By Johannes Ullrich Battery usage to trace phones
http://arxiv.org/pdf/1502.03182v1.pdf
Fonts to trace users
http://fontfeed.com/archives/google-webfonts-the-spy-inside/
older article: http://www.itbusiness.ca/news/44120/44120
Debian Tracking Binaries Back to Source
https://twitter.com/micahflee/status/569606357239750656/photo/1
Cisco IPv6 DoS Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20150220-ipv6
Applying DShield Top 20 Using Palo Alto Network Firewall
https://isc.sans.edu/forums/diary/Subscribing+to+the+DShield+Top+20+on+a+Palo+Alto+Networks+Firewall/19365/ More Here