Fingerprinting: Difference between revisions

Created page.
 
How it works: Added info.
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
{{StubNotice}}
{{StubNotice}}


In computer science, '''fingerprinting''' is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its '''''fingerprint''''', that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely identify people for practical purposes.<ref>{{Cite web |title=What is fingerprinting in Computer Science? |url=https://tolumichael.com/what-is-fingerprinting-in-cybersecurity/ |access-date=30 August 2025}}</ref>
In computer science, '''fingerprinting''' is a procedure that maps an arbitrarily large data item (such as a computer file) to a much shorter bit string, its '''''fingerprint''''', that uniquely identifies the original data for all practical purposes just as human fingerprints uniquely entify people for practical purposes.<ref>{{Cite web |title=What is fingerprinting in Computer Science? |url=https://tolumichael.com/what-is-fingerprinting-in-cybersecurity/ |access-date=30 August 2025}}</ref>


==How it works==
==How it works==
Fingerprinting works by…
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting a data item and turning it into a much shorter bit string that uniquely identifies itself. This includes the operating system, device model, screen resolution and more.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref>


==Why it is a problem==
==Why it is a problem==