• @Simpletim
      link
      English
      41 year ago

      I don’t know the exact modus operandi, but usually this is achieved by using some “phone home” mechanism which sends a device identifier (to ensure uniqueness) along with an OS version (and maybe some other fingerprints to ensure integrity of the data - like a hash of CPU hardware, etc).