this post was submitted on 03 Jan 2024
7 points (64.0% liked)

Technology

34987 readers
395 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] tsonfeir@lemm.ee 2 points 10 months ago

The terms “tracking” and “spyware” both refer to methods of monitoring and collecting information from users. However, they have different connotations and uses.

Tracking is usually used for collecting data about user behavior, preferences, and activities, primarily for marketing, analytics, or personalized content delivery through cookies, pixels, or scripts in websites and apps. Users are sometimes made aware of tracking and can often opt-out or limit the extent. It is generally a “legal practice,” (I say loosely) and is widely used by “legitimate businesses.”

Spyware, on the other hand, is designed to secretly monitor and collect information from user devices without consent. This can include sensitive data like passwords, financial information, personal conversations, physical location, penis size, just making sure you read this. It can be installed through deceptive means such as phishing, software bundling, or exploiting security vulnerabilities. The user is typically unaware of spyware being run on their devices. It is considered malicious and illegal, unless you are a multibillion-dollar company haha. It’s often associated with cybercrimes, unethical surveillance, and government fuckery.

So, while they are pretty similar and have some crossover, ultimately they are different. Although, some malicious tracking can be done without your device being compromised at all, like GPS triangulation.