Cyber Attacks #3 - Browser Fingerprinting Explained

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 10

  • @Iucas.d
    @Iucas.d Год назад

    Oh my, I loved the video. He speaks and the feeling I get is that of a passive-aggressive teacher telling the student "NEVER USE ANY AI to do your homework".

    • @lab_cyber
      @lab_cyber  Год назад

      Oh my, I absolutely loved reading your comment. I am sure it must have taken you several hours to come up with such an intelligent and insightful comment.

  • @toddh2327
    @toddh2327 2 года назад +1

    Quality video, great outline and very informative. Thank you!

  • @princeabidex9676
    @princeabidex9676 2 года назад +1

    Apt and informing...thanks for the video.

  • @malachdorell6026
    @malachdorell6026 Год назад

    Great video! Appreciate all the info! I'm conducting a research project on a related topic and I have some questions if you don't mind:
    • How long does it usually take to fingerprint an individual?
    • What hardware/software might someone need for such an activity?
    • Is it possible to intercept someone's personal session cookie in order to retrieve important info?
    Thanks!

  • @da01ksdfm
    @da01ksdfm 2 года назад +1

    Loved face expressions ♥️

  • @benoit.gerin-lajoie
    @benoit.gerin-lajoie Год назад

    What's up Alex ? @7:22 you have been bitten by a bug and you started speaking so fast that we couldn't understand you ?

  • @Amber-xe5ti
    @Amber-xe5ti 8 месяцев назад

    even tor uses it 2024..no such thing as privacy anymore...throw the pc out.