Skip to content

Latest commit

 

History

History
3 lines (2 loc) · 260 Bytes

How your data is protected.md

File metadata and controls

3 lines (2 loc) · 260 Bytes

How your data is protected

Yes, Filter Lock uses invasive fingerprinting methods, but it remains trustful by its users due to the fingerprints being hashed and in order to get the Browser Fingerprint hash it requires the Network Fingerprint to match first.