Alternative privacy front-end for reading: I Know Which Device You Used Last Summer: Fingerprinting WhatsApp Users’ Devices
By using the methods above, attackers can learn about their potential victim device setup. While sophisticated attackers (e.g. NSA, GRU, MOSSAD) are very different from non sophisticated actors (e.g. spouse) both can leverage these issues for their purposes.