diff --git a/contents/js/fingerprint.js b/contents/js/fingerprint.js
new file mode 100644
index 0000000..d26da1b
--- /dev/null
+++ b/contents/js/fingerprint.js
@@ -0,0 +1,136 @@
+/*
+* fingerprintJS 0.3 - Fast browser fingerprint library
+* https://github.com/Valve/fingerprintjs
+* Copyright (c) 2013 Valentin Vasilyev (iamvalentin@gmail.com)
+* Licensed under the MIT (http://www.opensource.org/licenses/mit-license.php) license.
+*/
+/*jslint browser: true, indent: 2 */
+(function(scope) {
+ 'use strict';
+
+ var Fingerprint = function(hasher){
+ var nativeForEach = Array.prototype.forEach;
+ var nativeMap = Array.prototype.map;
+ this.each = function(obj, iterator, context) {
+ if(obj === null) return;
+ if(nativeForEach && obj.forEach === nativeForEach) {
+ obj.forEach(iterator, context);
+ } else if (obj.length === +obj.length) {
+ for (var i = 0, l = obj.length; i < l; i++) {
+ if (iterator.call(context, obj[i], i, obj) === {}) return;
+ }
+ } else {
+ for (var key in obj) {
+ if (obj.hasOwnProperty(key)) {
+ if (iterator.call(context, obj[key], key, obj) === {}) return;
+ }
+ }
+ }
+ };
+ this.map = function(obj, iterator, context) {
+ var results = [];
+ if (obj == null) return results;
+ if (nativeMap && obj.map === nativeMap) return obj.map(iterator, context);
+ this.each(obj, function(value, index, list) {
+ results[results.length] = iterator.call(context, value, index, list);
+ });
+ return results;
+ };
+
+ if(hasher){
+ this.hasher = hasher;
+ }
+ }
+
+ Fingerprint.prototype = {
+
+ get: function(){
+ var keys = [];
+ keys.push(navigator.userAgent);
+ keys.push(navigator.language);
+ keys.push(screen.colorDepth);
+ keys.push(new Date().getTimezoneOffset());
+ keys.push(!!window.sessionStorage);
+ keys.push(!!window.localStorage);
+ var pluginsString = this.map(navigator.plugins, function(p){
+ var mimeTypes = this.map(p, function(mt){
+ return [mt.type, mt.suffixes].join('~');
+ }).join(',');
+ return [p.name, p.description, mimeTypes].join('::');
+ }, this).join(';');
+ keys.push(pluginsString);
+ if(this.hasher){
+ return this.hasher(keys.join('###'), 31);
+ } else {
+ return this.murmurhash3_32_gc(keys.join('###'), 31);
+ }
+ },
+
+ /**
+ * JS Implementation of MurmurHash3 (r136) (as of May 20, 2011)
+ *
+ * @author Gary Court
+ * @see http://github.com/garycourt/murmurhash-js
+ * @author Austin Appleby
+ * @see http://sites.google.com/site/murmurhash/
+ *
+ * @param {string} key ASCII only
+ * @param {number} seed Positive integer only
+ * @return {number} 32-bit positive integer hash
+ */
+
+ murmurhash3_32_gc: function(key, seed) {
+ var remainder, bytes, h1, h1b, c1, c1b, c2, c2b, k1, i;
+
+ remainder = key.length & 3; // key.length % 4
+ bytes = key.length - remainder;
+ h1 = seed;
+ c1 = 0xcc9e2d51;
+ c2 = 0x1b873593;
+ i = 0;
+
+ while (i < bytes) {
+ k1 =
+ ((key.charCodeAt(i) & 0xff)) |
+ ((key.charCodeAt(++i) & 0xff) << 8) |
+ ((key.charCodeAt(++i) & 0xff) << 16) |
+ ((key.charCodeAt(++i) & 0xff) << 24);
+ ++i;
+
+ k1 = ((((k1 & 0xffff) * c1) + ((((k1 >>> 16) * c1) & 0xffff) << 16))) & 0xffffffff;
+ k1 = (k1 << 15) | (k1 >>> 17);
+ k1 = ((((k1 & 0xffff) * c2) + ((((k1 >>> 16) * c2) & 0xffff) << 16))) & 0xffffffff;
+
+ h1 ^= k1;
+ h1 = (h1 << 13) | (h1 >>> 19);
+ h1b = ((((h1 & 0xffff) * 5) + ((((h1 >>> 16) * 5) & 0xffff) << 16))) & 0xffffffff;
+ h1 = (((h1b & 0xffff) + 0x6b64) + ((((h1b >>> 16) + 0xe654) & 0xffff) << 16));
+ }
+
+ k1 = 0;
+
+ switch (remainder) {
+ case 3: k1 ^= (key.charCodeAt(i + 2) & 0xff) << 16;
+ case 2: k1 ^= (key.charCodeAt(i + 1) & 0xff) << 8;
+ case 1: k1 ^= (key.charCodeAt(i) & 0xff);
+
+ k1 = (((k1 & 0xffff) * c1) + ((((k1 >>> 16) * c1) & 0xffff) << 16)) & 0xffffffff;
+ k1 = (k1 << 15) | (k1 >>> 17);
+ k1 = (((k1 & 0xffff) * c2) + ((((k1 >>> 16) * c2) & 0xffff) << 16)) & 0xffffffff;
+ h1 ^= k1;
+ }
+
+ h1 ^= key.length;
+
+ h1 ^= h1 >>> 16;
+ h1 = (((h1 & 0xffff) * 0x85ebca6b) + ((((h1 >>> 16) * 0x85ebca6b) & 0xffff) << 16)) & 0xffffffff;
+ h1 ^= h1 >>> 13;
+ h1 = ((((h1 & 0xffff) * 0xc2b2ae35) + ((((h1 >>> 16) * 0xc2b2ae35) & 0xffff) << 16))) & 0xffffffff;
+ h1 ^= h1 >>> 16;
+
+ return h1 >>> 0;
+ }
+ }
+
+ scope.Fingerprint = Fingerprint;
+})(window);
diff --git a/contents/writing/about/browser-fingerprinting/index.md b/contents/writing/about/browser-fingerprinting/index.md
new file mode 100644
index 0000000..4a107ee
--- /dev/null
+++ b/contents/writing/about/browser-fingerprinting/index.md
@@ -0,0 +1,107 @@
+---
+title: Browser Fingerprinting
+author: Brett Langdon
+date: 2013-06-05
+template: article.jade
+---
+
+Ever want to know what browser fingerprinting is or how it is done?
