Investigate if Orfox is shipping with active tracker

I just came across an interesting observation: According to the tool Exodus, Orfox (Tor browser for Android) contains 4 trackers:

- Adjust
- Google Ads
- Google DoubleClick
- Google Firebase Analytics

https://reports.exodus-privacy.eu.org/reports/11967/

https://mastodon.at/@infosechandbook/100367643736030856

Confirm where these are and why they aren't excluded at compile-time. Is it worth adding additional built-time logic for excluding this code? Is there more we should do? etc.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information