Welcome to our Knowledge Base

Info on fingerprinting Apple devices

You are here:
< Back
  • https://github.com/furiousMAC/continuity
  • https://i.blackhat.com/eu-19/Thursday/eu-19-Yen-Trust-In-Apples-Secret-Garden-Exploring-Reversing-Apples-Continuity-Protocol-3.pdf
  • https://petsymposium.org/2020/files/papers/issue1/popets-2020-0003.pdf
  • https://arxiv.org/pdf/1703.02874.pdf
  • https://samteplov.com/uploads/shmoocon20/slides.pdf

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Table of Contents