+
+---
+
+## What is Browser Fingerprinting?
+
+A browser or device fingerprint
+is a term used to describe an identifier generated from information retrieved from
+a single given device that can be used to identify that single device only.
+For example, as you will see below, browser fingerprinting can be used to generate
+an identifier for the browser you are currently viewing this website with.
+Regardless of you clearing your cookies (which is how most third party companies
+track your browser) the identifier should be the same every time it is generated
+for your specific device/browser. A browser fingerprint is usually generated from
+the browsers user agent,
+timezone offset, list of installed plugins, available fonts, screen resolution,
+language and more. The EFF did
+a study
+on how unique a browser fingerprint for a given client can be and which browser
+information provides the most entropy. To see how unique your browser is please
+check out their demo application
+Panopticlick.
+
+## What can it used for?
+
+Ok, so great, but who cares? How can browser fingerprinting be used? Right now
+the majority of user tracking
+is done by the use of cookies. For example, when you go to a website that has
+[tracking pixels](http://brett.is/writing/about/third-party-tracking-pixels/)
+(which are “invisible” scripts or images loaded in the background of the web page)
+the third party company receiving these tracking calls will inject a cookie into
+your browser which has a unique, usually randomly generated, identifier that is
+used to associate stored data about you like collected
+site or search retargeting
+data. This way when you visit them again with the same cookie they can lookup
+previously associated data for you.
+
+So, if this is how it is usually done why do we care about browser fingerprints?
+Well, the main problem with cookies is they can be volatile, if you manually delete
+your cookies then the company that put that cookie there loses all association with
+you and any data they have on your is no longer useful. As well, if a client does
+not allow third party cookies (or any cookies) on their browser then the company
+will be unable to track the client at all.
+
+A browser fingerprint on the other hand is a more constant way to identify a given
+client, as long as they have javascript enabled (which seems to be a thing which
+most websites cannot properly function without), which allows the client to be
+identified even if they do not allow cookies for their browser.
+
+##How do we do it?
+
+Like I mentioned before to generate a browser fingerprint you must have javascript
+enabled as it is the easiest way to gather the most information about a browser.
+Javascript gives us access to things like your screen size, language, installed
+plugins, user agent, timezone offset, and other points of interest. This
+information is basically smooshed together in a string and then hashed to generate
+the identifier, the more information you can gather about a single browser the more
+unique of a fingerprint you can generate and the less collision you will have.
+
+Collision? Yes, if you end up with two laptops each of the same make, model, year,
+os version, browser version with the exact same features and plugins enabled then
+the hashes will be the exact same and anyone relying on their fingerprint will
+treat both of those devices as the same. But, if you read the white paper by EFF
+listed above then you will see that their method for generating browser fingerprints
+is usually unique for almost 3 million different devices. There may be some cases
+for companies where that much uniqueness is more than enough to use and rely on
+fingerprints to identify devices and others where they have more than 3
+million users.
+
+Where does this really come into play? Most websites usually have their users
+create and account and log in before allowing them access to portions of the site or
+to be able to lookup stored information, maybe their credit card payment
+information, home address, e-mail address, etc. Where browser fingerprints are
+useful is for trying to identify anonymous visitors to a web application. For
+example, [third party trackers](/writing/about/third-party-tracking-pixels/)
+who are collecting search or other kinds of data.
+
+## Some Code
+
+Their is a project on github
+by user Valentin Vasilyev (Valve)
+called fingerprintjs
+which is a client side javascript library for generating browser fingerprints.
+If you are interested in seeing some production worthy code of how to generate
+browser fingerprints please take a look at that project, it uses information like
+useragent, language, color depth, timezone offset, whether session or local storage
+is available, a listing of all installed plugins and it hashes everything using
+murmurhash3.
+
+## Your fingerprintjs Fingerprint: *Could not generate fingerprint*
+
+
+
+
+**Resources:**
+* panopticlick.eff.org - find out how rare your browser fingerprint is.
+* github.com/Valve/fingerprintjs - client side browser fingerprinting library.