fingerprintjs / external-protocol-flooding

Scheme flooding vulnerability: how it works and why it is a threat to anonymous browsing
https://schemeflood.com
MIT License
644 stars 47 forks source link

feat: implement backend #1

Closed ilya-nurullin closed 3 years ago

spalt08 commented 3 years ago

А зачем hash если есть fingerprint ?

ilya-nurullin commented 3 years ago

А зачем hash если есть fingerprint ?

Для трехстороннего сравнения: opensource vs pro vs apps detection