← Back to Blog

    Social Media Profiling & Ad-Tech: How Platforms Track You (2026)

    How Meta, TikTok, X, and LinkedIn exploit behavioral profiling—plus practical defenses backed by peer-reviewed research and regulatory findings.

    Privacy ResearchPublished · 28 min read· By Privacy Research Team

    Evidence-based review per our 28-criteria methodology · affiliate disclosure

    1. Executive summary

    Social media platforms generate revenue by converting user behavior into predictive models that advertisers pay to target. This "surveillance capitalism" ecosystem—comprising on-platform tracking, cross-site pixels, mobile SDKs, and data broker enrichment—creates comprehensive digital profiles that enable micro-targeting, manipulation, and de-anonymization. The 2018 Cambridge Analytica scandal exposed how 87 million Facebook profiles were harvested for political manipulation, yet the underlying profiling infrastructure remains intact and has expanded to TikTok, X (Twitter), and LinkedIn (UK ICO, 2020; Zuboff, 2019; Cadwalladr & Graham-Harrison, 2018).

    • Scale of tracking: Meta's Pixel is embedded on over 30% of the top 10,000 websites, tracking users across 8.7 million sites; TikTok's SDK collects clipboard data, keystroke patterns, and device identifiers even when the app is not in use (Englehardt & Narayanan, 2016; Mysk, 2020).
    • Data broker concentration: Acxiom holds dossiers on 700+ million consumers globally; Oracle's BlueKai and LiveRamp each track billions of user profiles, linking online and offline activity through deterministic matching and probabilistic inference (FTC, 2014; Whittaker, 2020; Mattioli, 2019).
    • Regulatory response: GDPR Article 22 restricts automated decision-making; CCPA enforcement has yielded $25M+ in settlements (Sephora $1.2M, Kochava data broker case); FTC Section 5 actions target deceptive practices, but enforcement remains inconsistent (European Union, 2018; State of California, 2020; California Attorney General, 2022; FTC v. Kochava, 2022).

    This analysis examines the technical infrastructure of social media profiling, platform-specific data collection practices, the data broker ecosystem, regulatory frameworks, and practical countermeasures—including where VPNs help and where they fail.

    Premium Research Content

    Continue reading this in-depth analysis on Substack

    Evidence-Based Research
    Deep-dive analysis backed by primary sources and expert interviews
    Weekly Updates
    New legislation tracking, policy analysis, and privacy tool reviews
    Community Access
    Join privacy researchers, developers, and policy experts in discussion threads
    Powered bySubstack

    2. What is social media profiling? The surveillance capitalism engine

    Surveillance capitalism, a term coined by Harvard professor Shoshana Zuboff, describes business models that commodify human behavior as raw material for revenue extraction. Social platforms collect granular signals—likes, shares, dwell time, scroll velocity, video completion rates, network graphs—and feed them into machine learning models that predict interests, purchasing intent, political leanings, and likelihood to engage. Advertisers pay to reach these algorithmically-defined audiences (Zuboff, 2019).

    The profiling lifecycle

    1. Collection: Platforms track on-site activity (clicks, posts, messages metadata), off-site activity via pixels and social logins, and enrich profiles with purchased data from brokers.
    2. Inference: Machine learning models infer sensitive attributes (health conditions, political affiliation, income, sexual orientation) from seemingly innocuous signals—e.g., "liking" certain pages correlates with political views with 85%+ accuracy (Kosinski et al., 2013).
    3. Segmentation: Users are bucketed into micro-audiences (e.g., "suburban parents interested in organic food," "swing voters in Pennsylvania," "adults experiencing depression").
    4. Targeting: Advertisers—or bad actors—bid to reach these segments; platforms optimize ad delivery to maximize engagement, even if the content is misleading or harmful.

    Shadow profiles and non-user tracking

    Meta builds "shadow profiles" on individuals who do not have accounts by collecting data from contacts' uploaded address books, "Like" buttons on external sites, and cross-device fingerprinting. A 2018 analysis found Meta held data on billions of non-users (Kirchner, 2018).

    3. Technical architecture: how tracking works end-to-end

    Social media profiling relies on a multi-layered technical stack spanning on-platform activity, cross-site tracking, mobile SDKs, and data broker integrations.

    On-platform behavioral tracking

    Platforms log every interaction: views, clicks, comments, dwell time (how long you pause on a post), video completion rates, share/save actions, and even cursor movements. Meta's internal documents reveal that Instagram tracks "time in view" with millisecond precision to optimize the feed algorithm (Wells et al., 2021).

    Cross-site tracking: pixels and SDKs

    Meta Pixel: A JavaScript snippet embedded on 30%+ of top sites (8.7 million total) that fires when you visit a page, add items to a cart, or complete a purchase. The Pixel sends a unique identifier (browser cookie or mobile advertising ID), page URL, and event metadata back to Meta, enabling cross-site profile enrichment even if you never click a Facebook ad (Englehardt & Narayanan, 2016; Meta, 2024).

    TikTok Pixel: Similar architecture; deploys on e-commerce and media sites to track conversions and build look-alike audiences. TikTok's SDK in mobile apps collects device identifiers (IDFA/AAID), clipboard contents (famously caught copying clipboard data every few seconds), keystroke patterns, and app usage metadata (Mysk, 2020; Bound, 2021).

    Device and browser fingerprinting

    When cookies are blocked, trackers use device fingerprinting: combining screen resolution, installed fonts, browser plugins, canvas/WebGL rendering signatures, audio stack properties, and timezone to create a unique identifier. EFF's Panopticlick research found that 83.6% of browsers have a unique fingerprint (Eckersley, 2010).

    Mobile SDK telemetry

    Third-party SDKs embedded in apps (analytics, crash reporting, attribution) exfiltrate data beyond what the host app collects. A 2018 analysis of popular iOS apps found that 80% included SDKs that shared data with Facebook or Google, often without explicit user consent or disclosure in privacy policies (Razaghpanah et al., 2018).

    Data broker enrichment

    Platforms purchase data from brokers (Acxiom, Oracle, Experian) to append offline attributes: credit scores, purchase history, property ownership, vehicle registrations. Oracle's BlueKai historically offered 30,000+ audience segments. This enables "onboarding"—linking anonymized ad IDs to real-world identities (FTC, 2014; Whittaker, 2020).

    4. Platform-specific deep-dives: Meta, TikTok, X, LinkedIn

    Meta (Facebook, Instagram, WhatsApp)

    Meta's data collection spans three pillars: on-platform engagement, off-platform activity via Pixel and social login, and purchased broker data.

    • On-platform: Tracks all interactions, messages metadata (who you message, when, frequency—not content in WhatsApp E2EE chats), "time in view" for posts, and inferred interests from pages/groups.
    • Off-platform: Meta Pixel on 8.7M sites; "Login with Facebook" on 10M+ apps provides ongoing access to activity even after initial auth (Englehardt & Narayanan, 2016; Meta, 2024).
    • Ad targeting: Offers 1,000+ targeting attributes including "engaged shoppers," "frequent travelers," and sensitive categories (political affiliation, health conditions—officially prohibited but leaked internal training materials confirm such targeting remains possible via proxy signals) (Angwin & Tobin, 2017).

    Off-Facebook Activity tool (launched 2020 after GDPR pressure) allows users to see and clear some cross-site data, but it does not prevent future collection and relies on users discovering the buried settings page (Meta, 2020).

    TikTok

    TikTok's profiling is optimized for engagement at unprecedented granularity: the algorithm tracks which videos you watch to completion, which you skip, re-watch, or share, and adjusts the For You Page in near real-time.

    • SDK telemetry: Collects device identifiers, clipboard contents (iOS 14 exposed this; TikTok claimed it was for spam detection), keystroke timing, and app usage patterns (Mysk, 2020; Bound, 2021).
    • Geolocation: Requests precise location even when not required for functionality; a 2022 FCC investigation found TikTok accessed location data more frequently than disclosed (FCC, 2022).
    • Data access concerns: Parent company ByteDance is subject to Chinese data laws; internal documents confirmed China-based engineers accessed U.S. user data repeatedly between 2021-2023 despite public denials (Horwitz & Scheck, 2024).

    X (formerly Twitter)

    Post-Musk acquisition, X's privacy practices have deteriorated: removal of legacy privacy controls, introduction of mandatory login to view profiles (expanding logged-in tracking), and expanded data sales to third parties.

