friction boot

We are soon on the date with the new privacy policies that Apple will apply to iPhone devices that threaten the throne of the advertising industry on mobile phones, how will application developers deal with those strict rules from Apple, here are some things that they think of using to circumvent Apple.

What's the story

Everyone is familiar with that Camel Preparing to implement new privacy policies that will prevent application developers from collecting your data without your consent… Why! Because Apple will provide you with a choice, which is to obtain your consent and allow access to your data and track you or reject and thus the advertiser IDFA number of your device will be hidden and because everyone will choose not to agree, you will not be targeted with ads that are appropriate for you. Thus, everyone who tries to profit from the ad network targeting iPhone users will lose, the first of which is the social networking giant Facebook.


Application developers are desperately searching for fraudulent and circumvented ways that would allow them to bypass Apple's new privacy rules, and one of those methods is the use of forbidden technologies such as using a device's fingerprint.

Through the device's fingerprint, it is possible to identify repeated visits from the same smartphone, even between multiple applications. This technology does indeed work, but it is prohibited by Apple Store policies, but it is difficult to detect as a set of hardware and software features and configurations such as Internet connection and battery or language settings and usage patterns are linked. And so on.

In a simple way - when you visit a website, your browser provides a set of data that aims to ensure that the website is displayed correctly on your iPhone, as the website needs to display itself differently on every device such as Mac, iPhone and so on.

With the passage of time, websites have become more complex, which is why the amount of data that the browser provides to the site has increased. Here are some examples of the data that the site obtains from your browser:

  • Browser name and version
  • The device's operating system and version
  • Installed fonts
  • Device vendor
  • Browser plug-ins
  • screen resolution
  • Screen color depth
  • Supported audio formats
  • Supported video formats
  • Connected media devices such as web cameras
  • Preferred content language

Note that this is some data and not a complete list, and when the site obtains that data and analyzes it, it becomes easy for it to display itself on your device in an appropriate manner. Thus, application developers can track you and identify you even if it refuses to track you and access your data.

The hashed email


There is another method that developers may use is Hashed emails through which users can be tracked across different applications, if they use the same email to register for different services and games, and in a simple way, email hash is intended to convert the email address into a hexadecimal chain made up of 32 letters, here's how it works:

Email address such as Walid @

Through a hash algorithm, there are many of them free of charge, and once you add the email to the algorithm, you get a unique value that is not the same with any other value, and here it will be 43307bb5a669b247270a4d81cce6f3ff and so you can be identified through this method despite Apple's new privacy policies.

Finally, while it may be difficult for Apple to monitor such crooked methods, the cost of discovering them will be prohibitive for the developer, because he will forever lose the ability to enter the world's most profitable Apple App Store and lose the profit from iPhone users, so will the developer risk?

What do you think of the twisted path developers will follow you? Let us know in the comments



Related articles