(Q4554)

From Wikibase Personal data
Jump to navigation Jump to search

Statements

2019
0 references
By observing typical advertising behaviors of these operating systems, we identified that parts of these data structures allow an adversary to abuse them as a temporary, secondary pseudo-identity. These identifying tokens can be integrated into an algorithm which allows device tracking beyond address randomization.
0 references

Identifiers