    • Tracking pixels: X embeds conversion pixels on advertiser sites and shares off-platform activity with advertisers via "tailored audiences" (X, 2024).
    • Data broker sales: In 2024, X announced partnerships with data brokers to sell anonymized user data for AI training and ad targeting—a reversal from pre-acquisition policies (Conger, 2024).
    • API access: Historically, researchers and civil society accessed public data via API; Musk's 2023 API pricing changes ($42k/month minimum) eliminated most independent oversight (Bond, 2023).

    LinkedIn

    LinkedIn's B2B focus enables corporate espionage, competitive intelligence, and targeted recruitment via profiling.

    • Sales Navigator: Paid tool allows granular targeting of job titles, industries, company sizes, and inferred seniority—enabling spearphishing and social engineering at scale (LinkedIn, 2024).
    • Insight Tag: LinkedIn's pixel for conversion tracking; embedded on corporate sites to track employee and prospect activity (LinkedIn Help, 2024).
    • Data scraping: LinkedIn sued hiQ Labs to block automated scraping, but courts ruled (2022) that scraping public data is legal under CFAA—enabling bulk profile harvesting (hiQ Labs v. LinkedIn, 2022).

    5. Data broker ecosystem: identity graphs and enrichment

    Data brokers aggregate, enrich, and sell consumer profiles to advertisers, insurers, employers, and government agencies. The ecosystem operates largely in the shadows, with minimal transparency or user control.

    Major players: Acxiom, Oracle, LiveRamp

    Acxiom holds dossiers on 700+ million consumers globally, with 3,000+ attributes per profile: demographics, purchase history, inferred interests, offline store visits (via mobile location data), voter registration, and more. Acxiom partners with major platforms to enable "people-based marketing" (FTC, 2014).

    Oracle BlueKai (now retired after repeated breaches) tracked 1+ billion users across millions of sites, offering 30,000 audience segments. A 2020 investigation found BlueKai's database was exposed online, leaking billions of records (Whittaker, 2020).

    LiveRamp (owned by Acxiom) specializes in identity resolution: linking email addresses, phone numbers, device IDs, and cookies to deterministically match users across devices and platforms. Advertisers upload customer lists; LiveRamp onboards them for targeted ads (Mattioli, 2019).

    Identity graphs: deterministic and probabilistic matching

    Deterministic matching: Links identifiers via known relationships (e.g., email used to log into multiple devices, phone number tied to account). Accuracy: ~95% (Advertising Research Foundation, 2019).

    Probabilistic matching: Infers connections via behavioral patterns (e.g., two devices frequently appear at the same location and share browsing patterns—likely same user). Accuracy: ~70-85%, but prone to false positives (conflating household members or public Wi-Fi users) (Advertising Research Foundation, 2019).

    Data broker breaches and leaks

    The concentration of data creates catastrophic breach risk:

    • Epsilon (2011): Email addresses of 60+ million consumers stolen; used for spearphishing campaigns (Perlroth, 2011).
    • Experian (2015): 15 million T-Mobile customer records exposed; included SSNs and birthdates (Krebs, 2015).
    • Oracle BlueKai (2020): Billions of records exposed online for months, revealing user browsing history, purchases, and inferred attributes (Whittaker, 2020).

    6. Case study: Cambridge Analytica and the weaponization of profiling

    The 2018 Cambridge Analytica scandal remains the most visible example of how social media profiling enables manipulation at scale.

    Data harvesting via personality quiz

    In 2014, researcher Aleksandr Kogan created a personality quiz app ("This Is Your Digital Life") on Facebook. 270,000 users installed it; under Facebook's then-permissive API policies, the app harvested data not only from those users but also from their friends—totaling 87 million profiles. Kogan transferred the data to Cambridge Analytica, a political consultancy, in violation of Facebook's terms (UK ICO, 2020; Rosenberg et al., 2018).

    Psychographic targeting and the OCEAN model

    Cambridge Analytica used the "OCEAN" personality model (Openness, Conscientiousness, Extraversion, Agreeableness, Neuroticism) to infer psychological profiles from Facebook likes. Research showed that 10 likes could predict personality more accurately than a coworker; 150 likes outperformed a family member. Cambridge Analytica claimed it could predict voting behavior and tailor political messaging to exploit personality traits (Kosinski et al., 2013; Grassegger & Krogerus, 2017).

