Alerts
Events
DCR
Explore Cyware Products
Alerts
Events
DCR
Go to listing page
Tor users, beware: 'Scheme flooding' technique may be used to deanonymize you
Threat Intel & Info Sharing
May 15, 2021
The Register
FingerprintJS said it has identified a more dubious fingerprinting technique capable of generating a consistent identifier across different desktop browsers, including the Tor Browser.
Read More
Scheme Flooding
fingerprinting technique
consistent identifier
Tor Browser
custom URL schemes
Publisher
Previous
Ransomware is a national security threat and a big busi ...
Expert Blogs and Opinion
Next
FIN7 Backdoor Masquerades as Ethical Hacking Tool
Malware and Vulnerabilities