In this session, we will examine real-world evidence of data-harvesting practices used by TikTok and Meta, as identified by the Jscrambler research team. 


Our analysis will break down the technical aspects of how these data collection methods operate, including how pixels can bypass consent systems and turn "anonymous" browsing into persistent user profiles. Additionally, we will provide technical strategies to help regain control on the client side without compromising business performance.

Key Takeaways

The Reality of Shadow Profiling

How pixels use deterministic hashing to reconstruct identities from emails and phone numbers.

The Commerce Leak

Why sharing cart values and product mix with ad platforms creates a competitive disadvantage.

The Consent Gap

Evidence of pixels transmitting sensitive data before a user opts in or even after they "Reject All."

Runtime Governance

Practical strategies to block unauthorized data exfiltration and ensure GDPR/CCPA compliance.

Meet the Speakers

Gareth Bowker

Jscrambler, Head of Security Research

Nathan Coppinger

Jscrambler, Product Marketing Manager

David Alves

Jscrambler, Security Analyst

Related Resources

Beyond Analytics: The Silent Collection of Commercial Intelligence by TikTok and Meta Ad Pixels
BLOG ARTICLE

Beyond Analytics: The Silent Collection of Commercial Intelligence by TikTok and Meta Ad Pixels

OWASP's Biggest Signal in Years: Supply Chain Is Now a Top-3 Risk — And It Includes the Client Side
BLOG ARTICLE

OWASP's Biggest Signal in Years: Supply Chain Is Now a Top-3 Risk — And It Includes the Client Side

Jscrambler Recognized as Specialist in Client-Code Protection
RESEARCH REPORT

Jscrambler Recognized as Specialist in Client-Code Protection