Comment by 0cf8612b2e1e
1 day ago
How robust is that identification? Does it just look for file hashes or identical character shapes? I imagine it is trivial to repackage a font file to break the hash fingerprint.
1 day ago
How robust is that identification? Does it just look for file hashes or identical character shapes? I imagine it is trivial to repackage a font file to break the hash fingerprint.
No comments yet
Contribute on Hacker News ↗