• @Simpletim
    link
    English
    41 year ago

    I don’t know the exact modus operandi, but usually this is achieved by using some “phone home” mechanism which sends a device identifier (to ensure uniqueness) along with an OS version (and maybe some other fingerprints to ensure integrity of the data - like a hash of CPU hardware, etc).