Second, input the seed list of URLs (one per line) and run the tool to detect predefined fingerprints of tracking technologies in the page’s source code. Don’t forget to name your result properly (e.g., including your name, a date, and a keyword) for retrieval at a later time. A process log is shown while the tool is running.
Third, the tool analyses the source code of each page included to detect predefined fingerprints of known web tracking technologies using an extensive library of more than 2,000 unique fingerprints. Please note: this tool does not click on any buttons, accepts no cookies, and cannot move beyond logins, cookies, or paywalls. It simulates a real browser instead using a scripting language called PhantomJS, which might cause certain content to not load properly (but in most cases, outputs should be similar).
Finally, after successful completion results can be downloaded via the ‘Output’ tab. It outputs the following standard file formats: tabular (.HTML, .CSV) and networks (.GEXF). Eight native tracking technology categories defined by Ghostery are included in these outputs (https://ghostery.zendesk.com/hc/en-us/articles/115000740394-What-are-the-new-tracker-categories-). Please note: This tool stores previous jobs under the ‘Past Jobs’ tab, with the job name provided by the researcher.