zlacker

[return to "Please disable JavaScript to view this site"]
1. s1k3s+Z5[view] [source] 2020-11-28 21:23:05
>>abused+(OP)
This website does not track you. Correction -> This website does not track you via JS. You have no idea what's logged on the backend.
◧◩
2. devwas+w8[view] [source] 2020-11-28 21:45:43
>>s1k3s+Z5
Ye olde days of tracking just used invisible .gifs and every click was a different webpage so they just tracked which ones were requested to gain interaction metrics.

JS doesn't have any magic to it, location information is opt-in, but your IP is a much better advertising identifier.

◧◩◪
3. darkwa+69[view] [source] 2020-11-28 21:51:57
>>devwas+w8
IP behind NAT or CGNAT is not that useful, but many mobile browsers (especially cheap Androids) leak so many trackable details through headers that makes easier to uniquely identify devices/users
◧◩◪◨
4. deckar+eh[view] [source] 2020-11-28 23:10:42
>>darkwa+69
back in the '90s I was into connecting to IRC servers using spoofed IP addresses. The way it worked is you told the software what OS you were connecting to (or it would figure it out itself, I can't recall). Each OS had a unique way of generating TCP sequence numbers, which allowed the software to guess which number would come next.

Nowadays OSes have protection for this sort of thing. But I'd imagine you could still fingerprint an OS like that. Combine that with TLS, HTTP, etc. specifics and you could narrow it down quite a bit I bet.

[go to top]