Cross-device tracking. Deanonymization of users of Tor, VPN, proxy using sound beacons
What you can find out based on the photos on the network.
Timing attack. How the special services deanonymize the users of messengers
How the FBI obtains authentic IP addresses of criminals using Tor, VPN or proxy
Deanonymization of VPN and proxy users through the User agent and browser fingerprints
Deanonymization of Tor users through bait files
How to get a Telegram-linked mobile number
De-anonymization of users of messengers using P2P-connection