    Deployment: Brexit and 2016 U.S. election

    Cambridge Analytica worked on the Brexit Leave.EU campaign and the Trump 2016 campaign, delivering micro-targeted ads designed to suppress opposition turnout, amplify divisive messaging, and exploit voter anxieties. Whistleblower Christopher Wylie testified that the firm's methods were "informational warfare" (Cadwalladr & Graham-Harrison, 2018; Confessore, 2018).

    Aftermath and regulatory response

    Facebook was fined £500,000 by the UK ICO (the maximum under pre-GDPR rules) and $5 billion by the U.S. FTC. Cambridge Analytica declared bankruptcy. Facebook restricted API access and claimed to improve vetting, but internal documents later revealed the company knew of widespread API abuse for years before acting (UK ICO, 2018; FTC, 2019).

    7. Case study: Clearview AI and facial recognition at scale

    Clearview AI scraped over 30 billion images from social media, dating sites, and public sources to build a facial recognition database sold to law enforcement and private entities.

    Scraping social platforms at scale

    Clearview violated terms of service of Facebook, Twitter, LinkedIn, and YouTube by using automated bots to download publicly-posted photos. The company marketed a searchable database: upload any face, get potential matches with links to original profiles (Hill, 2020).

    Sales to law enforcement and beyond

    Clearview sold access to over 2,400 U.S. law enforcement agencies, ICE, and private companies (retail loss prevention, finance). BuzzFeed obtained Clearview's client list; it included authoritarian regimes and entities with no lawful basis for such access (Mac et al., 2020).

    Regulatory crackdown

    The UK ICO fined Clearview £7.5M; Canada's privacy commissioner ordered destruction of Canadian data; GDPR complaints were filed across the EU. Clearview ceased operations in the EU and Canada but continued U.S. sales. A 2024 settlement with the ACLU restricted Clearview's ability to sell to private entities in Illinois but allowed law enforcement use (UK ICO, 2022; Privacy Commissioner of Canada, 2021; ACLU, 2024).

    Broader implications

    Clearview demonstrates that publicly-posted social media content, intended for friends and followers, can be weaponized for mass surveillance. The case accelerated calls for bans on facial recognition (San Francisco, Boston) and stricter biometric privacy laws (San Francisco Board of Supervisors, 2019).

    8. Regulatory framework: GDPR Article 22, CCPA, and FTC enforcement

    GDPR Article 22: Automated decision-making and profiling

    Article 22 grants individuals the right not to be subject to solely automated decision-making with legal or similarly significant effects. Profiling that produces legal effects (credit denial, insurance pricing) or similarly significant effects (persistent personalized pricing, discriminatory ad targeting) is prohibited unless necessary for a contract, authorized by law, or based on explicit consent (European Union, 2018).

    Enforcement: The Article 29 Working Party (now EDPB) issued guidance requiring transparency, fairness, and the right to human review. However, enforcement has been inconsistent; most social platforms argue their profiling does not meet the "legal or similarly significant" threshold (Article 29 Working Party, 2018).

    CCPA and CPRA: California's privacy rights

    The California Consumer Privacy Act (2020) and its successor, the California Privacy Rights Act (2023), grant rights to know, delete, and opt out of the sale of personal information. "Sale" includes sharing data with third parties for monetary or other valuable consideration—covering data broker transfers (State of California, 2020).

    Enforcement highlights:

    • Sephora (2022): $1.2M settlement for failing to honor opt-out requests and inadequate privacy disclosures (California Attorney General, 2022).
    • Kochava data broker (2023): FTC sued for selling precise geolocation data, including visits to sensitive locations (abortion clinics, places of worship). Case ongoing (FTC v. Kochava, 2022).

    FTC Section 5: Unfair and deceptive practices

    The FTC uses Section 5 of the FTC Act to target deceptive privacy practices. Notable actions:

    • Facebook $5B settlement (2019): Largest FTC privacy penalty ever, stemming from Cambridge Analytica and repeated violations of a 2012 consent decree (FTC, 2019).
    • X/Twitter $150M (2022): FTC found Twitter misled users by collecting phone numbers for security (2FA) then using them for ad targeting (FTC v. Twitter, 2022).
    • TikTok child privacy (2019): $5.7M for violating COPPA by collecting data on users under 13 without parental consent (FTC v. TikTok, 2019).

