In information security, a fingerprinting algorithm uniquely identifies the hardware, software or data. Just as human fingerprints uniquely identify people for practical purposes. This fingerprint may be used in penetration tests or for vulnerability management.
Questions tagged [fingerprint]
108 questions
-1
votes
2 answers
Uniquely identify each mobile phone of Android 10 / 9 and below
Background:
I have an Android APP with millions of users, but some users are malicious users (robot, fake, privilege escaped, etc). The common solution is to detect & block those "bad" accounts controlled by hackers. But, here, I aim to detect &…
TJCLK
- 818
- 8
- 23
-1
votes
3 answers
Biometric fingerprint as salt for hash function
Sorry, might be a stupid question: But is there any hash function, which use the biometric fingerprint as salt?
First, the User enters his plaintext password, second he use his fingerprint - some constant biometric characteristics (loops, islands,…
idontknowwhoiamgodhelpme
- 131
- 3
-2
votes
1 answer
My internet fingerprint
Please, Do you know any way to delete absolutely all my info from the web? Like, all the info in social media, public places, forums, photoblog. I was using those places without control or worries about privacy. Since my computer got infected with…
Rain
- 7
- 2