I came across this technique when I was using the TOR Browser.
I am not sure that it is of much relevance to me as in contrast to a situation such as an office at a Nation State's security operation or a university campus, where there will be multiple users all at the same IP, the determination of a specific device could be useful. Law Enforcement Agencies and governmental security agents may find this information useful in their forensics
I am not sure that it is of much relevance to me as in contrast to a situation such as an office at a Nation State's security operation or a university campus, where there will be multiple users all at the same IP, the determination of a specific device could be useful. Law Enforcement Agencies and governmental security agents may find this information useful in their forensics
No comments:
Post a Comment
Please do not enter links that are just promoting your own website or ones to those that you are shilling.
Comments with hyperlinks (that are not relevant to the original post) will be re-posted or deleted.
Sorry, this is to discourage "blog spam"