Fingerprinting: Difference between revisions
Created page. |
→How it works: Added info. |
||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{StubNotice}} | {{StubNotice}} | ||
In computer science, '''fingerprinting''' is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its '''''fingerprint''''', that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely | In computer science, '''fingerprinting''' is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its '''''fingerprint''''', that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely entify people for practical purposes.<ref>{{Cite web |title=What is fingerprinting in Computer Science? |url=https://tolumichael.com/what-is-fingerprinting-in-cybersecurity/ |access-date=30 August 2025}}</ref> | ||
==How it works== | ==How it works== | ||
Fingerprinting works | <!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting a data item and turning it into a much shorter bit string that uniquely identifies itself. This includes the operating system, device model, screen resolution and more.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref> | ||
==Why it is a problem== | ==Why it is a problem== |