Executive Summary

Third-party cookies are small text files that have underpinned cross-site behavioral tracking for more than two decades. They are being systematically eliminated — not because the industry chose to move on, but because regulators, browser vendors, and courts decided the privacy tradeoffs were no longer acceptable. Understanding why they are disappearing, how they worked in the first place, and what technical mechanisms are replacing them is now a required competency for any organization with a digital presence.

This report is organized around three questions: How did third-party cookies enable the tracking ecosystem that now exists? What specific technical and regulatory forces are dismantling that ecosystem? And what replaces it, both technically and from a user privacy standpoint?

The answers reveal a system whose privacy implications were largely invisible to the users it profiled. A typical web session generates dozens of tracking calls to ad networks, data brokers, and analytics platforms, none of which the user deliberately engaged with. Browsers and operating systems are responding with enforcement mechanisms that make cross-site behavioral profiling technically impossible without user consent — a change that is both technically significant and, for most users, genuinely positive.

Key Takeaway

The end of third-party cookies is not primarily a business transition: it is a privacy correction. The technical alternatives that replace them are architecturally different in ways that matter — they move data processing closer to the user, reduce the surface area for data leakage, and make tracking harder to do invisibly. Organizations that understand these architectural differences will make better decisions about compliance, user trust, and long-term data strategy.

Scope & Objectives

This report addresses three objectives:

Part I

How Third-Party Cookies Work — and Why They're a Privacy Problem

To understand why third-party cookies are being eliminated, you first need to understand what they are, how they function at a protocol level, and what they made possible at scale. The privacy problem is architectural: it was not an accident or an abuse of the system, but a consequence of what the system was designed to do.

A cookie is a small key-value data store set by a server and persisted in the user's browser. When a server includes a Set-Cookie header in an HTTP response, the browser stores it and returns it in the Cookie header of every subsequent request to that domain. This mechanism was introduced in 1994 by Lou Montulli at Netscape as a way to implement session state in an otherwise stateless HTTP protocol.5

⚙  Technical Detail: Cookie Mechanics

A first-party cookie is set by the domain the user is currently visiting. If you visit example.com, the Set-Cookie response header from example.com creates a first-party cookie that is returned to example.com on every subsequent visit.

A third-party cookie is set by a different domain — one whose resources are embedded in the page you're visiting. If example.com loads an image from adnetwork.com, adnetwork.com can set a cookie on your browser through its Set-Cookie response header. That same cookie will be sent back to adnetwork.com every time you visit any other site that also loads adnetwork.com resources, enabling adnetwork.com to recognize you across unrelated websites.

The key attribute that enables cross-site tracking is persistence: unlike session cookies (which expire when the browser closes), tracking cookies are typically set with a far-future Expires or Max-Age attribute, allowing them to persist for months or years.

The SameSite cookie attribute, introduced in 2016 and strengthened in 2020, was the first major technical countermeasure. Cookies with SameSite=Strict are never sent on cross-site requests. Cookies with SameSite=Lax are sent only on top-level navigations. Cookies with SameSite=None (the legacy default for third-party cookies) are sent in all contexts, but Chrome began requiring these to also carry Secure=true in 2020.6

The Tracking Stack Explained

Third-party cookies became the foundation of a multi-layer data infrastructure. Understanding that infrastructure is essential to understanding what is actually being disrupted.

Layer Technology What Third-Party Cookies Enabled
Ad Networks & ExchangesGoogle Ad Manager, OpenX, XandrPersistent user identifier across publisher inventory for frequency capping, retargeting, and cross-publisher reach measurement
Demand-Side Platforms (DSPs)The Trade Desk, DV360, MediaMathBidding on impressions based on behavioral audience segments built from cross-site data
Data Management Platforms (DMPs)Salesforce DMP, Oracle BlueKaiAggregating cross-site behavioral data into audience segments sold to advertisers
Analytics PlatformsGoogle Analytics (Universal), Adobe AnalyticsCross-domain user journey tracking and attribution without authentication
Tag ManagersGoogle Tag Manager, TealiumDeploying third-party pixel/cookie combinations at scale without engineering involvement
Identity GraphsLiveRamp, Neustar, ExperianLinking browser cookie IDs to offline identity data (name, address, purchase history)

Table 1. The major layers of the third-party cookie tracking stack and their dependence on cross-site cookie identifiers. Source: Digital 520 Analysis.

The real-time bidding (RTB) auction that underlies most programmatic advertising depends on all of these layers functioning together. When a user loads a web page, the publisher's supply-side platform (SSP) broadcasts an auction opportunity that includes the user's cookie-based ID. Each demand-side platform queries its audience databases — populated with data from DMPs, identity graphs, and cross-site behavioral history — and submits a bid. The entire system depends on a persistent, shared identifier: the third-party cookie.7

The Scale of Invisible Tracking

Research from Princeton's Web Transparency and Accountability Project found that a majority of the top 1 million websites load third-party tracking code from Google, Meta, or both. On a typical news or retail site, a user's browser makes 50–300 third-party requests per page load, each of which may set or read cookies. The user has no visibility into this activity, and in most jurisdictions prior to GDPR, no mechanism to opt out.

Privacy Violations by Design

The privacy implications of third-party cookie infrastructure operate on several levels. The least visible, and arguably the most significant, is the construction of persistent behavioral profiles without meaningful user awareness or consent.

⚙  Technical Note: Cookie Syncing

Cookie syncing is the mechanism by which two independent ad networks share user identifiers. Network A embeds a pixel on a page and sets its own cookie ID. Network B's pixel is also present. Network A calls a redirect URL on Network B, appending its own user ID as a URL parameter. Network B reads its own cookie for the same browser, links the two IDs, and responds.

This process happens silently on millions of page loads and is invisible to users. It is the technical mechanism that enabled "audience extension" products — allowing an advertiser's first-party audience data to be matched against third-party behavioral data at scale.

The Regulatory Response

The regulatory response to cookie-based tracking built over a decade. It accelerated sharply after a series of high-profile data scandals demonstrated the real-world consequences of unconstrained behavioral data collection.

Regulation Jurisdiction Key Cookie/Tracking Provisions
ePrivacy Directive (2002, amended 2009)European UnionFirst EU law requiring consent for storing information on a user's device. Widely unenforced due to lack of implementing regulations.
GDPR (2018)European UnionRequires freely given, specific, informed, and unambiguous consent for processing personal data. Applies to cookie-based identifiers as personal data. Fines up to 4% of global revenue.
CCPA (2020)California, USAGrants consumers right to opt out of sale of personal information, including behavioral data derived from cookie tracking. Amended by CPRA (2023).
Digital Markets Act (DMA, 2023)European UnionRequires "gatekeepers" (Google, Meta, Apple) to obtain separate consent before combining personal data across services.
UK GDPR / Data Protection Act 2018United KingdomPost-Brexit equivalent of EU GDPR. ICO guidance specifies that cookie-based identifiers constitute personal data and require valid consent.

Table 2. Key privacy regulations and their specific implications for cookie-based tracking infrastructure. Source: Digital 520 Analysis.

The most significant enforcement actions came from the French CNIL, which fined Google €150 million and Meta €60 million in January 2022 for making it harder to refuse cookies than to accept them. The Irish DPC's enforcement decisions against Meta on cross-service data combination are ongoing.10,11

Part II

The Deprecation Timeline — What Changed and When

The end of third-party cookies did not happen all at once. It has been a multi-front process spanning nearly a decade, driven independently by browser vendors, mobile platform owners, and regulators. Understanding the timeline matters because different parts of the tracking infrastructure were dismantled at different times, and the disruption has been uneven across channels.

Safari's Intelligent Tracking Prevention (2017–2020)

Apple's WebKit team shipped Intelligent Tracking Prevention (ITP) in Safari in September 2017. ITP version 1.0 used machine learning to classify third-party domains as tracking domains based on their cross-site presence. Cookies from classified domains were partitioned to prevent cross-site access.12

⚙  How ITP Works Technically

ITP uses a classifier that evaluates whether a domain has been observed making resources available across multiple top-level domains in a way consistent with tracking behavior. Classified domains have their cookies placed in a separate partition — readable when the user directly navigates to that domain (first-party context), but not in third-party contexts.

