hsts-cookie icon indicating copy to clipboard operation
hsts-cookie copied to clipboard

Creates a HSTS Supercookie to fingerprint a browser

Results 9 hsts-cookie issues
Sort by recently updated
recently updated
newest added

Most major browsers have fixed this loophole now, as I've tested with my own implementation of this hack [here](https://github.com/pulsejet/HSTS-SuperCookie). I think the README should be updated to reflect this.

Found using [anorack](https://github.com/jwilk/anorack).

I dont know if this means that this is a problem with SSL or if this no longer works with Chrome.

It will be out of beta by February 27, 2018.

I love this code. It was so hard to figure it out until I read your GitHub explanation. I would love it if you would create a video on this...

This way we will be able to verify at max 16777215 user ids. Correct me if I'm wrong.

i'm working on fraud click detection technique .. how can i implement hsts cookie master in my system(application).. refer me something dont know how to do , still a fresher...

The behaviour when using the edge browser has not yet been documented. I will test it out.

Just change your NS of any domain to CloudFlare, Activate SSL, and there you go, you have Free Trusted SSL