A
A
Alexey2021-01-12 13:03:50
User identification
Alexey, 2021-01-12 13:03:50

How to determine the uniqueness of a host in javascript?

You need to authenticate on the client.
I used Fingerprint, but there are a lot of duplicate hashes.

Is there an analogue?
What do you use to identify the host?

Answer the question

In order to leave comments, you need to log in

3 answer(s)
A
Alexander Aksentiev, 2021-01-12
@Sanasol

I used Fingerprint, but there are a lot of duplicate hashes.

Self-made, right? What data was taken to build the hash? What library?
Never had such a problem. There are also a bunch of parameters that by no means can match "very often"
Only the Tor browser gave out the same ones, because it is intended for this in principle, a bunch of anonymization out of the box turns everyone into clones.

U
Uno, 2021-01-12
@Noizefan

xmoonlight in vain you)) whom you just don’t meet here at times)) and the topic is so how old
what does host identification mean? host is server or client? as a rule, the host is more often used in the meaning of the server.

Host - any device that provides services in the "client-server" format in server mode over some interfaces and is uniquely identified on these interfaces.
There is a host and there is a client. Unambiguous identification of the host on the client occurs using HSTS technologies, for example))
Think logically. Anything js can access on the client - is it atomically unique to a particular device or profile? No. There are at least two identical devices in the world in terms of JS sensors, buy two identical devices from the same batch, install the same software and try to distinguish them. This will no longer make it possible to make a statistically 100% effective system for uniquely identifying a device in a system without the use of authentication technologies. Another question now is what kind of efficiency you need. This is first, moving away from the topic. And secondly, returning, again, we conclude that a computer is not a person, it does not have a unique fingerprint or retina for each fingerprint.
Look towards ready-made solutions, do not reinvent the wheel. You won't get 100% uniqueness.
https://habr.com/ru/company/oleg-bunin/blog/321294/

X
xmoonlight, 2021-01-12
@xmoonlight

The host is embedded in the host's session token immediately after two-factor authentication.
Using client authorization data with an invalid host becomes simply impossible.
("I'm going as best I can")

Didn't find what you were looking for?

Ask your question

Ask a Question

731 491 924 answers to any question