User identity
When advertising their products, advertisers often wish to target and track specific audiences, for whom the Ads are most likely to be effective. To tailor those Ads to specific users, as well as track their later performance, "User Identity" solutions are required.
In the context of Overwolf, and due to ongoing shifts in the industry, "Hashed Emails" are used, letting advertisers identify and target users based on interests, without ever being exposed to the users' actual identities.
Technical Specification
The process of working with Hashed Emails requires several steps:
- Obtaining a user's Email Address consentually
One method to collect the user's email is through a sign-in process using the Overwolf OIDC authentication protocol.
- Normalizing the user's Email Address
- Hashing the user's Normalized Email Address
- Exposing the hashed Email Address to select User Identity Providers, for use in Ads targeting.
There are two main ways to go about this:
- Full Email
- Email Hash
It is possible to pass the user's full Email Address to the Overwolf API. The API will then apply all of the relevant processing to the Email (2-4), and only save the finalized email hashes, for use in Ad targeting.
- Overwolf Platform
- Overwolf Electron
overwolf.extensions.current.generateUserEmailHashes("test.email@overwolf.com", console.log);
app.overwolf.generateUserEmailHashes("test.email@overwolf.com");
In cases where:
- The App might not have access to the user's full Email Address, but it does have access to the hash.
- Where it is desirable to minimize the spread of the "raw" Email Address as much as possible.
It is still possible to use this API, by passing the Email hashes directly (while performing steps 1-3 beforehand).
- Overwolf Platform
- Overwolf Electron
// Using the example email `test.email@overwolf.com`
overwolf.extensions.current.setUserEmailHashes({
SHA1: '2c44f8a418bbfa88e80e3ce17d56cb30944f7675',
SHA256: 'ac43b559f15c2eb262ea8d5d4921f639aaf1cde84bc280bad2e1879d0ded68c2',
MD5: '170d78feecf2b8e7b804ba6b45af7ac2'
}, console.log);
// Using the example email `test.email@overwolf.com`
app.overwolf.setUserEmailHashes({
SHA1: '2c44f8a418bbfa88e80e3ce17d56cb30944f7675',
SHA256: 'ac43b559f15c2eb262ea8d5d4921f639aaf1cde84bc280bad2e1879d0ded68c2',
MD5: '170d78feecf2b8e7b804ba6b45af7ac2'
});
Clearing Email Hashes
It is also possible to clear out the Email hashes, in cases where it is needed. To do so, simply set an empty Email Hashes object like so:
- Overwolf Platform
- Overwolf Electron
overwolf.extensions.current.setUserEmailHashes({}, console.log);
app.overwolf.setUserEmailHashes({});
Example Implementation (WIP)
Further Reading (WIP)
Third Party Cookie Deprecation
Before Hashed Emails, the standard method of tracking user identities for advertising revolved around "Third Party Cookies".
Google's decision to deprecate support for Third Party Cookies in Chrome, has significantly impacted this method's ability to be used in a scalable manner, resulting in a larger, industry-wide shift towards alternative solutions.
Here at Overwolf, we have elected to collaborate with several industry-leading User Identity providers*, to facilitate the usage of Hashed Emails.
* Including but not limited to Liveramp, ID5, TheTradeDesk, Yahoo
Below you can find a WIP FAQ, which should help answer some of the questions you may still have about the topic:
What is first-party data?
First-party data enables publishers to deliver more personalized and targeted advertising experiences to their visitors. By having a (hashed) identifier, publishers can serve relevant content and ads, thereby enhancing user engagement and increasing ad revenue.
What solution does Overwolf offer and how does it work?
Overwolf offers a solution for handling user identity challenges through its hashed email API. This API simplifies the process of email hashing, transforming email addresses into unrecognizable strings of characters, thereby providing a privacy-compliant method for data collection in the absence of third-party cookies. This enables publishers to access critical user data sets securely, ensuring continuity in data-driven advertising strategies amidst evolving privacy regulations.
What data is collected and passed?
The hashed email API transforms email addresses provided by users into encrypted strings of characters, ensuring privacy and security
Who is responsible for hashing the email address?
Who is eligible to use this solution?
This solution is accessible to any application that is part of the Overwolf platform.
What’s in it for me? / How this is going to benefit my app?/ Why you should use it?
Overwolf facilitates the integration of your app with various identity vendors. By establishing connections with these identity providers, we enable you to tap into additional advertising budgets from advertisers who rely on platforms like LiveRamp, ID5, or The Trade Desk for precise targeting and identification. This expanded budget allocation can translate to higher CPMs and fill rates for your app.
Is it necessary to update my Privacy Policy or notify my users?
Yes, it's essential to update your privacy policy to reflect this practice. In the near future, we will be releasing clearer guidelines to help with this process. Until then, for more details, please contact us.
How can I confirm that it's functioning properly?
After implementing our solution, our team will monitor its performance to ensure it operates as intended.
What’s the expected uplift in revenue?
Predicting the potential uplift is challenging as it depends on how quickly advertisers embrace these solutions. It's crucial to recognize that the adoption cycle is gradual, with these solutions aimed at long-term benefits. While there's no assurance of immediate performance gains, they play a role in fostering sustained revenue growth.
What if I don’t currently have a sign-in feature?
If you currently don’t have a sign-in feature, you may want to consider implementing mechanisms to offer that. Email addresses can be valuable for various purposes, including communication with users, personalized marketing, and user authentication. However, it's crucial to ensure that your privacy and security practices comply with privacy regulations and that you are transparent with users about how their email addresses will be used.