Menu
EN

Protecting privacy in the cookieless era — what is ID bridging and how to protect yourself

Since the beginning of the 2020s, we’ve been promised a cookieless future — one where third-party cookies, the cornerstone of surveillance tracking and the linchpin of targeted advertising, no longer exist. While Google’s plan to phase out third-party cookies may have been delayed, there is little doubt, at least in our minds, that sooner or later, we’ll all say au revoir to them.

Why? Privacy regulators around the world, particularly in the EU, are putting increasing pressure on publishers to obtain “freely given” consent from users. Multiple companies, including, more recently, the “unfiltered” social media app BeReal, have faced privacy complaints over how they nudge users into agreeing to tracking with their consent pop-ups. In other words, the definition of consent is becoming increasingly narrow, and both users and regulators are growing frustrated with intrusive pop-ups. The “pay or consent” model, where users are given a simulacre of a choice between paying for content or consenting to nearly all of their data being harvested, is also getting pushaback from the regulators. For all its worth, the third-party cookie may not be on its death bed yet, but it’s sailing into the sunset.

In the long run, it seems more than likely that publishers will have to adopt new methods of tracking — ones that both satisfy regulators (ensuring consent is freely given) and feel fair to users, who are tired of navigating the quagmire of dark patterns.

Using hashed email address to track — the reality of tomorrow

One of such methods that has been mentioned as one of the most likely alternatives to the cookie is identification through Persistent User ID. True to its name, this method presumes that there is one or a combination of persistent or long-lasting characteristics specific to one user. While cookies have a limited lifespan, are specific to one browser, and can be cleared anytime (research shows that 58% users delete their cookies regularly, and 40% do so every month), persistent identifiers like hashed email addresses do not have any of these drawbacks. Also, unlike cookies, you can’t track someone’s email address without them first giving it to you. From a regulatory standpoint, this is safer for advertisers, as the user’s consent is clearly given, reducing the risk of privacy-related issues. So, what is hashing exactly?

Email hashing involves transforming a user’s email address into a fixed-length string of characters (a hash) that in theory should be borderline impossible to reverse-engineer. Unlike traditional email addresses, the hashed version of an email cannot be read or understood by anyone who does not have access to the specific algorithm and secret keys used for hashing. This makes it more secure and private than if the email addresses were passed around in plain text.

However, hashing, while providing a layer of obfuscation, does not necessarily make user data fully anonymous or protect privacy as securely as it might seem. This is because hashing still creates a unique signature that can be used to identify individuals across platforms. As the Federal Trade Commission (FTC) pointed out in a 2024 statement, “hashes aren’t ‘anonymous’ and can still be used to identify users,” which means they should not be considered a foolproof method for preserving privacy.

The FTC has repeatedly pointed out that while hashing makes data harder to read, it doesn’t remove the possibility of linking it back to a specific person. Even when email addresses are hashed to hide the original data, the resulting hash is still a unique, persistent identifier. While the hash might look like a random string to most people, it can often be matched with other datasets or reversed, especially if the same hashing method and data are used consistently. Past data breaches make this easier for bad actors. With so many stolen datasets from big breaches floating around online, hackers can use these records to figure out or match hashed emails with the real people behind them, exposing sensitive information and identities.

ID Bridging

The use of hashed email addresses for user tracking can also play a significant role in what’s known as “ID bridging.” ID bridging refers to the practice of linking a user’s activity across multiple platforms or devices by using a persistent identifier like a hashed email address.

Its rise in popularity is directly related to the looming deprecation of cookies. While the third-party cookies are currently in limbo, their eventual demise still seems imminent, largely due to regulatory pressure.

There are two primary methods of ID bridging: deterministic and probabilistic matching. Probabilistic matching involves using complex algorithms to analyze signals like IP addresses, device types, and browsing behavior. While this method can link profiles based on patterns, it is less precise as it relies on statistical inference rather than direct identifiers. On the other hand, deterministic matching, which is often based on hashed emails, offers a more accurate method of identification. For the purpose of this article, we are focusing on email-based identification, but other data — such as mobile numbers and key demographic details — can also be used for deterministic matching. Deterministic matching techniques are especially effective for targeted advertising since they are highly accurate (usually above 80% accurate). But precisely because deterministic matching shows such high effectiveness in merging distinct data of one user across multiple online services, it raises privacy concerns, especially since the user is likely unaware of the full extent of this tracking. How ethical or permissible this method is from the privacy standpoint is a question for a separate debate.

Bottom line, this method ensures that the user’s activity can be accurately linked across different platforms, provided the user logs in on multiple browsers or devices.

Protecting yourself against privacy risks associated with ID bridging

There are several ways to help protect your personal information from being linked across platforms using this new tracking method, which is probably the future of tracking if not the present.

  • The most straightforward and at the same time time-consuming way would be to create separate email accounts for different purposes, such as using one for shopping, another for social media, and yet another for newsletters. For instance, you might have three distinct inboxes (or more) — one for personal use, one for work, and one for online sign-ups.

  • There are arguably simpler, ready-made solutions, however. One of them is using an email alias service. The email alias service allows you to create unique email addresses without needing to create entirely new accounts. Put simply, an alias is a forwarding email address that acts as a proxy for your real inbox. For instance, you could use a separate alias for each online store, newsletter, or app. If you no longer wish to receive a specific newsletter or start getting spam from an alias, you can easily disable or delete the alias. Doing so will not affect any emails you’ve already received through it. Addy.io, SimpleLogin are some of the most popular alias service providers on the market.

  • Alternatively, you can use a temporary mail account. This is ideal for one-time interactions, like signing for promotions, downloading free trials, or taking part in online giveaways. A temp mail service generates a temporary inbox along with a unique email address, which lasts only as long as you need it. Unlike an alias, which forwards emails to your real inbox, a temp mail is entirely separate and does not connect to your personal email. Once the temp mail has served its purpose, you can delete the address, which will lead to the deletion of the temp mail inbox with all the mail sent to it. That means that unless you’ve saved your mail elsewhere, you will lose all your correspondence. However, it also ensures a higher level of anonymity and privacy for brief online interactions. Services like Guerrilla Mail, 10 Minute Mail are some of the examples of such services.

AdGuard now offers such a solution within our new AdGuard Mail email management tool. Unlike most mail services on the market, AdGuard Mail is a one-in-two solution, combining the functionality of email aliases and temporary email addresses for maximum convenience and flexibility.

Liked this post?
18,499 18499 user reviews
Excellent!

AdGuard for Windows

AdGuard for Windows is more than an ad blocker. It is a multipurpose tool that blocks ads, controls access to dangerous sites, speeds up page loading, and protects children from inappropriate content.
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard for Mac

AdGuard for Mac is a unique ad blocker designed with macOS in mind. In addition to protecting you from annoying ads in browsers and apps, it shields you from tracking, phishing, and fraud.
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard for Android

AdGuard for Android is a perfect solution for Android devices. Unlike most other ad blockers, AdGuard doesn't require root access and provides a wide range of app management options.
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard for iOS

The best iOS ad blocker for iPhone and iPad. AdGuard eliminates all kinds of ads in Safari, protects your privacy, and speeds up page loading. AdGuard for iOS ad-blocking technology ensures the highest quality filtering and allows you to use multiple filters at the same time
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard VPN

74 locations worldwide

Access to any content

Strong encryption

No-logging policy

Fastest connection

24/7 support

Try for free
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard Content Blocker

AdGuard Content Blocker will eliminate all kinds of ads in mobile browsers that support content blocker technology — namely, Samsung Internet and Yandex.Browser. While being more limited than AdGuard for Android, it is free, easy to install and still provides high ad blocking quality.
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard Browser Extension

AdGuard is the fastest and most lightweight ad blocking extension that effectively blocks all types of ads on all web pages! Choose AdGuard for the browser you use and get ad-free, fast and safe browsing.
18,499 18499 user reviews
Excellent!

AdGuard Assistant

A companion browser extension for AdGuard desktop apps. It offers an in-browser access to such features as custom element blocking, allowlisting a website or sending a report.
18,499 18499 user reviews
Excellent!

AdGuard DNS

AdGuard DNS is a foolproof way to block Internet ads that does not require installing any applications. It is easy to use, absolutely free, easily set up on any device, and provides you with minimal necessary functions to block ads, counters, malicious websites, and adult content.
18,499 18499 user reviews
Excellent!

AdGuard Home

AdGuard Home is a network-wide software for blocking ads & tracking. After you set it up, it’ll cover ALL your home devices, and you don’t need any client-side software for that. With the rise of Internet-Of-Things and connected devices, it becomes more and more important to be able to control your whole network.
18,499 18499 user reviews
Excellent!

AdGuard Pro for iOS

AdGuard Pro has much to offer on top of the excellent iOS ad blocking in Safari already known to the users of the regular version. By providing access to custom DNS settings, the app allows you to block ads, protect your kids from adult content online, and safeguard your personal data from theft.
By downloading the program you accept the terms of the License agreement
Read more
18,499 18499 user reviews
Excellent!

AdGuard for Safari

Ad blocking extensions for Safari are having hard time since Apple started to force everyone to use the new SDK. AdGuard extension is supposed to bring back the high quality ad blocking back to Safari.
18,499 18499 user reviews
Excellent!

AdGuard for Android TV

AdGuard for Android TV is the only app that blocks ads, guards your privacy, and acts as a firewall for your Smart TV. Get warnings about web threats, use secure DNS, and benefit from encrypted traffic. Relax and dive into your favorite shows with top-notch security and zero ads!
18,499 18499 user reviews
Excellent!

AdGuard Temp Mail

A free temporary email address generator that keeps you anonymous and protects your privacy. No spam in your main inbox!
18,499 18499 user reviews
Excellent!

AdGuard Mail β

Protect your identity, avoid spam, and keep your inbox secure with our aliases and temporary email addresses. Enjoy our free email forwarding service and apps for all operating systems
Downloading AdGuard To install AdGuard, click the file indicated by the arrow Select "Open" and click "OK", then wait for the file to be downloaded. In the opened window, drag the AdGuard icon to the "Applications" folder. Thank you for choosing AdGuard! Select "Open" and click "OK", then wait for the file to be downloaded. In the opened window, click "Install". Thank you for choosing AdGuard!
Install AdGuard on your mobile device