Tagged articles
8 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 14, 2026 · Information Security

How LinkedIn Leverages 6,236 Browser Fingerprints to Reveal Your Career Secrets in Milliseconds

A detailed security analysis shows that LinkedIn's browser extension silently runs a heavily obfuscated JavaScript payload that probes over 6,200 Chrome extensions in a few milliseconds, building precise user profiles, political tags, and commercial intelligence, while Microsoft defends the practice as anti‑scraping.

Browser FingerprintingChrome ExtensionExtremeHack
0 likes · 9 min read
How LinkedIn Leverages 6,236 Browser Fingerprints to Reveal Your Career Secrets in Milliseconds
Rare Earth Juejin Tech Community
Rare Earth Juejin Tech Community
Jun 19, 2025 · Information Security

How to Generate Reliable Browser Fingerprints with Navigator, Canvas, and WebGL

This article explains what browser fingerprinting is, outlines common techniques such as Navigator, Canvas, and WebGL fingerprints, and provides complete JavaScript examples that collect device information and generate stable hashes, helping developers understand and implement device‑unique identifiers for identity verification.

Browser FingerprintingJavaScriptWeb Security
0 likes · 11 min read
How to Generate Reliable Browser Fingerprints with Navigator, Canvas, and WebGL
政采云技术
政采云技术
Apr 26, 2023 · Frontend Development

An Introduction to Web Client Tracking Technologies: Cookies, Browser Fingerprinting, and Privacy Defenses

This article explores various web client tracking technologies, including first-party and third-party cookies, Flash cookies, and advanced browser fingerprinting techniques like Canvas, AudioContext, and WebRTC, while also discussing practical countermeasures to protect user privacy and prevent unauthorized tracking across modern web browsers.

Anti-TrackingBrowser FingerprintingCookie Management
0 likes · 10 min read
An Introduction to Web Client Tracking Technologies: Cookies, Browser Fingerprinting, and Privacy Defenses
ByteFE
ByteFE
Aug 11, 2021 · Information Security

Understanding Browser Incognito Mode: Limitations, Detection Techniques, and Fingerprinting

The article explains how browser incognito or private‑browsing modes work, clarifies common misconceptions, details why they do not provide true anonymity, and explores technical detection methods and fingerprinting techniques—including code examples—while offering guidance on protecting personal privacy.

Browser FingerprintingWeb Securityincognito
0 likes · 26 min read
Understanding Browser Incognito Mode: Limitations, Detection Techniques, and Fingerprinting
WecTeam
WecTeam
Nov 15, 2019 · Frontend Development

Top Frontend Reads: Promises, Intersection Observer, Fingerprinting, V8, Node.js

This weekly roundup highlights advanced frontend topics, including an in‑depth analysis of Promise micro‑tasks, a translation on Intersection Observer usage, an overview of browser fingerprinting techniques, the current state and future of modern web development, V8’s JavaScript execution pipeline, and Node.js applications at WeDoctor.

Browser Fingerprintingfrontendperformance
0 likes · 5 min read
Top Frontend Reads: Promises, Intersection Observer, Fingerprinting, V8, Node.js
21CTO
21CTO
Apr 26, 2018 · Information Security

How Cookies, Beacons & Fingerprints Track You Online

This article explains the fundamentals of web tracking, distinguishing first- and third-party trackers, detailing technical mechanisms such as cookies, browser fingerprinting, and web beacons, and offers practical tools like Lightbeam to detect and visualize trackers, highlighting privacy implications for users and operators.

Browser Fingerprintingcookiesprivacy
0 likes · 8 min read
How Cookies, Beacons & Fingerprints Track You Online
MaGe Linux Operations
MaGe Linux Operations
Dec 5, 2017 · Information Security

How to Defend Your Website Against Web Crawlers: Techniques & Tools

This article explores why web content needs protection, explains common server‑side and client‑side anti‑crawling methods—including User‑Agent checks, token cookies, headless‑browser detection, fingerprinting, captchas, and robots.txt—and offers practical guidance for raising the cost of unauthorized scraping.

Browser FingerprintingCaptchaHeadless Browser
0 likes · 12 min read
How to Defend Your Website Against Web Crawlers: Techniques & Tools
21CTO
21CTO
Sep 12, 2015 · Information Security

How Browser Fingerprinting Works and How to Defend Against It

This article explains the many data points browsers expose—such as IP, cookies, language, hardware, and HTML5 APIs—that enable device fingerprinting, describes how fingerprinting scripts operate, and outlines practical countermeasures like disabling JavaScript, using privacy extensions, and configuring browser settings.

Browser FingerprintingHTML5 APIsJavaScript
0 likes · 10 min read
How Browser Fingerprinting Works and How to Defend Against It