The entire mobile user journey ....... in real time.
Q. When is a keylogger not a keylogger
Ogury (io.presage) partners with thousands of apps globally to generate unique interest and behavioral data directly from more than 400 million unique mobile user profiles.
Organizations only see what happens within their own apps, websites, and ecosystem. They don’t see what happened before users visit their apps or websites, or what happens after they leave them.
We are not talking about the buyer or customer journey, we are talking about the entire mobile user journey, across all apps and websites, in real time. Our Usage Data is not limited to data that directly relates to the Partner App in which the Ogury Product is integrated. Rather, the Ogury Product collects Usage Data from ALL applications and systems on the Device on which a Partner App is installed. "After explicit opt-in we see the complete usage of a mobile device for a given user, including any websites browsed and any apps downloaded, all app usage including any future installations of apps…
No as ublock only works in a browser, but you can get decent ad blockers for your phone that work like a VPN. The only down side is if you need to use an actual VPN, as you'd need to turn off the ad-blocker in order to use the VPN, and the second you turn it off is when they would export your shit.
The best method is rooting your phone, which is easy nowadays, sniffing your traffic and blocking the analytics domains in the good old prehistoric hosts file.
T0pspin wrote: I looked up the hosts file and it seems to good to be true. Depends on what you mean "too good to be true". If you can keep an **up-to-date **listing of **all **the hosts affiliated with **all **the ad networks (and have **no **overlap with **anything **else) on **all **the devices that you use, then the hosts file is a great way to go. Redirect all them garbage sites to local and have a nice day. In fact, that's basically how common adblocker applications work: they're just "hosts" files for your browser itself. Rather than checking for redirects at the OS level, your browser just watches every connection and filters against IPs/hosts that happen to coincide with known-bad actors. Clearly this has some security implications as to whether or not you should trust that that's all the adblocking application is doing with all the traffic that passes by it and whether or not that application is the best judge as to what's "bad" traffic that needs blocking (See: AdblockPlus selling the ability to bypass their own algorithms?) An Adblocker is only as good as the list that backs it, and that list as useful in a browser extension as it is if you can find a way to translate it for your hosts file (modulo performance characteristics, I suppose).
If you have control of your own network, however, maybe something like this would be able to help? Lets you curate only a single listing of sites rather than a bunch over all your devices so management is less of a nightmare. There are also these "free" options, but to me they look sketchy so go with what you feel.
Huitzilopochtli wrote: The best method is rooting your phone, which is easy nowadays, sniffing your traffic and blocking the analytics domains in the good old prehistoric hosts file. This may or may not be true, depending on the device you're currently using. Newer Apple products are pretty difficult to root and Android devices are moving in the same direction. Moving towards DNS blocking solutions or curating a list on a common upstream box seems to be the way to go (with obvious drawbacks).
- Futility