ITP 2.0 (2018) extended this to block all third-party cookies from classified domains entirely. ITP 2.1 (2019) added a 7-day cap on all script-writeable first-party storage set via third-party scripts. ITP 2.3 (2019) closed the cross-site link decoration workaround by stripping tracking parameters from URLs.

The practical impact was significant: Safari held approximately 20–25% of global browser market share, meaning roughly a quarter of web users were no longer trackable via third-party cookies in Safari. The advertising industry responded with workarounds — link decoration, CNAME cloaking, fingerprinting. Apple progressively closed each workaround in subsequent ITP iterations.13

Apple's App Tracking Transparency (2021)

In April 2021, Apple shipped iOS 14.5 with the App Tracking Transparency (ATT) framework. ATT requires all iOS apps to explicitly request user permission before accessing the device's IDFA (Identifier for Advertisers). The permission prompt is unambiguous: "Allow [App] to track your activity across other companies' apps and websites?"

What ATT Revealed About Consent

Opt-in rates globally settled at approximately 25%, meaning three in four users denied permission when asked directly and clearly. Prior to ATT, mobile app tracking was opt-out by default: the IDFA was available to all apps unless the user navigated to Settings → Privacy → Tracking to disable it. Very few users did. When Apple changed the default to opt-in with a clear prompt, 75% of users said no. This gap between "default-on" and "genuinely-asked" consent rates is the most important data point in the privacy debate: users are not indifferent to tracking, they simply had no meaningful mechanism to express that preference.

Google's Privacy Sandbox: A Platform Redesign (2019–2026)

Google announced the Privacy Sandbox initiative in August 2019, proposing to replace third-party cookies in Chrome with a set of privacy-preserving APIs. Google originally proposed to deprecate third-party cookies in Chrome by late 2022. The deadline was extended five times, ultimately to 2024. Google then revised its approach: rather than deprecating third-party cookies entirely, Chrome now presents users with a one-time choice. This change was driven by pressure from the UK Competition and Markets Authority (CMA).14,15

API / Proposal Purpose Technical Approach Status (2026)
Topics APIInterest-based targeting without cross-site profilesBrowser observes browsing, assigns weekly interest topics from a public taxonomy (~350 topics)Shipping in Chrome. Adoption limited by integration gaps.
Protected Audience APIRetargeting without third-party cookie syncingAdvertiser adds user to interest group in browser. Auction runs on-device in an isolated JavaScript worklet.Shipping in Chrome. Functionally limited vs. server-side retargeting.
Attribution Reporting APIConversion measurement without cross-site identityBrowser matches ad impression to conversion and generates a privacy-preserving aggregate report with noise added.Shipping in Chrome. Replacing some third-party cookie conversion pixel use cases.
Storage Access APIAllowing embedded third parties to request first-party storage accessThird-party iframes can request access to their own first-party cookies via a user-prompted dialog.Shipping in Chrome, Safari, and Firefox.
CHIPS (Partitioned Cookies)Cookies scoped to the top-level siteThird-party cookies with the Partitioned attribute are scoped to the specific first-party context.Shipping in Chrome 114+.

Table 3. Google Privacy Sandbox API overview, technical approach, and deployment status as of early 2026. Source: Digital 520 Analysis based on Google Privacy Sandbox documentation.

Where Things Stand in 2026

Part III

Technical Alternatives to Third-Party Cookies

No single technology replaces third-party cookies. The ecosystem is replacing a general-purpose cross-site identifier with a set of purpose-specific, architecturally constrained tools. Each alternative's design reflects a different set of tradeoffs between tracking capability and user privacy.

Google Privacy Sandbox APIs

The Privacy Sandbox APIs are browser-native alternatives to specific third-party cookie use cases. Their key architectural innovation is moving processing from servers — where data can be freely collected and combined — to the browser, where it can be restricted and audited.

⚙  Technical Constraints of the Topics API

  • Topics are limited to a predefined public taxonomy: no custom audiences or fine-grained behavioral segments.
  • A maximum of 3 topics are returned per call, and a topic is only returned if the calling domain was also observed for that topic.
  • Topic epochs rotate weekly, limiting the accumulation of persistent profiles.
  • The API includes a noise mechanism: 5% of the time, a random topic is returned instead of an observed one.
  • Privacy limitation: While significantly more constrained than cookie-based profiling, Topics API data can still be used to infer sensitive categories depending on the topic taxonomy.

