Hacker News new | past | comments | ask | show | jobs | submit login

It's effectively malware—this article has some more detail: https://arstechnica.com/security/2025/06/meta-and-yandex-are...

Basically, they created a channel between the browser and a localhost webserver running in their native apps, by abusing the ability to set arbitrary metadata on WebRTC connections. That way, they were able to exfiltrate tracking cookies out of the browser's sandbox to the native app, where they could be associated with your logged-in user identity.






You are implying Meta and others were able to just siphon data from any website via WebRTC using their native apps, but this was not the case. They were only able to track which websites you visited if that website already embedded the company tracking. Many websites do, but not all.

Is there any way to fix it within Android? damn...

Yes, don't install their native apps.

that's great but cheaper android phones come with built-in Meta apps/services which cant even be uninstalled.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: