- From: guest271314 via GitHub <sysbot+gh@w3.org>
- Date: Mon, 04 May 2020 16:04:46 +0000
- To: public-webrtc-logs@w3.org
No, am asking precisely how a site capturing a device identifier string can fingerprint the user, not fingerprinting in general, which is ubiquitous, in fact perpetual, 20TB/sec captured, analyzed in real-time as of last century, so in that sense all signals are non-private in the known world. How can a string from a device (`id`, `groupId`, etc.) exploited? What is done (STR)? -- GitHub Notification of comment by guest271314 Please view or discuss this issue at https://github.com/w3c/mediacapture-main/issues/690#issuecomment-623554181 using your GitHub account
Received on Monday, 4 May 2020 16:04:48 UTC