Changes

Jump to: navigation, search

Fingerprinting

497 bytes added, 02:58, 15 June 2010
TCP stack
"ThreatMetrix claims that it can detect irregularities in the TCP/IP stack and can pierce through proxy servers". Not sure what this means yet.
 
:nmap's host fingerprinting options (and source code) are the first place to start for understanding the TCP/IP stack issues. Again, there's not much the browser can do about that.
 
:As for "pierce through proxy servers", my best guess is that they use the raw socket infrastructure provided by Flash, which does not respect the browser's proxy settings, in order to learn the client's IP. Not sure if Java and Silverlight have similar problems. -- [[User:Pde|Pde]] 02:58, 15 June 2010 (UTC)
== JS behavioral tests ==
5
edits

Navigation menu