zlacker

[return to "Please disable JavaScript to view this site"]
1. s1k3s+Z5[view] [source] 2020-11-28 21:23:05
>>abused+(OP)
This website does not track you. Correction -> This website does not track you via JS. You have no idea what's logged on the backend.
◧◩
2. devwas+w8[view] [source] 2020-11-28 21:45:43
>>s1k3s+Z5
Ye olde days of tracking just used invisible .gifs and every click was a different webpage so they just tracked which ones were requested to gain interaction metrics.

JS doesn't have any magic to it, location information is opt-in, but your IP is a much better advertising identifier.

◧◩◪
3. darkwa+69[view] [source] 2020-11-28 21:51:57
>>devwas+w8
IP behind NAT or CGNAT is not that useful, but many mobile browsers (especially cheap Androids) leak so many trackable details through headers that makes easier to uniquely identify devices/users
◧◩◪◨
4. deckar+eh[view] [source] 2020-11-28 23:10:42
>>darkwa+69
back in the '90s I was into connecting to IRC servers using spoofed IP addresses. The way it worked is you told the software what OS you were connecting to (or it would figure it out itself, I can't recall). Each OS had a unique way of generating TCP sequence numbers, which allowed the software to guess which number would come next.

Nowadays OSes have protection for this sort of thing. But I'd imagine you could still fingerprint an OS like that. Combine that with TLS, HTTP, etc. specifics and you could narrow it down quite a bit I bet.

◧◩◪◨⬒
5. wrboyc+Fh[view] [source] 2020-11-28 23:15:07
>>deckar+eh
How are you going from guessing TCP sequences to spoofing IP addresses on TCP connections? Did you breeze over a step or am I missing something obvious?
◧◩◪◨⬒⬓
6. nitrog+Bo[view] [source] 2020-11-29 00:25:46
>>wrboyc+Fh
The mitigations for spoofing sequence numbers might be different for each OS, and that would allow the OS to be fingerprinted. See nmap's OS fingerprinting, for example.
[go to top]