| ▲ | adastra22 6 hours ago | ||||||||||||||||||||||||||||
Painting fingerprinting as vulnerability exploit is your own very biased and very out-of-norm framing. | |||||||||||||||||||||||||||||
| ▲ | SiempreViernes 5 hours ago | parent | next [-] | ||||||||||||||||||||||||||||
Instead of trying convince-by-assertion, maybe you could try offering an actual objection to the argument raised up-thread? On what basis do you claim that software developers, who did not establish a means of for third parties to get a stable identifier, nevertheless intended that fingerprinting techniques should work? | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
| ▲ | foltik 5 hours ago | parent | prev [-] | ||||||||||||||||||||||||||||
How would you frame it? | |||||||||||||||||||||||||||||