I know you’re implying the js specifically but using svg rendering as an attack vector was where the name “operation triangulation” came from with the recent high profile exploit.
They would draw a triangle and then hash the result to get a detailed bowser fingerprint of the victims machine.
uicompat|2 years ago
They would draw a triangle and then hash the result to get a detailed bowser fingerprint of the victims machine.
https://m.youtube.com/watch?v=1f6YyH62jFE