Web users enter their email addresses into virtual-enterprises according to an extensive list of circumstances, e-mail scraper
including access to the network or a service request or request for sending news. When checking such a function, the e-mail addresses entered into the forms can sometimes be laid out by third-party scripts, including if you change your mind and leave the site without submitting the form. Mail addresses or identifiers obtained on the game database - as they say, are used by information brokers and advertisers for cross-site, cross-platform and endless identification of potentially unsuspecting persons. In order to clarify whether online trackers abuse the connection to online forms, on our resource there is a measurement of the collection of e-mails and passwords, which happens before sending the form to all one hundred percent of the best websites. We evaluate the impact of the visitor's location, browser configuration – and communication with consent dialog boxes by comparing different positions on both sides (eu/usa), two browser configurations (desktop/smartphone and five consent modes. Our scanner finds and fills in the e-mail and password fields, monitors free email harvester
network traffic to the leak object and intercepts script access to the filled input fields. Our analysis claims that the email addresses of users are sent to the tracking, marketing and analytical domains before sending the configuration and without submitting consent to 1844 web resources for crawling in the eu and 2950 web resources for crawling in america. At a time when most e-mail addresses choose well-known tracking domains for recreation, we similarly identify 41 surveillance domains, which are not listed in the piquant of modern blocking lists. In addition, we found random collection of passwords on 52 websites by third-party session replay scripts.