Last updated: March 16, 2026

Google AMP (Accelerated Mobile Pages) was introduced to speed up mobile web browsing, but it also creates significant privacy concerns. When you click an AMP result in Google Search, your request routes through Google’s servers, allowing Google to track your browsing activity across websites that would otherwise be independent. This guide covers practical methods to disable Google AMP tracking for developers and power users.

Prerequisites

Before you begin, make sure you have the following ready:

Step 1 - How Google AMP Tracking Works

When you perform a Google Search on mobile or desktop, results often display AMP versions of web pages. Clicking these results sends your request through google.com/amp or google-search redirects, creating a detailed log of:

Google’s own documentation acknowledges this tracking, stating that AMP cache URLs provide analytics and performance data. Even if you visit a website directly later, the initial AMP click creates a persistent tracking record linked to your Google account.

Step 2 - Method 1: Disable AMP in Google Search Settings

The simplest approach involves adjusting Google Search preferences:

  1. Navigate to google.com/search/settings
  2. Scroll to “Results” or “Search settings”
  3. Look for “Accelerated Mobile Pages (AMP)” toggle
  4. Disable AMP results

This method has limitations, Google may not offer this setting in all regions, and the setting can reset after clearing cookies or using incognito mode. Additionally, some search results may still redirect through AMP URLs even with this setting disabled.

Step 3 - Method 2: Use Alternative Search Engines

Several privacy-focused search engines do not use AMP:

For developers building search interfaces, you can query these engines programmatically:

Query DuckDuckGo HTML (no JavaScript required)
curl -s "https://html.duckduckgo.com/html/?q=privacy+tools"

Step 4 - Method 3: Browser Extensions for AMP Blocking

Several browser extensions strip AMP tracking:

For Chrome/Brave/Edge:

AMP Blocker (Chrome Web Store) - Automatically blocks AMP domains and redirects to original content. The extension maintains a blocklist of known AMP trackers.

Redirect AMP to HTML - an userscript that converts AMP URLs to their canonical versions. Install with an userscript manager like Tampermonkey:

// ==UserScript==
// @name         AMP Redirect
// @namespace    http://tampermonkey.net/
// @version      1.0
// @description  Redirect AMP pages to normal pages
// @match        *://*.google.com/*
// @match        *://*.google.co.*/*
// @grant        none
// ==/UserScript==

(function() {
    'use strict';
    const url = window.location.href;
    if (url.includes('/amp/') || url.includes('amp=')) {
        const canonical = document.querySelector('link[rel="canonical"]');
        if (canonical) {
            window.location.href = canonical.href;
        }
    }
})();

For Firefox:

Privacy Badger - EFF’s tool automatically blocks known trackers including AMP-related tracking domains.

uBlock Origin - With proper filter lists, uBlock can block AMP tracking:

||google.com/amp$redirect=noop
||google.co.*/amp$redirect=noop

Step 5 - Method 4: DNS-Level Blocking

For network-wide protection, you can block AMP tracking at the DNS level. This approach works for all devices on your network without individual configuration.

Using Pi-hole:

Add these entries to your Pi-hole blocklist:

Block Google AMP tracking domains
google.com.amp
www.google.com.amp
googlesyndication.com
googleadservices.com
doubleclick.net

Custom DNS Providers:

Some privacy-focused DNS providers include tracker blocking:

Test DNS configuration
dig +short A google.com.amp @1.1.1.1
dig +short A google.com.amp @9.9.9.9

If these domains resolve to blocked IPs, your DNS provider may already be filtering them.

