logo
Privacy greenhouse
For the curious botanist
  • Red tradecraft
  • Defence blues
  • Purple crossroads
  • Indigo observatory
  • Contact
Initializing search
    • Threat models
    • Defensive strategies
    • Playbooks: when judgement is required
    • Runbooks: step-by-step procedures
    • Privacy playground
    • For the curious botanist
      • Email header analysis
      • Metadata fingerprinting
      • Browser fingerprinting
      • Cross-app and cross-device tracking
      • AI-powered behavioural profiling
      • Inference attack
      • Linkage attack
      • Structural attack
      • Machine learning deanonymisation
    • For the curious botanist
      • Email header analysis
      • Metadata fingerprinting
      • Browser fingerprinting
      • Cross-app and cross-device tracking
      • AI-powered behavioural profiling
      • Inference attack
      • Linkage attack
      • Structural attack
      • Machine learning deanonymisation
    • The Unseen University library

    For the curious botanistΒΆ

    Pseudocode snippets showing how some attacks work:

    • Email header analysis
    • Metadata fingerprinting
    • Browser fingerprinting
    • Cross-app and cross-device tracking
    • AI-powered behavioural profiling
    • Inference attack
    • Linkage attack
    • Structural attack
    • Machine learning deanonymisation
    2026-04-01 20:57
    © Copyright 2025, TyMyrddin.
    Created using Sphinx 7.2.6. and Sphinx-Immaterial

    Made with love in the Unseen University, 2025, with a forest garden fostered by /ut7