Internet and computer security

From experience?
OIP-2409005685.webp
 
Of all the images to post, you pick the American National Bird lol...
Actually saw one the day before yesterday. Lots around here . I suppose I could have posted a picture of the American " birdbrain" ......
donald-trump-photoshop-funny-3797140365.webp
 
Looks like something only a robot could do.
I was trying to order from Paragon this morning and the only Country option at checkout was the US . Found where you have to contact them first supposedly for international orders. Although yesterday I was given a quote on their site for shipping to Canada. Strange, it wasn't there today unless I was on a slightly different URL . So I fill I the request to be contacted and had to do the prove you aren't a robot BS . 8 FN refreshes of the grid . Jesus H .
 
Scary , impressive or both ? The rate of advancement in this tech in just 3 years is astounding. Imagine what it will be capable of in another 3 . I'm afraid that those that don't keep up with the advancements in technology will be left in the dark , whether they approve of it or not . Especially older folks. And not just regarding image and video generation. This is the new generated video on Will Smith eating spaghetti. Of course it's all CGI .....
 
And this is a public service announcement (probably)

Once upon a time in a village, a man appeared and announced to the villagers that he would buy monkeys for $10 each...

The villagers, seeing that there were many monkeys around, went out to the forest and started catching them.

The man bought thousands at $10 and as supply started to diminish, the villagers stopped their effort. He further announced that he would now buy at $20. This renewed the efforts of the villagers and they started catching monkeys again.

Soon the supply diminished even further and people started going back to their farms. The offer increased to $25 each and the supply of monkeys became so little that it was an effort to even see a monkey, let alone catch it!

The man now announced that he would buy monkeys at $50! However, since he had to go to the city on some business, his assistant would now buy on behalf of him.

In the absence of the man, the assistant told the villagers; "Look at all these monkeys in the big cage that the man has collected. I will sell them to you at $35 and when the man returns from the city, you can sell them to him for $50 each."

The villagers rounded up all their savings and bought all the monkeys.

They never saw the man nor his assistant, only monkeys everywhere!

Now you have a better understanding of how the cryptocurrency market works.
 
Fingerprinting.
Browser fingerprinting is a way to track web users by collecting many small details about their browser, device, and behavior and combining them into a highly unique “fingerprint” that often persists even when cookies are cleared. What fingerprinting collectsA fingerprint is built from many attributes that, in combination, are usually unique to you. Common inputs include: Browser and OS (user‑agent, version, platform). Screen details (resolution, color depth, zoom level). Time zone, locale, preferred language. Installed fonts and plug‑ins/extensions visibility. Hardware info such as GPU/CPU and drivers, touch support, pointer type. Support/behavior of APIs (WebGL, WebRTC, audio, battery, sensors, media). Network metadata like IP address and connection patterns. These values are usually read via small JavaScript snippets that execute when a page loads, then hashed into an identifier stored server‑side or by a third‑party service. Tracking techniquesDifferent technical tricks exist, all with the same goal: produce a stable, unique ID that can be recognized across visits or even sites. Canvas fingerprinting: Your browser is asked to draw hidden text/shapes in an off‑screen canvas; tiny rendering differences (fonts, GPU, drivers) yield a unique hash. WebGL and graphics: 3D scenes or shaders are rendered and their outputs hashed, exposing GPU and driver quirks. Audio fingerprinting: An inaudible or short sound is processed; differences in audio stack and hardware make the output distinctive.Font and feature probing: Scripts test which fonts, codecs, or APIs you support via subtle measurement, not just simple “is installed” checks. Behavioral/temporal signals: Visit timing, navigation patterns, and IP history are combined with device attributes to make IDs more robust. Modern systems also do “cross‑browser” fingerprinting by focusing on device‑level properties and behavior, so the same user can be linked even when they switch browsers or devices tied to the same environment. How accurate and persistent it isStudies and commercial systems suggest that a typical browser fingerprint is highly unique. Academic work has measured 90–99% of collected fingerprints as unique in large samples. Commercial fingerprinting services claim stable identification even when users clear cookies, change some settings, or update software, by evolving fingerprints over time instead of treating them as static. Because many inputs change slowly (hardware, fonts, region), identifiers often persist for months, and systems can “link” slightly changed fingerprints as belonging to the same user. Fingerprinting is widely used for fraud detection (e.g., blocking multi‑account abuse, account takeover) but is also used by advertisers and analytics to track users without relying solely on cookies. Limitations and trade‑offsFingerprinting is powerful but not perfect. It is probabilistic: systems output a likelihood that two visits are the same user, not a cryptographic guarantee. Noise (e.g., anti‑fingerprinting tools) can reduce accuracy, so some sites treat strong mismatches as suspicious and may trigger extra verification. Legal and ethical concerns exist because fingerprinting is often opaque to users and can fall under “online identifiers” in privacy regulations like GDPR. Practical defenses (as of 2025–2026)You can’t completely eliminate fingerprinting without severely degrading the web, but you can reduce how uniquely identifiable you are or how much data specific entities can gather. Browser choices and settings: Use browsers with built‑in anti‑fingerprinting: Tor Browser, Mullvad Browser, or Firefox with Enhanced Tracking Protection Strict / latest fingerprinting protections. Prefer privacy‑focused browsers like Brave or Mullvad for general use; they standardize some metrics (e.g., user‑agent, canvas) across users. Turn on stricter tracking protection and disable or restrict third‑party cookies and cross‑site tracking. Extensions and blocking tools: Content blockers: uBlock Origin / uBlock Origin Lite, Privacy Badger, or similar to block known tracking and fingerprinting scripts. Fingerprinting‑specific add‑ons: CanvasBlocker, Fingerprint Defender, or suites like PassCypher to randomize or block fingerprinting calls. Script blockers: NoScript or similar to restrict JavaScript on untrusted sites, at the cost of more breakage. Usage patterns: Segmentation: Use different browsers / profiles for different activities (work, personal, banking) so a single fingerprint cannot unify everything. Limit extensions and exotic fonts, since unusual combinations increase uniqueness. Combine with a trustworthy VPN to mask your IP and location from individual sites, understanding that VPN alone does not stop fingerprinting. If you tell me your current browser stack (e.g., Firefox + uBlock on Windows, plus whether you use VPN), I can give a more tailored setup that balances privacy with minimal site breakage.
 

Users who are viewing this thread

Back
Top