Changes

Jump to navigation Jump to search
1,075 bytes added ,  4 years ago
Created claim: quote (P203): By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
Bureaucrats, editors, emailconfirmed
14,021

edits

Navigation menu