Step 6 - Method 5: Browser Configuration

Modern browsers offer settings to reduce AMP tracking:

Firefox:

  1. Navigate to about:config
  2. Search for privacy.trackingprotection
  3. Enable Enhanced Tracking Protection
  4. Additionally, set network.cookie.cookieBehavior to 1 (block third-party cookies)

Brave Browser:

Brave includes built-in AMP blocking:

  1. Go to brave://settings/shields
  2. Ensure “Fingerprinting” is set to “Strict”
  3. Enable “Block Scripts” for additional protection

Chrome (Limited Options):

Chrome’s built-in privacy options are more restricted. Consider using the --disable-google-top-replacement flag:

Linux/macOS launch option
google-chrome --disable-google-top-replacement

Windows
chrome.exe --disable-google-top-replacement

Step 7 - Method 6: Developer’s Approach - AMP URL Detection

For developers building privacy tools, detecting and handling AMP URLs requires understanding their structure:

import re
from urllib.parse import urlparse

def is_amp_url(url: str) -> bool:
    """Detect if a URL is an AMP version."""
    parsed = urlparse(url)

    # Check for /amp/ path
    if '/amp/' in parsed.path:
        return True

    # Check for google amp redirect parameters
    if 'amp' in parsed.query:
        return True

    # Check for google domain amp paths
    if 'google' in parsed.netloc and '/amp' in parsed.path:
        return True

    return False

def extract_canonical_url(amp_url: str) -> str:
    """Extract the original URL from an AMP URL."""
    # For URLs like https://example.com/amp/article
    # Should redirect to https://example.com/article
    pass  # Implementation depends on specific URL patterns

Step 8 - Method 7: Use “NoAMP” Services

Several services provide “NoAMP” redirects:

Install the amp2html userscript:

// ==UserScript==
// @name         AMP2HTML
// @version      2.0
// @description  Convert AMP pages to regular HTML
// @match        *://*.google.com/amp/*
// @match        *://*.google.co.*/amp/*
// @run-at       document-start
// ==/UserScript==

document.addEventListener('DOMContentLoaded', () => {
    const canonical = document.querySelector('link[rel="canonical"]');
    if (canonical && canonical.href) {
        window.location.replace(canonical.href);
    }
});

Step 9 - Verify Your Protection

After implementing your chosen methods, verify AMP tracking is blocked:

  1. Perform a Google Search for any topic
  2. Click a result (preferably one with an AMP indicator)
  3. Check the URL bar, if it shows the original domain (not google.com/amp), you’re protected

You can also test programmatically:

Check if AMP URLs resolve differently
curl -I "https://example.com/amp/article" 2>&1 | head -5

Combining Methods for Maximum Protection

The most effective approach combines multiple methods:

This layered approach ensures protection even if one method fails. For developers, implementing AMP detection in your own tools helps maintain privacy across all browsing activities.

Troubleshooting

Configuration changes not taking effect

Restart the relevant service or application after making changes. Some settings require a full system reboot. Verify the configuration file path is correct and the syntax is valid.

Permission denied errors

Run the command with sudo for system-level operations, or check that your user account has the necessary permissions. On macOS, you may need to grant terminal access in System Settings > Privacy & Security.

Connection or network-related failures

Check your internet connection and firewall settings. If using a VPN, try disconnecting temporarily to isolate the issue. Verify that the target server or service is accessible from your network.

Frequently Asked Questions

How long does it take to disable google amp tracking in search results guide?

For a straightforward setup, expect 30 minutes to 2 hours depending on your familiarity with the tools involved. Complex configurations with custom requirements may take longer. Having your credentials and environment ready before starting saves significant time.

What are the most common mistakes to avoid?

The most frequent issues are skipping prerequisite steps, using outdated package versions, and not reading error messages carefully. Follow the steps in order, verify each one works before moving on, and check the official documentation if something behaves unexpectedly.

Do I need prior experience to follow this guide?

Basic familiarity with the relevant tools and command line is helpful but not strictly required. Each step is explained with context. If you get stuck, the official documentation for each tool covers fundamentals that may fill in knowledge gaps.

Is this approach secure enough for production?

The patterns shown here follow standard practices, but production deployments need additional hardening. Add rate limiting, input validation, proper secret management, and monitoring before going live. Consider a security review if your application handles sensitive user data.

Where can I get help if I run into issues?

Start with the official documentation for each tool mentioned. Stack Overflow and GitHub Issues are good next steps for specific error messages. Community forums and Discord servers for the relevant tools often have active members who can help with setup problems.

Related Articles

Built by theluckystrike. More at zovo.one