Technology ❯Internet Security ❯Data Protection ❯Vulnerability Exploitation
Researchers reveal a method to track users' browsing and streaming habits by monitoring latency fluctuations in internet connections.