Hacker News new | past | comments | ask | show | jobs | submit login

Those are abusable by first party only though aren't they? This abuse isn't just limited to fingerprinting from 1st party sources, but to 3rd party history detection essentially.



Ah, thanks for clarifying. You are 100% right, I misunderstood the use case.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: