Guest User

Untitled

a guest
Feb 4th, 2025
154
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.01 KB | None | 0 0
  1. Below is a point‐by‐point “fact check” and explanation of the key elements in the diagram, based on how mobile advertising technology actually works. In short, the overall flow shown—phone → SSP → DSP → advertisers/data brokers—is a fair, simplified representation of real ad‐tech data flows, though there are some oversimplifications and placeholders.
  2. 1) Collection of Device/Personal Data
  3.  
  4. Location, IP address, timestamp, user agent, IDFA (Identifier for Advertisers), battery level, phone number (hashed), etc.
  5. Accurate in principle: Many advertising SDKs do try to collect these data points (or at least a subset of them) for targeting and analytics.
  6. IDFA is indeed the iOS advertising identifier; on Android devices, this would be the GAID (Google Advertising ID).
  7. Battery level and memory usage can be used to optimize ad rendering or even do “fingerprinting,” although not all SDKs gather all these extra data points.
  8. The IP address in the diagram (11.11.111.11) is clearly a placeholder—it’s not a typical “real” IP in most logs, but it illustrates the concept.
  9.  
  10. 2) User Permission (“Allow app to track you?”)
  11.  
  12. With iOS 14.5 and later, apps must prompt users for permission to access the IDFA.
  13. The diagram’s “Sure why not” arrow implies users often tap “Allow” without fully realizing the implications.
  14. If a user taps “No,” many SDKs still collect limited data (e.g., IP, device model, etc.) but do not get the IDFA.
  15. So the idea that there can be “Yes” or “No” to tracking is correct, but the rest of the data flow (particularly IP) can still occur even if the user opts out.
  16.  
  17. 3) SSP (Supply‐Side Platform) and DSP (Demand‐Side Platform)
  18.  
  19. SSP examples: Unity Ads, IronSource, Adjust. These are indeed known platforms that let app publishers “supply” ad inventory.
  20. DSP examples: Moloco (here humorously shown as “Moloocoads”), Criteo, etc. These platforms represent advertisers who “demand” ad space.
  21. Accurate Relationship: Data from the SSP is passed to DSPs so they can decide how much to bid on showing you an ad.
  22.  
  23. 4) “Fake SSPs / Data Collectors”
  24.  
  25. The diagram suggests some entities in the ad chain exist primarily to siphon data rather than to serve legitimate ads.
  26. In reality, there can be “resellers,” “data partners,” or questionable ad networks that mostly harvest data.
  27. While “Fake SSP” is not a formal ad‐tech term, the idea that some intermediaries might gather and monetize user data is absolutely valid.
  28.  
  29. 5) Advertisers and Data Brokers
  30.  
  31. Advertisers (e.g., “bwin,” “advertiser1,” “advertiser2” in the diagram) receive some level of user data when they bid on or serve ads.
  32. Data brokers (e.g., “Redmob,” “AGR”) can aggregate data and match it against other databases, sometimes re‐identifying “anonymous” IDs.
  33. Yes, data‐broker activity is real: They often buy/sell anonymized or pseudo‐anonymous data to companies, governments, or other third parties.
  34.  
  35. 6) IDFA ↔ PII (Personally Identifiable Information)
  36.  
  37. The diagram shows an example bridging the IDFA with PII (e.g., “Tim Smith,” phone number, address).
  38. Legally or policy‐wise, platforms usually claim they do not directly tie IDs (like IDFA) to names/addresses—but in practice, big data sets can facilitate re‐identification.
  39. So the diagram’s suggestion that advertisers/data brokers may link device IDs to real identities is (unfortunately) a known possibility.
  40.  
  41. 7) Intelligence & Security Agencies
  42.  
  43. The final arrow to “Intelligence & security agencies or anyone else…” is highlighting that in many jurisdictions, law enforcement or intelligence agencies can purchase location data from data brokers, or subpoena it.
  44. This is a recognized privacy concern and has been documented in various reports.
  45.  
  46. Bottom Line
  47.  
  48. Overall Accuracy:
  49. The flow of data (phone → SSP → DSP → advertisers/data brokers → potential reidentification) is broadly correct in depicting how ad‐tech works behind the scenes.
  50. The specifics in the diagram (e.g., “Fake SSP,” example IP addresses) are stylized or simplified, but do represent real phenomena (questionable ad intermediaries, placeholders for IP addresses, and so on).
  51.  
  52. Key Caveats:
  53. Consent frameworks (e.g., Apple’s ATT prompt, GDPR in Europe, CCPA in California) can limit or modify data sharing.
  54. The diagram shows an “idealized” or “worst‐case” data flow—actual implementations can vary, and some data might be hashed/anonymized.
  55. There are legal and technical constraints intended to prevent direct linking of IDFAs to raw PII, though these can be circumvented or worked around with data matching.
  56.  
  57. In short, yes, the image correctly illustrates the general “life cycle” of ad‐tech data and how numerous intermediaries (SSPs, DSPs, data brokers) can end up handling your information—even if some details are simplified for clarity.
Advertisement
Add Comment
Please, Sign In to add comment