Fingerprinting algorithms

Device fingerprint

A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the web browser of the device. Device fingerprints can be used to fully or partially identify individual devices even when persistent cookies (and zombie cookies) cannot be read or stored in the browser, the client IP address is hidden, or one switches to another browser on the same device.This may allow a service provider to detect and prevent identity theft and credit card fraud, but also to compile long-term records of individuals' browsing histories (and deliver targeted advertising or targeted exploits) even when they are attempting to avoid tracking – raising a major concern for internet privacy advocates. (Wikipedia).

Device fingerprint
Video thumbnail

IMT4093 Mobile Research

Rigour and reproducibility.

From playlist Archive - Research in Mobile/Wearable Tech

Video thumbnail

Introduction to Geometer's Sketchpad: Measurements

This video demonstrates some of the measurement and calculation features of Geometer's Sketchpad.

From playlist Geometer's Sketchpad

Video thumbnail

GeoGebra 3D Calculator: When to Use?

GeoGebra 3D Calculator is one of the five apps in Calculator Suite. https://www.geogebra.org/calculator

From playlist GeoGebra Apps Intro: Which to USE?

Video thumbnail

Electronic measurement equipment and multimeters - Part 1

In this video series I show different measurement equipment (multimeters, etc) and why / how I use them. In later videos I'll explore different features and highlight pro's and con's. A list of my multimeters can be purchased here: http://astore.amazon.com/m0711-20?_encoding=UTF8&node=

From playlist Electronic Measurement Equipment

Video thumbnail

DEFCON 19: Fingerbank — Open DHCP Fingerprints Database

Speaker: Olivier Bilodeau Systems architect at Inverse inc. The presentation will first take a step back and offer a basic reminder of what passive fingerprinting is and, more precisely, DHCP fingerprinting. Then we will offer defensive and offensive use cases for DHCP fingerprinting. Nex

From playlist DEFCON 19

Video thumbnail

DEFCON 15: Greater than 1: Defeating "strong" Authentication in Web Applications

Speaker: Brendan O'Connor With Phishing, Fraud, and Identity Theft at peak levels, banks, credit unions, credit card companies, and other financial institutions are enhancing the security of their website authentication. This talk will cover the new methods of authentication, such as mut

From playlist DEFCON 15

Video thumbnail

25c3: RF fingerprinting of RFID

Speakers: cryptocrat, Boris Danev In the lecture portion of this workshop we will present an overview of existing and our own novel methods for hacking electronic passports and driver's licenses including novel radio frequency fingerprinting techniques. In the the hands-on section we wi

From playlist 25C3: Nothing to hide

Video thumbnail

#232 How to secure our devices using SSL (ESP8266, ESP32, Tutorial)

Most of our IOT devices are insecure and vulnerable. It’s high time to learn how to make them more secure, also because unsecured devices will no more be able to use valuable services without using the HTTPS protocol. Already now, Google services, for example, do no more accept unsecured c

From playlist ESP32

Video thumbnail

OWASP AppSec EU 2013: Web Fingerprinting: How, Who, and Why?

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speaker: Nick Nikiforakis The web has become an essential part of our society and is currently the main medium of information delivery. Billions of use

From playlist OWASP AppSec EU 2013

Video thumbnail

GRCon21 - A New Experimental Setup for Collecting nRF2.4 and LoRa Devices Signatures for ....

A New Experimental Setup for Collecting nRF2.4 and LoRa Devices Signatures for Machine Learning based Device Authentication presented by Zheng Zeng, William Hemminger and Abdallah S Abdallah at GNU Radio Conference 2021 This poster focuses on using software-defined radio to collect devic

From playlist GRCon 2021

Video thumbnail

DEFCON 13: On the Current State of Remote Active OS Fingerprinting

Speaker: Ofir Arkin, CTO and Co-Founder, Insightix Active operating system fingerprinting is a technology, which uses stimulus (sends packets) in order to provoke a reaction from network elements. The implementations of active scanning will monitor the network for a response to be, or no

From playlist DEFCON 13

Video thumbnail

Biometric "Security" Is NOT Secure

Biometric security is strong and unique. But what happens if somebody steals your faceprint or fingerprint? You are compromised everywhere for the rest of your life. Support me through Patreon: https://www.patreon.com/thehatedone - or donate anonymously: Monero: 84DYxU8rPzQ88SxQqBF6VBN

From playlist Decrypted Lies

Video thumbnail

DEFCON 19: Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes

Speaker: Deviant Ollam Cluebat Quartermaster Hackers like guns. Hackers like locks. Hackers like to tinker with guns and locks. And, most of the time, hackers protect their guns with high-quality locks. However, while it's one thing to own a nice gun safe protected by a high security dial

From playlist DEFCON 19

Video thumbnail

How To Create Audio Recognition System Using AcrCloud C# SDK | Session 04 | #C | #programming

Don’t forget to subscribe! In this project series, you will learn to create an audio recognition system using ACRCloud. We will cover the details of interacting with the Acrcloud C# SDK for creating an audio recognition system. This project covers the details necessary to create an audio

From playlist Create Audio Recognition System Using AcrCloud C# SDK

Related pages

Encryption | TCP/IP stack fingerprinting | Display aspect ratio | Hamming distance | Spatial anti-aliasing | Cryptographic hash function | Computer security | Canvas fingerprinting | Entropy (information theory) | Fingerprint (computing) | AES instruction set | Serial number