Questions tagged [fingerprint]

In information security, a fingerprinting algorithm uniquely identifies the hardware, software or data. Just as human fingerprints uniquely identify people for practical purposes. This fingerprint may be used in penetration tests or for vulnerability management.

108 questions
-1
votes
2 answers

Uniquely identify each mobile phone of Android 10 / 9 and below

Background: I have an Android APP with millions of users, but some users are malicious users (robot, fake, privilege escaped, etc). The common solution is to detect & block those "bad" accounts controlled by hackers. But, here, I aim to detect &…
TJCLK
  • 818
  • 8
  • 23
-1
votes
3 answers

Biometric fingerprint as salt for hash function

Sorry, might be a stupid question: But is there any hash function, which use the biometric fingerprint as salt? First, the User enters his plaintext password, second he use his fingerprint - some constant biometric characteristics (loops, islands,…
-2
votes
1 answer

My internet fingerprint

Please, Do you know any way to delete absolutely all my info from the web? Like, all the info in social media, public places, forums, photoblog. I was using those places without control or worries about privacy. Since my computer got infected with…
Rain
  • 7
  • 2
1 2 3 4 5 6 7
8