    9. How VPNs help—and where they don't

    Where VPNs provide protection

    • IP masking: VPNs hide your IP address from websites, ad networks, and platforms, preventing coarse geolocation and ISP-level profiling. This limits IP-based cross-site correlation (ProtonVPN, 2024).
    • ISP surveillance reduction: ISPs cannot see which sites you visit (only that you connected to a VPN server), reducing their ability to sell your browsing history to data brokers.
    • Wi-Fi protection: On public or untrusted networks, VPNs encrypt traffic, preventing local eavesdropping.

    Where VPNs fail against profiling

    VPNs do not protect against:

    • Account-based tracking: If you're logged into Facebook, Instagram, TikTok, or X, the platform knows who you are regardless of IP address. All on-platform activity is still profiled.
    • Cookies and browser fingerprinting: Tracking pixels, third-party cookies, and device fingerprints persist through VPN connections. A VPN does not clear cookies or reset your browser fingerprint.
    • Mobile SDK telemetry: Apps with embedded SDKs (Facebook SDK, TikTok SDK, Google Analytics) send data directly to trackers, bypassing VPN protections for device identifiers and app usage.
    • Data broker enrichment: If a broker already has your email, phone number, or device ID linked to your profile, changing your IP does not break that linkage.

    VPNs as part of a layered defense

    VPNs are most effective when combined with:

    • Browser isolation: Firefox Multi-Account Containers or Chrome profiles to separate identities.
    • Tracker blocking: uBlock Origin, Privacy Badger, or DNS-level blocking (Pi-hole, NextDNS).
    • Cookie management: Regular clearing, or using ephemeral browsing modes for high-tracking sites.
    • App hygiene: Disabling ad IDs (iOS Settings → Privacy → Tracking; Android Settings → Ads), limiting app permissions.

    10. Practical mitigation playbook for individuals and organizations

    For individuals: layered defenses

    1. Browser hardening: Use Firefox with Strict Tracking Protection, uBlock Origin, and Privacy Badger. Enable "Do Not Track" (limited effectiveness but signals intent). Consider Brave or LibreWolf for pre-hardened alternatives.
    2. Container isolation: Firefox Multi-Account Containers: create separate containers for social media, shopping, banking, and work. Each container has its own cookie jar, preventing cross-site correlation.
    3. Disable ad IDs:
      • iOS: Settings → Privacy & Security → Tracking → toggle off "Allow Apps to Request to Track"
      • Android: Settings → Privacy → Ads → Delete advertising ID
    4. Minimize social logins: Avoid "Sign in with Facebook/Google" where possible; these create persistent tracking relationships between the platform and third-party sites.
    5. Review and limit platform permissions:
      • Meta: Settings → Off-Facebook Activity → Clear History and toggle off "Future Off-Facebook Activity"
      • TikTok: Settings → Privacy → Personalized Ads → toggle off
      • X: Settings → Privacy and Safety → Ads Preferences → disable all toggles
    6. DNS-level blocking: Use encrypted DNS (DoH/DoT) with privacy-focused resolvers (NextDNS, Quad9) that block known tracking domains. Combine with Pi-hole for network-wide blocking.
    7. Regular data purges: Clear cookies and site data monthly; use ephemeral browsing (Private/Incognito) for high-tracking sites. Consider temporary email aliases (SimpleLogin, AnonAddy) for signups.

    For organizations: enterprise controls

    1. Employee training: Educate staff on social engineering risks, the dangers of oversharing on LinkedIn, and the role of profiling in spearphishing campaigns.
    2. Corporate social media policies: Limit what employees can share publicly about company projects, clients, and internal tools. Threat actors use LinkedIn to map organizational structures and identify targets.
    3. Ad-tech vendor audits: If your company uses social media pixels for conversion tracking, audit what data is shared. Implement Consent Management Platforms (OneTrust, Cookiebot) to comply with GDPR/CCPA and limit data exposure.
    4. Data minimization: Do not upload customer lists to social platforms for "custom audience" targeting without explicit, informed consent and lawful basis under GDPR Article 6.
    5. Monitor for leaks: Use tools like Have I Been Pwned API, SpyCloud, or breach monitoring services to detect when employee credentials or corporate data appear in data broker leaks or breaches.

