This document discusses new browser fingerprinting techniques that can track users across devices and browsers to evade ad blocking. It describes how abusing HTTP Public Key Pinning, HTTP Strict Transport Security, and Content Security Policy can be used to fingerprint users based on timing differences between first-time and repeated site visits. Specifically, it shows how measuring the latency of an HTTP to HTTPS redirect allows distinguishing if a user has visited a site before or not. This fingerprint can persist across cookie clearing and identifies users in new ways that are harder for blocking tools to prevent.