you are viewing a single comment's thread.

view the rest of the comments →

[–]infocom6502[S] 1 insightful - 1 fun1 insightful - 0 fun2 insightful - 1 fun -  (0 children)

about:

The above link is a great find by u\pimterry

The technique described in the article is often used by malicious actors for identification and targeting.

For demo of TLS fingerprinting in action, see: https://ja3er.com