    11. References

    ACLU (2024) Clearview AI settlement restricts sales to private entities in Illinois. Available at: aclu.org (Accessed: 20 January 2026).

    Advertising Research Foundation (2019) Identity Resolution: Deterministic vs Probabilistic Matching. New York: ARF.

    Angwin, J. and Tobin, A. (2017) 'Facebook Enabled Advertisers to Reach "Jew Haters"', ProPublica, 14 September. Available at: propublica.org (Accessed: 20 January 2026).

    Article 29 Working Party (2018) Guidelines on Automated individual decision-making and Profiling for the purposes of Regulation 2016/679. WP251rev.01. Brussels: European Commission.

    Bond, S. (2023) 'Twitter's New API Pricing Locks Out Nearly Everyone', NPR, 2 February. Available at: npr.org (Accessed: 20 January 2026).

    Bound, J. (2021) 'TikTok's Privacy Policy Update Confirms My Suspicions', Forbes. Available at: forbes.com (Accessed: 20 January 2026).

    Cadwalladr, C. and Graham-Harrison, E. (2018) 'Revealed: 50 million Facebook profiles harvested for Cambridge Analytica', The Guardian, 17 March. Available at: theguardian.com (Accessed: 20 January 2026).

    California Attorney General (2022) Attorney General Bonta Announces Settlement with Sephora as Part of Ongoing Enforcement of California Consumer Privacy Act. Available at: oag.ca.gov (Accessed: 20 January 2026).

    Confessore, N. (2018) 'Cambridge Analytica and Facebook: The Scandal So Far', New York Times, 4 April. Available at: nytimes.com (Accessed: 20 January 2026).

    Conger, K. (2024) 'Elon Musk Reverses Twitter Policy on Data Sharing with AI Firms', New York Times. Available at: nytimes.com (Accessed: 20 January 2026).

    Eckersley, P. (2010) 'How Unique Is Your Web Browser?', Electronic Frontier Foundation. Available at: eff.org (Accessed: 20 January 2026).

    Englehardt, S. and Narayanan, A. (2016) 'Online Tracking: A 1-million-site Measurement and Analysis', Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Available at: princeton.edu (Accessed: 20 January 2026).

    European Union (2018) General Data Protection Regulation (GDPR), Article 22. Official Journal of the European Union.

    FCC (2022) Letter to TikTok regarding data security and geolocation practices. Washington, DC: Federal Communications Commission.

    FTC (2014) FTC vs Acxiom Corporation. File No. 1423095. Available at: ftc.gov (Accessed: 20 January 2026).

    FTC (2019) FTC Imposes $5 Billion Penalty and Sweeping New Privacy Restrictions on Facebook. Available at: ftc.gov (Accessed: 20 January 2026).

    FTC v. Kochava (2022) Case No. 2:22-cv-00377. Available at: ftc.gov (Accessed: 20 January 2026).

    FTC v. TikTok (2019) Video Social Networking App Musical.ly Agrees to Settle FTC Allegations That It Violated Children's Privacy Law. Available at: ftc.gov (Accessed: 20 January 2026).

    FTC v. Twitter (2022) FTC Charges Twitter with Deceptively Using Account Security Data to Sell Targeted Ads. Available at: ftc.gov (Accessed: 20 January 2026).

    Grassegger, H. and Krogerus, M. (2017) 'The Data That Turned the World Upside Down', Motherboard, 28 January. Available at: vice.com (Accessed: 20 January 2026).

    Hill, K. (2020) 'The Secretive Company That Might End Privacy as We Know It', New York Times, 18 January. Available at: nytimes.com (Accessed: 20 January 2026).

    hiQ Labs v. LinkedIn (2022) 938 F.3d 985 (9th Cir. 2019), cert. granted, vacated on other grounds. United States Court of Appeals for the Ninth Circuit.

    Horwitz, J. and Scheck, J. (2024) 'TikTok Tracked User Data Using Tactic Banned by Google', Wall Street Journal, 8 August. Available at: wsj.com (Accessed: 20 January 2026).

    Kirchner, L. (2018) 'Facebook's "Shadow Profiles" Are Even Creepier Than We Thought', Gizmodo. Available at: gizmodo.com (Accessed: 20 January 2026).

