Google AMP (Accelerated Mobile Pages) was introduced to speed up mobile web browsing, but it also creates significant privacy concerns. When you click an AMP result in Google Search, your request routes through Google’s servers, allowing Google to track your browsing activity across websites that would otherwise be independent. This guide covers practical methods to disable Google AMP tracking for developers and power users.
Prerequisites
Before you begin, make sure you have the following ready:
- A computer running macOS, Linux, or Windows
- Terminal or command-line access
- Administrator or sudo privileges (for system-level changes)
- A stable internet connection for downloading tools
Step 1 - How Google AMP Tracking Works
When you perform a Google Search on mobile or desktop, results often display AMP versions of web pages. Clicking these results sends your request through google.com/amp or google-search redirects, creating a detailed log of:
- The websites you visit
- Your search queries
- Timestamps and session data
- Device and browser information
Google’s own documentation acknowledges this tracking, stating that AMP cache URLs provide analytics and performance data. Even if you visit a website directly later, the initial AMP click creates a persistent tracking record linked to your Google account.
Step 2 - Method 1: Disable AMP in Google Search Settings
The simplest approach involves adjusting Google Search preferences:
- Navigate to
google.com/search/settings - Scroll to “Results” or “Search settings”
- Look for “Accelerated Mobile Pages (AMP)” toggle
- Disable AMP results
This method has limitations, Google may not offer this setting in all regions, and the setting can reset after clearing cookies or using incognito mode. Additionally, some search results may still redirect through AMP URLs even with this setting disabled.
Step 3 - Method 2: Use Alternative Search Engines
Several privacy-focused search engines do not use AMP:
- DuckDuckGo: Does not use AMP or track search history
- Startpage: Returns original page versions without AMP
- Brave Search: Independent index without AMP integration
- SearX: Self-hosted meta search engine with no AMP
For developers building search interfaces, you can query these engines programmatically:
Query DuckDuckGo HTML (no JavaScript required)
curl -s "https://html.duckduckgo.com/html/?q=privacy+tools"
Step 4 - Method 3: Browser Extensions for AMP Blocking
Several browser extensions strip AMP tracking:
For Chrome/Brave/Edge:
AMP Blocker (Chrome Web Store) - Automatically blocks AMP domains and redirects to original content. The extension maintains a blocklist of known AMP trackers.
Redirect AMP to HTML - an userscript that converts AMP URLs to their canonical versions. Install with an userscript manager like Tampermonkey:
// ==UserScript==
// @name AMP Redirect
// @namespace http://tampermonkey.net/
// @version 1.0
// @description Redirect AMP pages to normal pages
// @match *://*.google.com/*
// @match *://*.google.co.*/*
// @grant none
// ==/UserScript==
(function() {
'use strict';
const url = window.location.href;
if (url.includes('/amp/') || url.includes('amp=')) {
const canonical = document.querySelector('link[rel="canonical"]');
if (canonical) {
window.location.href = canonical.href;
}
}
})();
For Firefox:
Privacy Badger - EFF’s tool automatically blocks known trackers including AMP-related tracking domains.
uBlock Origin - With proper filter lists, uBlock can block AMP tracking:
||google.com/amp$redirect=noop
||google.co.*/amp$redirect=noop
Step 5 - Method 4: DNS-Level Blocking
For network-wide protection, you can block AMP tracking at the DNS level. This approach works for all devices on your network without individual configuration.
Using Pi-hole:
Add these entries to your Pi-hole blocklist:
Block Google AMP tracking domains
google.com.amp
www.google.com.amp
googlesyndication.com
googleadservices.com
doubleclick.net
Custom DNS Providers:
Some privacy-focused DNS providers include tracker blocking:
Test DNS configuration
dig +short A google.com.amp @1.1.1.1
dig +short A google.com.amp @9.9.9.9
If these domains resolve to blocked IPs, your DNS provider may already be filtering them.
