2F;laptop sharing the mobile data service also gets the header.<p>So VerizonWireless is allowing third-party sites to correlate all HTTP traffic from one device to a single identity, even if you&#x27;ve taken explicit steps (like &#x27;incognito&#x27; mode) to try to thwart this, and even if the mobile OS has compartmentalized apps away from seeing each others&#x27; identity data&#x2F;cookies.<p>Only HTTPS and VPN traffic is immune, and as far as I&#x27;ve been able to find out, there is no way to opt-out. (None of the VerizonWireless privacy settings stop the header from being injected.)
评论 #8507164 未加载
coldcodeover 10 years ago
They need to be publicly attacked for doing this. Only massive embarrassment will change the behavior. Maybe get some politicians involved if there are any they haven&#x27;t bought yet.
评论 #8506915 未加载
评论 #8507293 未加载
andrewstuart2over 10 years ago
I haven&#x27;t seen it mentioned anywhere, but this can&#x27;t work over HTTPS. The message is fully encrypted end-to-end and Verizon Wireless can&#x27;t do anything to alter the content without destroying the whole message.<p>Seems like a few people know this, lots of talk about SSL &amp; TLS, but I don&#x27;t think anybody has mentioned it explicitly.
评论 #8506600 未加载
revelationover 10 years ago
Oh, oh, I know, this is the moment where smart people on here tell us that more regulation by the FCC would be a <i>bad thing</i>!<p>Because you know, a telecommunications provider that <i>manipulates the content of your telecommunication</i> is just screaming out for being an overregulated area of business.
评论 #8506727 未加载
hemeover 10 years ago
Anyone know if....<p>A. It is possible to request your &quot;advertising profile&quot; from them.<p>B. Can a customer request that gathered information on them be destroyed?<p>C. If you opted-out today (like me) does that mean that they stop collecting information and continue to sell &quot;your devices&quot; ad profile? Or do they also stop selling your info?<p>(sending these to Verizon. I&#x27;ll post if I get answers)
alimoeenyover 10 years ago
Is this even legal? I mean are ISPs, or telecom in general allowed to identify the requester without their permission? But I imagine it will not work on encrypted connections. SSL FTW?!
评论 #8505955 未加载
评论 #8506282 未加载
crazy_geekover 10 years ago
I haven&#x27;t had the opportunity to tinker with this, but what if the client sends a X-UIDH: header of it&#x27;s own? Will VZW overwrite the header, or will it pass it through? If it doesn&#x27;t clobber it, there&#x27;s a browser plugin waiting to be written.
评论 #8505858 未加载
评论 #8506333 未加载
joshoover 10 years ago
So, I suppose this means that ads that Verizon customers see are potentially targeted by their home address, age, gender, and call&#x2F;texting patterns.<p>Holy shit, if I was a customer that would be ending today, even if I was in a contract, I&#x27;d say they pretty clearly are in breach of contract over my privacy expectations, by sharing who I am with every website I visit.
评论 #8506623 未加载
justanothernameover 10 years ago
Using the SOPA visibility strategy could be effective. If enough popular sites redirected requests that had a X-UIDH to a Informational page about the privacy intrusion, people might care (if only for the extra click its causing them).
评论 #8508433 未加载
dazbradburyover 10 years ago
The largest network in the UK, O2 (and therefore Three and Tesco), were sending your mobile number as a HTTP header to every site you visited [1]. Didn&#x27;t last long.<p>ISP&#x27;s have also tried this in the past - I remember a few in the UK trying to set up an ad-injection model, but can&#x27;t seem to find them now, other than NebuAd [2].<p>[1] - <a href="http://www.theregister.co.uk/2012/01/25/o2_hands_out_phone_numbers_to_websites/" rel="nofollow">http:&#x2F;&#x2F;www.theregister.co.uk&#x2F;2012&#x2F;01&#x2F;25&#x2F;o2_hands_out_phone_n...</a><p>[2] <a href="http://en.wikipedia.org/wiki/NebuAd" rel="nofollow">http:&#x2F;&#x2F;en.wikipedia.org&#x2F;wiki&#x2F;NebuAd</a>
评论 #8507312 未加载
评论 #8507886 未加载
duanebover 10 years ago
Universal TLS can&#x27;t come fast enough.
评论 #8506485 未加载
sehuggover 10 years ago
Doesn&#x27;t&#x2F;didn&#x27;t AT&amp;T also add a header of their own?<p><a href="http://blog.jgc.org/2012/02/mobile-subscriber-leakage-in-http.html" rel="nofollow">http:&#x2F;&#x2F;blog.jgc.org&#x2F;2012&#x2F;02&#x2F;mobile-subscriber-leakage-in-htt...</a><p><a href="http://developerboards.att.lithium.com/t5/Technical-Questions-Discussion/X-Up-Subno-uniqueness/td-p/23475" rel="nofollow">http:&#x2F;&#x2F;developerboards.att.lithium.com&#x2F;t5&#x2F;Technical-Question...</a>
jacques_chesterover 10 years ago
I happen to be in the process of patenting an opt-in system for authenticating and recording requests from users. One of my design goals was to prevent anyone from piggybacking on the scheme to track the users across multiple requests.<p>It occurs to me that if I&#x27;d been suffering from a less overdeveloped sense of decency, I could&#x27;ve filed sooner with something like this and hit Verizon with a lawsuit.
评论 #8508189 未加载
monofonikover 10 years ago
I work in mobile advertising (not in the US), and my company is partnered with a mobile carrier that does something similar, although the &quot;header enrichment&quot; as it&#x27;s called is only enabled on specific domains (i.e. requests to our ad server API). I feel that it&#x27;s unlikely these headers are being set on <i>all</i> web requests. Has anybody verified this claim?
评论 #8508363 未加载
评论 #8508203 未加载
cmdrfredover 10 years ago
At work I was trying to set up VPN access on a few busses we have. We tried using a Verizon device but couldn&#x27;t because Verizon puts you behind their NAT. It costs $500 to get out from behind it. I guess this is why.
sehuggover 10 years ago
This is actually really good, because if advertisers have an Verizon API to query the cookies for demographic information, in theory intelligence agencies could have an API to query a cookie to see if the device belongs to a U.S. person and stop incidental collection of that stream. Which is what they would do, right?<p>Oh wait, a bad guy could steal your phone. Guess we&#x27;d better collect it all. Hey, I guess we could use that cookie for something...
stvswnover 10 years ago
Shouldn&#x27;t Chrome and Safari simply block this behavior? Google, for instance, is now presented with a rare situation: users&#x27; privacy and their own business concerns are aligned (since audience segmenting is a core product of the Google Display Network).
评论 #8506797 未加载
评论 #8506792 未加载
dunhamover 10 years ago
Interesting - my cookie, collected the day this broke, has the same prefix as the author: &quot;981596494\x00&quot;<p>I&#x27;m now getting a different cookie (same physical location) that starts with: &quot;379689122\x00&quot;
sehuggover 10 years ago
Bandwidth costs money, correct? I wonder if for someone with zillions of small HTTP requests (Google, Twitter, Facebook, etc) these costs might be recoverable somehow.
_RPMover 10 years ago
This means that they are doing deep packet inspection and re-writing the actual packets sent over the network, right?
评论 #8505934 未加载
评论 #8506486 未加载
exabrialover 10 years ago
VPN or TLS ftw
评论 #8506483 未加载
wnevetsover 10 years ago
is this for fios or just wireless?
评论 #8506349 未加载
评论 #8506148 未加载