In the best case, even if these pages store little information about users, customers who pay for products via Bitcoin and return to the page, pay via credit card or other methods, can also Assigned to small things like cookies.
The team from Princeton University analyzed 130 e-commerce sites from 21 countries that allow users to pay with BItcoin. They find out how these pages handle Bitcoin transactions and what information leaked during processing. And below are the results:
53/130 leaked payment information to third parties, usually from the shopping cart page.
49/130 single leakage PII.
32/130 email address leak.
27/130 and 25/130 leaking first and last names.
15/130 leaked user names.
13/130 leaked delivery address information.
10/130 leaks leaking user phone numbers.
25/130 leaks sensitive information leaks to third parties, even when monitoring protection is turned on.
12/130 BItcoin address leaks.
11/130 leaked Bitcoin prices for products.
28/130 activity leaks added to the cart.
107/130 gives the third party script access to information related to the transaction.
125/130 gives the 3rd party script access to some models of PII.
All of this data is very important in resolving anonymous user identities, especially if it is gradually collected on the online advertiser server for months or years.