Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector. …read more

Source:: Threatpost