-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Possible circumvention of TikTok blocking #6
Comments
Can you elaborate on how these "TikTok tracking scripts" are implemented? Such content blocks are generally implemented via enterprise policies, mandatory-to-install extensions, or even network-based blocks. I've never heard of this being accomplished via scripts. |
"The TikTok Pixel is a piece of code that you can place on your website that allows advertisers to share website visitor events with TikTok via browser." https://ads.tiktok.com/help/article/tiktok-pixel# (they call it a "pixel" but it's JS) If a network-based block was in place, could this "pixel" script still communicate with |
Oh I see, sorry I had misread you initial message - the blocking is separate from the tracking script. Yes, in that scenario the entity performing the block at the network would need to also disable IP Protection. This is similar to how Encrypted Client Hello will hide destinations from network observers but can be disabled by browser enterprise policies |
Public sector networks in some states are required to block tracking of their users by TikTok, including by blocking TikTok at the router. If TikTok tracking scripts are "eligible third-party traffic" for purposes of IP Protection, then could IP Protection have the side effect of circumventing this required block?
related: #2
The text was updated successfully, but these errors were encountered: