Previously: <a href="https://news.ycombinator.com/item?id=8500131" rel="nofollow">https://news.ycombinator.com/item?id=8500131</a><p>See also, EFF:<p>> To compound the problem, the header also affects more than just web browsers. Mobile apps that send HTTP requests will also have the header inserted. This means that users' behavior in apps can be correlated with their behavior on the web, which would be difficult or impossible without the header. Verizon describes this as a key benefit of using their system. But Verizon bypasses the 'Limit Ad Tracking' settings in iOS and Android that are specifically intended to limit abuse of unique identifiers by mobile apps.<p>> Because the header is injected at the network level, Verizon can add it to anyone using their towers, even those who aren't Verizon customers. Notably, Verizon appears to inject the X-UIDH header even for customers of Straight Talk, a mobile network reseller (known as a MVNO) that uses Verizon's network. Customers of Straight Talk don't necessarily have a relationship with Verizon.<p>More at <a href="https://www.eff.org/deeplinks/2014/11/verizon-x-uidh" rel="nofollow">https://www.eff.org/deeplinks/2014/11/verizon-x-uidh</a>
to everyone making a request to their cohost and not seeing the header there, you're not free from it.<p>remember: only paying "customers" have access to that tracking. all the open request showing it are probably tests