top | item 36906044

(no title)

lordgilman | 2 years ago

They all seem like APIs that could be abused to fingerprint the device, e.g. no two phones are going to have the same free disk space and no two devices behind the same IP address are going to have the same uptime.

discuss

order

No comments yet.