Investigate if Orfox is shipping with active tracker
I just came across an interesting observation: According to the tool Exodus, Orfox (Tor browser for Android) contains 4 trackers:
- Adjust
- Google Ads
- Google DoubleClick
- Google Firebase Analytics
https://reports.exodus-privacy.eu.org/reports/11967/
https://mastodon.at/@infosechandbook/100367643736030856
Confirm where these are and why they aren't excluded at compile-time. Is it worth adding additional built-time logic for excluding this code? Is there more we should do? etc.