Step 6 - Method 5: Browser Configuration
Modern browsers offer settings to reduce AMP tracking:
Firefox:
- Navigate to
about:config - Search for
privacy.trackingprotection - Enable Enhanced Tracking Protection
- Additionally, set
network.cookie.cookieBehaviorto1(block third-party cookies)
Brave Browser:
Brave includes built-in AMP blocking:
- Go to
brave://settings/shields - Ensure “Fingerprinting” is set to “Strict”
- Enable “Block Scripts” for additional protection
Chrome (Limited Options):
Chrome’s built-in privacy options are more restricted. Consider using the --disable-google-top-replacement flag:
Linux/macOS launch option
google-chrome --disable-google-top-replacement
Windows
chrome.exe --disable-google-top-replacement
Step 7 - Method 6: Developer’s Approach - AMP URL Detection
For developers building privacy tools, detecting and handling AMP URLs requires understanding their structure:
import re
from urllib.parse import urlparse
def is_amp_url(url: str) -> bool:
"""Detect if a URL is an AMP version."""
parsed = urlparse(url)
# Check for /amp/ path
if '/amp/' in parsed.path:
return True
# Check for google amp redirect parameters
if 'amp' in parsed.query:
return True
# Check for google domain amp paths
if 'google' in parsed.netloc and '/amp' in parsed.path:
return True
return False
def extract_canonical_url(amp_url: str) -> str:
"""Extract the original URL from an AMP URL."""
# For URLs like https://example.com/amp/article
# Should redirect to https://example.com/article
pass # Implementation depends on specific URL patterns
Step 8 - Method 7: Use “NoAMP” Services
Several services provide “NoAMP” redirects:
- noscript.com - Browser extension that converts AMP to regular pages
- amp2html - Userscript that automatically redirects AMP pages
Install the amp2html userscript:
// ==UserScript==
// @name AMP2HTML
// @version 2.0
// @description Convert AMP pages to regular HTML
// @match *://*.google.com/amp/*
// @match *://*.google.co.*/amp/*
// @run-at document-start
// ==/UserScript==
document.addEventListener('DOMContentLoaded', () => {
const canonical = document.querySelector('link[rel="canonical"]');
if (canonical && canonical.href) {
window.location.replace(canonical.href);
}
});
Step 9 - Verify Your Protection
After implementing your chosen methods, verify AMP tracking is blocked:
- Perform a Google Search for any topic
- Click a result (preferably one with an AMP indicator)
- Check the URL bar, if it shows the original domain (not google.com/amp), you’re protected
You can also test programmatically:
Check if AMP URLs resolve differently
curl -I "https://example.com/amp/article" 2>&1 | head -5
Combining Methods for Maximum Protection
The most effective approach combines multiple methods:
- Use privacy-focused search engines as your default
- Install browser extensions for automatic AMP blocking
- Configure DNS-level blocking for network-wide protection
- Enable browser privacy settings
This layered approach ensures protection even if one method fails. For developers, implementing AMP detection in your own tools helps maintain privacy across all browsing activities.
Troubleshooting
Configuration changes not taking effect
Restart the relevant service or application after making changes. Some settings require a full system reboot. Verify the configuration file path is correct and the syntax is valid.
Permission denied errors
Run the command with sudo for system-level operations, or check that your user account has the necessary permissions. On macOS, you may need to grant terminal access in System Settings > Privacy & Security.
Connection or network-related failures
Check your internet connection and firewall settings. If using a VPN, try disconnecting temporarily to isolate the issue. Verify that the target server or service is accessible from your network.
Frequently Asked Questions
How long does it take to disable google amp tracking in search results guide?
For a straightforward setup, expect 30 minutes to 2 hours depending on your familiarity with the tools involved. Complex configurations with custom requirements may take longer. Having your credentials and environment ready before starting saves significant time.
What are the most common mistakes to avoid?
The most frequent issues are skipping prerequisite steps, using outdated package versions, and not reading error messages carefully. Follow the steps in order, verify each one works before moving on, and check the official documentation if something behaves unexpectedly.
Do I need prior experience to follow this guide?
Basic familiarity with the relevant tools and command line is helpful but not strictly required. Each step is explained with context. If you get stuck, the official documentation for each tool covers fundamentals that may fill in knowledge gaps.
Is this approach secure enough for production?
The patterns shown here follow standard practices, but production deployments need additional hardening. Add rate limiting, input validation, proper secret management, and monitoring before going live. Consider a security review if your application handles sensitive user data.
Where can I get help if I run into issues?
Start with the official documentation for each tool mentioned. Stack Overflow and GitHub Issues are good next steps for specific error messages. Community forums and Discord servers for the relevant tools often have active members who can help with setup problems.
Related Articles
- Macos Spotlight Privacy Settings Disable Tracking
- Best Browser for Avoiding Google Tracking: A Developer Guide
- Google Analytics Tracking Alternatives That Respect User Pri
- Does ExpressVPN Work in Oman? 2026 Latest Tested Results
- VPN Provider Annual Audit Results - Independent Security.
- Best AI Tool for Generating Accessible Search Results Page
Built by theluckystrike. More at zovo.one