A node may be fingerprinted by submitting a unique block to that node, in a weak chain, and then later requesting it. Usually the attack involves submitting a low-PoW block at 2009-era height to an active, up-to-date node.
Solution: do not serve never-in-the-best-chain blocks, or a similar solution.