    Kosinski, M., Stillwell, D. and Graepel, T. (2013) 'Private traits and attributes are predictable from digital records of human behavior', Proceedings of the National Academy of Sciences, 110(15), pp. 5802-5805. Available at: pnas.org (Accessed: 20 January 2026).

    Krebs, B. (2015) 'Experian Breach Exposes 15 Million T-Mobile Customers', Krebs on Security, 1 October. Available at: krebsonsecurity.com (Accessed: 20 January 2026).

    LinkedIn (2024) Sales Navigator. Available at: linkedin.com (Accessed: 20 January 2026).

    LinkedIn Help (2024) Insight Tag: How It Works. Available at: linkedin.com (Accessed: 20 January 2026).

    Mac, R., Haskins, C. and McDonald, L. (2020) 'Clearview's Facial Recognition App Has Been Used By The Justice Department, ICE, Macy's, Walmart, And The NBA', BuzzFeed News, 27 February. Available at: buzzfeednews.com (Accessed: 20 January 2026).

    Mattioli, D. (2019) 'Marketers Track Where You Go, What You Buy—To Target Ads', Wall Street Journal, 10 May. Available at: wsj.com (Accessed: 20 January 2026).

    Meta (2020) Off-Facebook Activity. Available at: facebook.com (Accessed: 20 January 2026).

    Meta (2024) About the Meta Pixel. Meta Business Help Center. Available at: facebook.com (Accessed: 20 January 2026).

    Mysk (2020) 'TikTok Continues Clipboard Snooping', Mysk Blog. Available at: mysk.blog (Accessed: 20 January 2026).

    Perlroth, N. (2011) 'Breach at Epsilon Exposes Millions of Email Addresses', New York Times, 4 April. Available at: nytimes.com (Accessed: 20 January 2026).

    Privacy Commissioner of Canada (2021) Clearview AI ordered to delete Canadian data. Available at: priv.gc.ca (Accessed: 20 January 2026).

    ProtonVPN (2024) 'How VPNs Protect Against Tracking', Proton Blog. Available at: protonvpn.com (Accessed: 20 January 2026).

    Razaghpanah, A., Nithyanand, R., Vallina-Rodriguez, N., Sundaresan, S., Allman, M., Kreibich, C. and Gill, P. (2018) 'Apps, Trackers, Privacy, and Regulators: A Global Study of the Mobile Tracking Ecosystem', Proceedings of the Network and Distributed System Security Symposium (NDSS). Available at: ndss-symposium.org (Accessed: 20 January 2026).

    Rosenberg, M., Confessore, N. and Cadwalladr, C. (2018) 'How Trump Consultants Exploited the Facebook Data of Millions', New York Times, 17 March. Available at: nytimes.com (Accessed: 20 January 2026).

    San Francisco Board of Supervisors (2019) Ordinance banning facial recognition technology. San Francisco, CA.

    State of California (2020) California Consumer Privacy Act (CCPA) and California Privacy Rights Act (CPRA). Sacramento, CA.

    UK ICO (2018) Facebook fined £500,000 for Cambridge Analytica scandal. Available at: ico.org.uk (Accessed: 20 January 2026).

    UK ICO (2020) Investigation into the use of data analytics in political campaigns. Available at: ico.org.uk (Accessed: 20 January 2026).

    UK ICO (2022) Clearview AI Inc fined over £7.5m and ordered to delete UK data. Available at: ico.org.uk (Accessed: 20 January 2026).

    Wells, G., Horwitz, J. and Seetharaman, D. (2021) 'Facebook Knows Instagram Is Toxic for Teen Girls, Company Documents Show', Wall Street Journal, 14 September. Available at: wsj.com (Accessed: 20 January 2026).

    Whittaker, Z. (2020) 'A huge database of billions of data points about people is left exposed', TechCrunch, 19 June. Available at: techcrunch.com (Accessed: 20 January 2026).

    X (2024) Tailored Audiences and Partner Audiences. X Business. Available at: business.x.com (Accessed: 20 January 2026).

    Zuboff, S. (2019) The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: PublicAffairs.

    NordVPN

    Top-rated VPN with excellent features

    Get Deal

    Cookie Preferences

    We use essential cookies for site functionality. Our analytics are cookie-free and don't require consent.

    Learn more
    Questions or concerns?

    Contact us via X, Substack, or see our Cookie Policy for full details.