Privacy Debugging Hub

Privacy / TCF Tools

Decode consent strings, inspect cookies, and map sync behavior that impacts privacy signals and bidder eligibility.

For privacy engineers, CMP implementers, and ad-tech teams validating consent-aware delivery.

Core tools in this cluster

Start here when you need to inspect CMP markers, consent cookies, TCF strings, US privacy strings, or cookie sync paths.

CMP Inspector

CMP

Inspect page source or a public URL for CMP API markers, common CMP vendors, consent-cookie names, and script hosts before deeper privacy debugging starts.

Privacy / TCF toolOpen

TCF String Decoder

TCF

Decode IAB TCF v2 consent strings into human-readable metadata, purposes, and vendor consent arrays. Paste a TC string from a CMP or euconsent-v2 cookie, and instantly see what it contains for QA, troubleshooting, and compliance checks. Everything runs client-side for privacy.

Privacy / TCF toolOpen

US Privacy String Decoder

USP

Decode IAB US Privacy strings into readable notice, opt-out, and LSPA flags for CCPA and US state privacy debugging.

Privacy / TCF toolOpen
CONSENT
Privacy / TCF toolOpen
COOKIE
Privacy / TCF toolOpen
COOKIE
Privacy / TCF toolOpen

How privacy debugging usually unfolds

Privacy issues are easy to misread because the visible symptom often shows up later in the ad stack. A missing consent cookie can look like a bidder issue. A broken CMP can look like missing demand. A malformed string can look fine until a downstream system tries to parse it. This section is built to help you check the privacy layer first before you chase the wrong problem.

The tools here are meant to work as quick evidence builders. One tool helps you read the string. Another checks the cookie state. Another helps confirm whether CMP markers even exist in the source. That makes it easier to tell whether the issue is collection, storage, transmission, or downstream use.

Use this cluster during CMP rollouts, privacy audits, support tickets, or any time auction behavior changes after consent-related work. The point is to get a clean picture of the signals before you start blaming the rest of the stack.

Move into broader privacy context

Privacy work overlaps with guides, glossary terms, and reference pages more than almost any other section on the site. Use these links when you need that wider view.