This is possible without IDFA.
Basically, create a URL endpoint on your server that will be 302 in the App Store in GET. When a user clicks on this link, collect the IP address, OS, OS version, device model, screen size and other parameters and save it as a browser fingerprint.
Then, after the user installs your application, send the same metadata array to your server as a device fingerprint. Your server can then map this device fingerprint to the browser fingerprint. If there is a match, you can be very sure that the user came from your link.
Just to give you an idea of ββthe numbers, we (at Branch ) give this service for free and now process hundreds of millions of these hits per day. We saw that if the user installs, 99% of them will do so within the first 60 minutes. We simply estimate that this mechanism with a short window of 2 hours is very close to 100%.
For added value, if you collect IDFAs, you can reset the cookie in the browser upon forwarding and then save the matched pair in the IDFA to create a semi-permanent alternative to the fingerprint mechanism that I mentioned above. If someone clicks on your link again and you have a cookie stored in the browser, you will know who they are when they send IDFA back to your service during installation, because you already saw this story.
source share