I came across this technique when I was using the TOR Browser.
I am not sure that it is of much relevance to me as in contrast to a situation such as an office at a Nation State's security operation or a university campus, where there will be multiple users all at the same IP, the determination of a specific device could be useful. Law Enforcement Agencies and governmental security agents may find this information useful in their forensics
I am not sure that it is of much relevance to me as in contrast to a situation such as an office at a Nation State's security operation or a university campus, where there will be multiple users all at the same IP, the determination of a specific device could be useful. Law Enforcement Agencies and governmental security agents may find this information useful in their forensics
No comments:
Post a Comment