Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Combine this with IP, timestamp, and some behavioral patterns, and you’ve got an extremely robust tracking mechanism that operates outside of explicit consent mechanisms.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: