Identifying tokens and random addresses, meant to create anonymity, do not change in sync on some devices — opening an attack vector. Read more