Recent findings by security researchers reveal troubling practices by Meta and Yandex. They discovered that the companies used native Android apps to track user data by listening to localhost ports. This method enabled them to connect web browsing activity to user identities, sidestepping traditional privacy measures.
After researchers made their findings public, Meta took steps to change its approach. The Meta Pixel script, previously responsible for sending data, stopped its activity on localhost. This alteration may help Meta avoid issues with Google Play policies that restrict hidden data collection methods.
A Meta spokesperson acknowledged ongoing discussions with Google regarding these practices and stated, “We paused the feature while we resolve the issue.” However, they did not provide additional details.
The research team, including experts from IMDEA Networks, Radboud University, and KU Leuven, explained how Meta’s and Yandex’s apps gather web cookie data through the localhost. Localhost is a special address used within devices to manage network tasks. It’s commonly employed by developers to test applications locally.
During their investigation, the researchers found that popular apps like Facebook and Instagram were quietly collecting data while users browsed the web. They described a system where native apps could intercept browser data, sending it back to Meta and Yandex without users’ knowledge.
This process violated users’ expectations about their privacy. The researchers noted that the apps could combine browsing data with identifiers like the Android Advertising ID, allowing them to create profiles based on users’ online activity.
For context, these tracking methods undermine established protocols regarding first-party cookies. Typically, these cookies should not connect browsing activities across different sites. The researchers pointed out that Meta’s tracking methods allowed it to link different cookie data to specific users, bypassing existing privacy protections.
In a step further back in time, Yandex’s use of similar tactics began in 2017. Despite inquiries from various news sources, Yandex has not commented publicly on the findings.
The researchers’ report has led to proactive measures by browser vendors. For example, Google’s Chrome 137, released in May 2025, introduced features to block the methods used by Meta for tracking. Additionally, Firefox is developing comparable defenses. Brave Browser, on the other hand, has always required user consent before allowing localhost access, effectively shielding its users from such tracking practices.
The need for enhanced privacy measures remains critical. A proposed “local network access” permission by Google aims to further safeguard user data against localhost-based tracking in the future. Efforts like these reflect growing concerns over digital privacy and the need for transparency in data collection methods.
Overall, these findings have opened up essential discussions about user consent, data privacy, and the methods tech companies use to track behavior. As users become more aware of these tactics, they may demand stricter regulations and better protections for their online activity.