Bootstrap.js together with fingerprint.js, there may be a many security hurdle to take.
Added by having Google's Tagmanager on on the tracking job, together with a vulnerable retirable library:
-https://fingerprintjs.com/ Detected libraries: jquery - 3.3.1 : (active1) -https://fingerprintjs.com/js/jquery.min.js bootstrap - 4.2.1 : -
-https://fingerprintjs.com/js/bootstrap.min.js Info: Severity: high -https://github.com/twbs/bootstrap/issues/28236 (active) - the library was also found to be active by running code 1 vulnerable library detected. (info credits go to luntrus)
On a side line, this for finding out about your browser's rather unique fingerprint (well over 90% accuracy) -
online demo can be found here:
https://valve.github.io/fingerprintjs2/Runt through grunt on jshint.
Another nice exanple:
https://codepen.io/run-time/pen/XJNXWV Over 90% accuracy.
Repeatedly you this will result in the same and unique fingerprint, like 1*2:083*21.
How is your uniqueness, see it here:
https://amiunique.org/fp (also idem/history)
just to establish how your fingerprint developed during history)
polonus (3rd part cold reconniassance website security analyst and website error-hunter)