That’s commendable, and I appreciate the link, but it doesn’t address my question here.
Privacy Badger flags Yoast.com as a “potential tracker” on the WordPress administrative dashboard. This typically means there’s some object or script that is either sending data to Yoast or (probably more likely) there is some content that is being served by Yoast.com rather than locally, which would allow the Yoast servers to receive some personal data about the device/browser that loads the content. (For instance, if an image is hosted remotely, the server that provides that image probably gets the IP address and user agent of each device that loads the image.)
If I go to the Dashboard and view the source, the only thing it shows me coming from Yoast.com is this script:
<script type='text/javascript'>
/* <![CDATA[ */
var wpseoDashboardWidgetL10n = {"feed_header":"Latest blog posts on Yoast.com","feed_footer":"Read more like this on our SEO blog","ryte_header":"Indexability check by Ryte","ryte_fetch":"Fetch the current status","ryte_analyze":"Analyze entire site","ryte_fetch_url":"\/wp-admin\/index.php?wpseo-redo-onpage=1#wpseo-dashboard-overview","ryte_landing_url":"https:\/\/yoa.st\/rytelp?php_version=XXX&platform=wordpress&platform_version=4.9.8&software=free&software_version=8.1.2&role=administrator&days_active=XXX"};
var wpseoYoastJSL10n = {"yoast-components":null,"wordpress-seo":null};
/* ]]> */
</script>
(The “XXX” is data I’ve sanitized here.)
What it looks like is happening is that the Yoast SEO dashboard widget — the one that displays SEO blog posts — is pulling feed content from Yoast.com in a way that exposes my device/browser information even when that Dashboard box is turned off, which Privacy Badger is flagging (and in this case blocking).
The reason Privacy Badger is flagging it is because setting up the widget in this way would potentially allow Yoast to use the widget to track plugin users (whether you’re actively seeking to do so or not).