Browser Ad Blockers and Privacy

  • Security
  • Published Dec 18, 2017 Updated Jan 4, 2026

You have probably been in this situation: on some shopping site you put an article in your cart, but decide not to buy it after all. Later on, you notice that you are getting targeted ads for the exact same product on totally unrelated sites - or so you think. There is, however, a common denominator: the ad network. It tracks you quite effectively as you move from site to site. Many people are not exactly happy about that and turn to ad blockers to guard their privacy. This article looks at one way to measure the ad blockers’ effectiveness in terms of keeping their users’ privacy.

How to Measure Privacy

The method I used to measure how well the user’s privacy is kept is quite simple. It is based on the principle that data leakage should be avoided at the source. Ad networks cannot track you if they do not have any information about you.

With the help of our user experience and application performance monitoring product uberAgent I determined the number of different internet hosts a website communicates with. Each of those hosts has the ability to track the user - thus, the smaller the number, the better.

With a single visit to the homepage of the New York Times you become trackable by 18 advertisement/marketing companies and 6 social networks.

An Example

Opening the homepage of the New York Times in a browser without ad blockers just once resulted in communications with 84 different hosts! The list includes various ad networks and marketing analytics companies (Bizo, BlueKai, Bombora, Chartbeat, DataXu, DoubleClick, eXelate, Eyeota, Ixi, Keywee, Krux, MarkMonitor, Media6Degrees, Neustar, RapLeaf, RU4, Undertone, VisualDNA), Facebook, Google, LinkedIn, Pinterest, Twitter, and Yahoo. All of those companies can see that you accessed nytimes.com.

Measurement Procedure

For a somewhat robust measurement of the effectiveness of ad blockers with regards to privacy, I opened the world’s top 30 sites, determined the number of hosts they communicated with and compared the numbers for configurations with and without ad blockers.

Sites I Tested With

I selected the 30 sites by Alexa ranking, ignoring multiple country-specific domains per organization. Following is a full list of sites:

“Western sites” (mostly US companies):

“Non-western” sites:

Test Procedure

The test procedure went as follows:

  1. Deleted the entire browser history (including cookies and the cache)
  2. Opened the top 30 websites from bookmarks at the same time
  3. Cycled through all tabs
  4. Waited for 2 minutes
  5. Counted the number of sites contacted
  6. Repeated above procedure three times per test configuration

Test Configurations

I performed the tests for the following configurations

  1. Firefox 57 (default configuration)
  2. Firefox 57 + uBlock Origin
  3. Firefox 57 + Adblock Plus

Adblock Plus is more widely installed whereas uBlock Origin has a reputation for being fast and efficient. I used Firefox for these tests but I expect the results to be very similar to other browsers.

Results

#Hosts Communicated With - All Sites

The chart below shows the total number of distinct hosts the world’s 30 top sites communicated with when each site’s homepage was accessed just once:

#Hosts Communicated With - “Western” Sites

The chart below shows the total number of distinct hosts the top 18 “western” sites communicated with when each site’s homepage was accessed just once:

Conclusion

As you can see in the charts above, ad blockers drastically reduce the number of hosts a website communicates with, improving privacy significantly. uBlock Origin lives up to its reputation of being more effective than Adblock Plus. Both ad blockers seem to be better optimized for “western” sites.

Comparing the top 30 sites to the New York Times, a typical media site, one cannot fail to notice that media sites apparently are much more notorious in terms of tracking and analytics than other types of sites.

Comments

Related Posts

Finding (Executables in) User-Writeable Directories

Finding (Executables in) User-Writeable Directories
This article presents two different detection types for insecure filesystem permissions on Windows endpoints: scanning for directories that are user-writable, and detecting processes that are started from user-writeable directories. Directory Scan With ListUserWriteableDirectories & SetACL My ListUserWriteableDirectories script is an implementation of the first detection type: it scans the filesystem listing any permissions not known to be safe.
Security

Latest Posts

Fast & Silent 5 Watt PC: Minimizing Idle Power Usage

Fast & Silent 5 Watt PC: Minimizing Idle Power Usage
This micro-series explains how to turn the Lenovo ThinkCentre M90t Gen 6 into a smart workstation that consumes only 5 Watts when idle but reaches top Cinebench scores while staying almost imperceptibly silent. In the first post, I showed how to silence the machine by replacing and adding to Lenovo’s CPU cooler. In this second post, I’m listing the exact configuration that achieves the lofty goal of combining minimal idle power consumption with top Cinebench scores.
Hardware

Fast & Silent 5 Watt PC: Lenovo ThinkCentre M90t Modding

Fast & Silent 5 Watt PC: Lenovo ThinkCentre M90t Modding
This micro-series explains how to turn the Lenovo ThinkCentre M90t Gen 6 into a smart workstation that consumes only 5 Watts when idle but reaches top Cinebench scores while staying almost imperceptibly silent. In this first post, I’m showing how to silence the machine by replacing and adding to Lenovo’s CPU cooler. In a second post, I’m listing the exact configuration that achieves the lofty goal of combining minimal idle power consumption with top Cinebench scores.
Hardware