About “Track Me If You Can” Simulator

This page explains what the Track Me If You Can simulator does, how it works, and how you can use it in workshops, classrooms, or personal learning. The tool runs entirely in your browser and no data leaves your device.

🧭 Open simulator

What this simulator shows

Track Me If You Can is a visual teaching tool that simulates how advertising networks, analytics platforms, and social media pixels try to follow you whenever you load a modern web page. Each colored dot represents a simulated tracker. The activity log on the right shows which ones are allowed and which ones are blocked.

The goal is to give a clear “over the shoulder” view of tracking behaviour so regular users, families, and small teams can see why privacy tools matter, without exposing any real data or contacting live tracking services.

How the simulator works

The simulator is a self contained HTML file with JavaScript that creates virtual trackers when you click “Visit a new site”. These trackers are fictional entries that never leave your browser. There are no real network requests and nothing is loaded from advertising or analytics platforms.

  • When you click the button, the page generates a random set of simulated trackers.
  • Each tracker appears as a dot on the canvas to represent code running inside a page.
  • The log records the company name, the type of tracker, and whether it was loaded or blocked.
  • The counters at the top show totals for this single run of the simulation.
Important technical note

The tracker names and categories are for illustration only. They do not mean that any specific product or company is active on your device. Everything you see is generated locally to help you understand concepts, not to report on real browsing behaviour.

Using the privacy controls

Two toggles let you explore how basic privacy tools change what happens in the simulation.

  • Block third party scripts simulates the effect of content blockers and strict browser settings. When this is on, a portion of simulated trackers are marked as blocked. You can compare runs with the toggle on and off to show the difference.
  • Use VPN changes the log messages to indicate that your location is hidden. This represents how a virtual private network masks your IP address in a real world situation.

Together, these controls give you an approachable way to explain why privacy extensions, safer browser settings, and network tools can reduce tracking, while still reminding users that no single step removes all risk.

Ideas for workshops and training

You can use this simulator in several ways during talks, webinars, and one to one coaching sessions.

  • Run a simulation with everything turned off, then repeat with blocking and VPN switched on.
  • Ask participants to count how many trackers load in each scenario and discuss the change.
  • Use the log entries to introduce terms like analytics, retargeting, and social pixels.
  • Link the simulator to your broader guidance on safer browsers, extensions, and threat models.

Privacy, safety, and limitations

This simulator is designed for privacy friendly education. It never loads external scripts, sends network requests, or stores results on a remote server. It runs completely in your browser and you can even use it offline once the file is saved.

At the same time, it is important to remember that this is a simplified model. Real websites, devices, and networks behave in more complex ways. Treat this tool as a starting point for conversations, not as a full diagnostic or compliance scanner.