Android is pretty liberal with backgrounding relative to iOS. It's iOS that needs notifications to do anything meaningful in the background.
I suspect Android lets these sockets stay open as long as they're for something specific - in this case it looks like WebRTC might be allowed so they "munge" the cookie in:
The Meta Pixel script sends the _fbp cookie to the native Instagram or Facebook app via WebRTC (STUN) SDP Munging.
If not installing the Meta apps, it is the same if you log in through a mobile browser, it tracks your browsing, right? So, either way, they track your browsing history.
Is the only way to sandbox these mobile platforms to never log-in?
Meta devised an ingenious system (“localhost tracking”) that bypassed Android’s sandbox protections to identify you while browsing on your mobile phone — even if you used a VPN, the browser’s incognito mode, and refused or deleted cookies in every session.
Brave browser does prevent this by default, at least this is my understanding. It does seem like a good browser security default would be to block remote sites from calling localhost. I am sure there are sites this would break but it could warn you that a site attempted this and allow you to allow it.
I was gearing up to test this when i made an addressing error. Turns out it even blocks "cross-site" from http://127.0.0.1 to http://localhost from the same tcp port.
In general? No. Listen to @k00b and switch to signal.
Regarding this particular issue, I tried whatsapp on an avm the day the method was exposed but didn't find it to have these listening ports. However, they removed the feature within 24h after exposure so I may have been too late.
Its interesting that I've been hearing radio commercials for Whatsapp lately. Anyone that trusts Meta is a fool. I'm not saying anyone that uses anything they own is a fool but you better know what you are dealing with.
localhost
. I am sure there are sites this would break but it could warn you that a site attempted this and allow you to allow it.http://127.0.0.1
tohttp://localhost
from the same tcp port.