Google 分析事件排列
Google Analytics Event Permutation
自 9 月 9 日以来,某些事件(约 0.01%)及其维度无法通过排列读取。
就像事件 "VideoView" 变成 "eiVwoediV"。
有没有人遇到同样的问题或者有人知道为什么?
分析是通过 Google 标签管理器实现的。
感谢指教!
我们抓住了!幸运的是,我们有一位知名客户创造了这样的
请求,我们给他打电话!
我们将其归结为一个 Firefox 插件:
https://addons.mozilla.org/de/firefox/addon/cliqz/
我们可以通过安装插件来重现所描述的行为。奇怪的是,关于addon.mozilla.org.
,插件最近没有修改过
我们安装的恶意版本是1.0.37版本,可以从https://s3.amazonaws.com/cdncliqz/update/Cliqz.1.0.37.xpi安装
看来,他们测试了一些反追踪功能。可能他们上传了
2015-09-09的一些新规定。
感谢您四天的寻找。
我是 Tomas,我是 CLIQZ 的一名软件工程师。
我们是一家德国初创公司,正在将搜索和创新的隐私功能集成到浏览器中。这确实是我们的反跟踪功能的结果。 reddit 上也有人提出了类似的问题,我们的 PR 负责人已经回答了,所以我在这里只引用相同的答案:
CLIQZ Anti Tracking is not designed to block tracking in general, but rather only the tracking of individual users — which we consider a violation of our users’ privacy, and therefore inappropriate. Unlike other anti-tracking systems, ours doesn’t block the signals completely; thus, website owners are able to get data for legitimate uses, such as counting visits.
To prevent the identification of users (e.g. by using JavaScript hashes), CLIQZ Anti Tracking does in fact permute strings.
. Whenever a new tracker shows up in our data, our system initially treats it as a user-identifying tracker and changes the string to preventively protect our users. Our system uses so called k-anonymity techniques. If it sees the same string for an event with multiple users showing up independently over the course of several days, it puts it on a whitelist of legitimate, non-identifying trackers. Once a tracker is whitelisted, it remains unmodified and website-owners see the original string. In other words, CLIQZ Anti Tracking limits the functionality of legitimate trackers only temporarily. As soon as it becomes clear that a tracker doesn’t violate our user’s privacy, everything works as usual. Privacy is extremely important to us and we believe this technology is necessary to protect our users from snooping.
希望对您有所帮助。
自 9 月 9 日以来,某些事件(约 0.01%)及其维度无法通过排列读取。 就像事件 "VideoView" 变成 "eiVwoediV"。
有没有人遇到同样的问题或者有人知道为什么? 分析是通过 Google 标签管理器实现的。
感谢指教!
我们抓住了!幸运的是,我们有一位知名客户创造了这样的 请求,我们给他打电话!
我们将其归结为一个 Firefox 插件:
https://addons.mozilla.org/de/firefox/addon/cliqz/
我们可以通过安装插件来重现所描述的行为。奇怪的是,关于addon.mozilla.org.
,插件最近没有修改过我们安装的恶意版本是1.0.37版本,可以从https://s3.amazonaws.com/cdncliqz/update/Cliqz.1.0.37.xpi安装 看来,他们测试了一些反追踪功能。可能他们上传了 2015-09-09的一些新规定。
感谢您四天的寻找。
我是 Tomas,我是 CLIQZ 的一名软件工程师。
我们是一家德国初创公司,正在将搜索和创新的隐私功能集成到浏览器中。这确实是我们的反跟踪功能的结果。 reddit 上也有人提出了类似的问题,我们的 PR 负责人已经回答了,所以我在这里只引用相同的答案:
CLIQZ Anti Tracking is not designed to block tracking in general, but rather only the tracking of individual users — which we consider a violation of our users’ privacy, and therefore inappropriate. Unlike other anti-tracking systems, ours doesn’t block the signals completely; thus, website owners are able to get data for legitimate uses, such as counting visits.
To prevent the identification of users (e.g. by using JavaScript hashes), CLIQZ Anti Tracking does in fact permute strings. . Whenever a new tracker shows up in our data, our system initially treats it as a user-identifying tracker and changes the string to preventively protect our users. Our system uses so called k-anonymity techniques. If it sees the same string for an event with multiple users showing up independently over the course of several days, it puts it on a whitelist of legitimate, non-identifying trackers. Once a tracker is whitelisted, it remains unmodified and website-owners see the original string. In other words, CLIQZ Anti Tracking limits the functionality of legitimate trackers only temporarily. As soon as it becomes clear that a tracker doesn’t violate our user’s privacy, everything works as usual. Privacy is extremely important to us and we believe this technology is necessary to protect our users from snooping.
希望对您有所帮助。