⚙  Protected Audience Architecture

  • Interest groups are stored in the browser, not on any server; they cannot be read by third parties or cross-matched with other data.
  • Bidding functions run in isolated JavaScript worklets with no network access during the auction, preventing real-time data exfiltration.
  • Fenced frames prevent the winning ad from communicating with the embedding page or learning which site rendered it.
  • The auction result is subject to k-anonymity requirements: an ad can only be shown if it would be shown to at least k users (k=50 in current implementation).
  • Limitation: On-device auctions are computationally constrained. Complex ML-based bidding strategies cannot run in browser worklets.

First-Party Data Infrastructure

The highest-value investment in the post-cookie environment is first-party data: data collected directly from users through owned channels, with explicit consent. Building genuine first-party data infrastructure typically requires:

Server-Side Tracking

Server-side tracking routes user event data through the advertiser's own server before forwarding it to advertising and analytics platforms, rather than firing client-side pixels directly from the user's browser.

⚙  Server-Side Tracking Architecture

User takes an action on the advertiser's site. The browser fires a standard event to the advertiser's own server-side endpoint (same domain — a first-party request). The advertiser's server enriches the event with data from its own systems (CRM data, order information, authenticated user ID) and forwards it to platform Conversion APIs (Meta CAPI, Google Ads Conversion API, TikTok Events API).

Privacy consideration: Server-side tracking does not inherently improve user privacy — it moves the tracking infrastructure to a place where users have less visibility. Its privacy properties depend entirely on the organization's data handling practices and whether appropriate consent has been obtained.

Compliance consideration: Under GDPR, server-side tracking still constitutes processing of personal data if it involves identifiable users. Consent requirements apply regardless of whether tracking is client-side or server-side.

Contextual Targeting

Contextual targeting serves ads based on the content of the page being viewed rather than the behavioral history of the user. It is the oldest form of digital advertising and the one most resistant to the privacy-related changes in the ecosystem. Modern contextual targeting has advanced substantially beyond simple keyword matching — NLP models can classify page content across hundreds of topic and sentiment dimensions.

From a privacy standpoint, contextual targeting has genuine advantages: it does not build or require user profiles, it generates no cross-site tracking data, it requires no consent under GDPR (since it does not process personal data), and it provides no mechanism for user re-identification.

Identity Solutions: UID2, ATS, and PPIDs

Several industry initiatives have developed authenticated identity frameworks that replace the cross-site cookie ID with an identifier derived from authenticated user data — typically a hashed email address or phone number.20

Solution Operator Mechanism Privacy Properties
UID2The Trade Desk (open-source)Hashed and encrypted email/phone at authentication. Hash shared across participating publishers and DSPs. Global opt-out endpoint available.Depends on user awareness that authentication creates a trackable ID. Coverage limited to authenticated environments.
LiveRamp ATSLiveRampPublisher authenticates user; LiveRamp generates an encrypted RampID for use in ad auctions. Advertiser CRM matched server-side.No direct cookie dependency. Requires explicit authentication. Data passes through LiveRamp infrastructure.
Google PPIDGooglePublisher generates an opaque identifier for authenticated users and passes it to Google Ad Manager for frequency capping and targeting within Google's ecosystem.ID is opaque to Google. Only usable within Google ecosystem. Not a cross-DSP solution.
ID5ID5 (independent)Probabilistic and deterministic matching across publisher network, built from browser signals and authentication data where available.Partially probabilistic. Privacy properties weaker than fully authenticated solutions. Subject to GDPR consent requirements.

Table 4. Identity solution comparison for post-cookie environments. Source: Digital 520 Analysis.

Data Clean Rooms

A data clean room is a secure computing environment that allows two parties to analyze overlapping datasets without either party directly accessing the other's raw data.21

⚙  Clean Room Technical Architecture

An advertiser uploads a hashed version of its first-party customer list (e.g., CRM emails) to the clean room environment. A publisher uploads a hashed version of its authenticated audience. The clean room executes queries over the overlapping dataset within an isolated compute environment. Differential privacy techniques add statistical noise to query results to prevent individual-level inference from aggregate outputs.

