Researchers have written computer programs that found patterns among anonymized data about web traffic and used those patterns to identify individual users. The researchers note web users with active social media are vulnerable to the attack.
Researchers have written computer programs that found patterns among anonymized data about web traffic and used those patterns to identify individual users. The researchers note web users with active social media are vulnerable to the attack.