For the curious botanist: How they uproot your hidden orchids¶ * EDUCATIONAL PURPOSES ONLY* Simplistic code snippets showing how some attacks work Email header analysis Metadata fingerprinting attack Browser fingerprinting demo Cross-app & cross-device tracking AI-powered behavioural profiling Inference attack Linkage attack Structural attack Machine learning deanonymisation