Neither party receives the other's raw data. The result is an aggregated match report without either party being able to reconstruct the other's identity list.

Major implementations: Google Ads Data Hub, Meta Advanced Analytics, Amazon AWS Clean Rooms, Snowflake Secure Data Sharing, InfoSum.

Privacy properties: Clean rooms are significantly more privacy-protective than cookie syncing. However, differential privacy guarantees vary by implementation, and adversarial reconstruction attacks on insufficiently noised outputs remain a research concern.

Part IV

Privacy Implications

The transition away from third-party cookies produces genuine privacy improvements. But it also introduces new risks and leaves some fundamental privacy problems unresolved.

What Users Actually Gain

What Still Threatens Privacy

Digital 520 Perspective

The Privacy Sandbox has been criticized by privacy advocates as a Google-controlled transition designed primarily to protect Google's advertising business under the appearance of a privacy improvement. The EFF and others have noted that Google's advertising data collection within its authenticated user base is entirely unaffected by Privacy Sandbox. The architectural shift does meaningfully constrain independent ad networks while Google's own data position strengthens. Evaluating the privacy implications requires acknowledging this structural dynamic, not just the technical properties of the APIs.

Consent Architecture and Compliance

For organizations operating in GDPR, UK GDPR, or CCPA jurisdictions, cookie deprecation does not reduce the compliance burden: it changes its shape.

Tracking Method Requires GDPR Consent? Notes
Third-party cookies (behavioral)Yes — legitimate interest insufficientCNIL, ICO, and most DPAs have ruled that behavioral advertising cannot rely on legitimate interest lawful basis.
First-party cookies (analytics, session)Depends — session cookies exempt; analytics requires consentStrictly necessary cookies are exempt. Analytics that build user profiles require consent or anonymization.
Privacy Sandbox APIs (Topics, Protected Audience)Position unclear — evolving regulatory guidanceSeveral European DPAs are evaluating whether the APIs constitute processing of personal data under GDPR.
Server-side tracking with hashed emailYes, if linked to identifiable individualHashed email is still personal data under GDPR if the hash can be reversed or the individual is otherwise identifiable.
Contextual advertising (no user data)No consent requiredProcessing page content to serve relevant ads does not constitute personal data processing if no individual user data is collected.
Authenticated identity (UID2, ATS)Yes — consent required at point of authenticationAuthentication event must include informed disclosure that the identifier will be used for cross-site advertising.

Table 5. GDPR consent requirements by tracking method. Note: Regulatory positions continue to evolve; consult legal counsel for jurisdiction-specific guidance. Source: Digital 520 Analysis.

The Data Minimization Imperative

GDPR's data minimization principle requires that personal data collected must be adequate, relevant, and limited to what is necessary in relation to the purpose. Third-party cookie infrastructure was architecturally opposed to this principle: it was designed to collect as much data as possible, on the theory that more data always has value.

Organizations that approach this as a compliance exercise will likely face continued regulatory exposure as enforcement evolves. Organizations that approach it as a genuine strategic question about what data is worth collecting and maintaining will build more durable first-party data assets with less legal and reputational risk.

Part V

Practical Guidance by Role

For Engineering and Technical Teams

⚙  Consent Mode v2 Implementation Note

Google Consent Mode v2 (required as of March 2024 for EEA traffic) sends behavioral modeling signals to Google even when consent is denied, allowing Google to model conversion behavior using aggregate patterns. From a compliance standpoint, the CMA and several European DPAs have expressed concerns about whether modeling based on non-consented data is compatible with GDPR. If your organization has operations in the EU, consult legal counsel on your Consent Mode v2 implementation before concluding it resolves your consent obligations.

For Marketing and Advertising Teams

For SMBs and Lean Organizations

Priority Action Why It Matters
1 — ImmediateImplement a CMP that blocks all non-essential tracking tags until consent is givenRequired for GDPR/CCPA compliance. Protects against regulatory fines. Many platforms (Cookiebot, CookieYes) offer SMB-priced plans.
2 — Near-termMigrate from Universal Analytics to GA4 with consent mode and IP anonymization enabledUniversal Analytics has been sunset. GA4 with consent mode is the current standard for privacy-compliant analytics.
3 — Near-termImplement Meta CAPI and Google Conversion API server-side events for primary ad platformsRecovers conversion data lost to ITP, iOS ATT, and ad blockers. More stable than client-side pixel tracking.
4 — Medium-termBuild an email list with explicit consent and a clear value propositionAuthenticated first-party audience is the most resilient long-term asset. Not subject to browser or platform changes.
5 — Medium-termAudit and reduce third-party script load on your siteEach third-party script is a potential source of tracking, security risk, and page performance degradation.

Table 6. Priority action framework for SMBs navigating the post-cookie transition. Source: Digital 520 Analysis.

For Publishers and Media Companies

Conclusion

Third-party cookies were an accident of history: a general-purpose session mechanism repurposed at scale into a cross-site surveillance infrastructure that most users never consented to and many would reject if they understood it. The fact that 75% of iOS users declined ad tracking when asked directly, with a clear prompt, tells you everything you need to know about the gap between technical capability and genuine consent.

The deprecation is real, the timeline is messy, and the replacements are imperfect. Privacy Sandbox APIs provide meaningfully better privacy properties than third-party cookies in some dimensions while introducing new concerns in others. Server-side tracking removes user-visible tracking without necessarily reducing the underlying data collection. Authenticated identity solutions preserve cross-site targeting but anchor it to consent events that vary widely in quality.

The organizations that navigate this transition well will be the ones that treat it as a prompt to build something more durable: data relationships that users understand and choose to participate in, measurement infrastructure that does not depend on tracking invisible to users, and advertising strategies grounded in what users actually tell you rather than what can be inferred from watching where they go.

Key Implications for Your Organization

  • Audit your current cookie usage before assuming your tracking infrastructure still works; ITP and Firefox blocking have been degrading data quality for years.
  • Server-side Conversion API implementation is the highest near-term ROI technical investment for most advertising-dependent organizations.
  • Privacy Sandbox APIs are available but adoption is early. Engineering teams should prototype now, not wait for industry consensus.
  • First-party authenticated identity is the only durable long-term alternative. Everything else is a bridge.
  • Contextual advertising offers a structurally clean, consent-free approach that outperforms behavioral targeting in high-intent content categories.
  • Consent must be real, not a design exercise in coercing acceptance. Regulatory enforcement is closing the gap between dark-pattern consent and genuine choice.

Appendix A: Methodology

Digital 520 applies a rigorous, multi-source research methodology to every Insight Report. For this report, the following methods were employed:

Limitations: Browser behavior and Privacy Sandbox API specifications are subject to rapid change. Policy positions from regulatory bodies continue to evolve, particularly regarding Privacy Sandbox APIs and Consent Mode v2. All technical specifications should be verified against current documentation before implementation.

Appendix B: Glossary

Term Definition
ATT (App Tracking Transparency)Apple's iOS 14.5+ framework that requires apps to explicitly request user permission before accessing the IDFA for cross-app tracking. Opt-in rates settled at approximately 25% globally.
CHIPS (Cookies Having Independent Partitioned State)A browser mechanism that allows third-party cookies to be partitioned by top-level site, enabling functional embeds without enabling cross-site tracking.
Clean RoomA secure computing environment in which two parties can perform joint data analysis without exposing raw individual-level records to each other.
CMP (Consent Management Platform)Software that presents cookie and tracking consent choices to users, records consent signals, and enforces those signals by blocking tracking tags that have not received appropriate consent.
Contextual AdvertisingAdvertising targeted based on the content of the page being viewed rather than the behavioral profile of the user. Requires no personal data processing and no consent under GDPR.
Cookie SyncingA mechanism by which two ad networks share and link their respective user cookie IDs by passing identifiers through pixel redirect chains, enabling cross-network audience matching.
Differential PrivacyA mathematical privacy framework that adds calibrated statistical noise to query outputs to prevent the reconstruction of individual-level data from aggregate results.
FingerprintingA technique for identifying a browser or device based on the combination of technical characteristics (user agent, screen resolution, fonts, canvas rendering) without using cookies.
GDPRGeneral Data Protection Regulation (EU) 2016/679. The primary EU privacy law, in force since May 2018. Requires a valid lawful basis for processing personal data, including cookie-based identifiers.
IDFA (Identifier for Advertisers)Apple's device-level advertising identifier, analogous to a third-party cookie for the mobile app environment. Access requires explicit opt-in under ATT on iOS 14.5+.
ITP (Intelligent Tracking Prevention)Apple's browser-level tracking protection technology in Safari, which uses machine learning to classify tracking domains and restrict or block third-party cookie access.
Privacy SandboxGoogle's initiative to develop browser-native APIs that provide privacy-preserving alternatives to third-party cookie-based advertising functions in Chrome.
Protected Audience APIA Privacy Sandbox API (formerly FLEDGE) that enables on-device retargeting auctions without cross-site cookie syncing.
RTB (Real-Time Bidding)The automated auction mechanism in which digital ad impressions are bought and sold in milliseconds, with DSPs bidding based on user behavioral data linked via shared cookie identifiers.
SameSite AttributeAn HTTP cookie attribute that controls whether cookies are sent on cross-site requests. SameSite=None allows cross-site use; SameSite=Lax and SameSite=Strict restrict cross-site access.
Topics APIA Privacy Sandbox API that provides browsers with interest categories based on local browsing history for use in interest-based advertising, without exposing individual site visit history to ad networks.
UID2 (Unified ID 2.0)The Trade Desk's open-source authenticated identity framework that uses hashed email addresses to create a persistent cross-site identifier anchored to user authentication events.

Endnotes

  1. Englehardt, S. & Narayanan, A. "Online Tracking: A 1-million-site Measurement and Analysis." Princeton Web Transparency and Accountability Project. ACM CCS 2016. webtransparency.cs.princeton.edu
  2. Flurry Analytics / Yahoo. "iOS 14.5 Opt-In Rate: Daily Updates Since Launch." April 2021 onwards. flurry.com
  3. Google. "Privacy Sandbox Timeline." developer.chrome.com/docs/privacy-sandbox. Accessed March 2026. privacysandbox.com/timeline/
  4. International Association of Privacy Professionals (IAPP). "Global Privacy Law and DPA Directory." 2025. iapp.org
  5. Kristol, D. & Montulli, L. "RFC 2109: HTTP State Management Mechanism." IETF. February 1997. rfc-editor.org/rfc/rfc2109
  6. West, M. & Goodwin, M. "SameSite Cookies Explained." web.dev, Google. web.dev/articles/samesite-cookies-explained
  7. Interactive Advertising Bureau (IAB). "OpenRTB API Specification." iab.com
  8. Englehardt, S. & Narayanan, A. (cookie syncing section). ACM CCS 2016.
  9. Forbrukerradet (Norwegian Consumer Council). "Deceived by Design." June 2018. forbrukerradet.no
  10. Commission Nationale de l'informatique et des libertés (CNIL). "Cookie consent: CNIL fines GOOGLE €150 million and FACEBOOK €60 million for non-compliance." January 2022. cnil.fr
  11. International Association of Privacy Professionals (IAPP). "US State Privacy Legislation Tracker." 2025. iapp.org
  12. WebKit Blog. "Intelligent Tracking Prevention." September 2017. webkit.org/blog/7675/intelligent-tracking-prevention/
  13. StatCounter GlobalStats. "Browser Market Share Worldwide." 2025. gs.statcounter.com
  14. Google. "Building a more private web." Chromium Blog. August 2019. blog.chromium.org
  15. UK Competition and Markets Authority. "Investigation into Google's Privacy Sandbox browser changes." Final Report. 2022. gov.uk/cma-cases
  16. The Trade Desk. "Unified ID 2.0." thetradedesk.com
  17. International Association of Privacy Professionals (IAPP). "Data Clean Rooms: Privacy and Advertising Technology." 2023. iapp.org
  18. Electronic Frontier Foundation. "Browser Fingerprinting: An Introduction and the Challenges Ahead." eff.org