Jokes on you, the IC intelligence community. I block all ad and analytics traffic on a network level. All my network traffics are over a secure VPN to HQ, which then routes exit traffic through a commercial VPN or Tor based on traffic and packet analysis at the gateway.
So, unless the server hosting the web content is also natively hosting first-party ads and analytics without using an advertising network API and without running an internal dedicated ad server or API proxy, nothing will reach me. Therefore, for ones that do reach me, I don’t mind because they are safe, and I believe this is the only legitimate way of advertising and analytics on the web.
There is a log of the ads that are blocked on the network. It is randomly delayed and passed to VMs with Tor-enabled Firefox, all ads are randomly clicked there silently, opened and interacted with silently for a random number of times between 0 and 5 million, and for a random duration between 0.002 to 20 seconds. Each interaction is a stateless RAM-only instance with a new Tor identity, and a randomized set of Firefox profiles.
If you click on every Malicious Ad, that’s going to break the banks of advertisers. A real click can cost $25 just for visiting the advertiser. It is also very boring for analytics octopuses. Having a preference for everything is the same as having no preferences at all.
Trying to act human-like will only generate bot-like patterns that you would never have expected or realized. This is just math. Therefore, you need to act “obviously like a bot” and “no way that’s a bot” randomly, like a bipolar.