mirror of
https://github.com/niespodd/browser-fingerprinting.git
synced 2021-11-01 22:44:07 +03:00
2.2 KiB
2.2 KiB
Random, maybe useful
- Cap FPS for Chromium with software rendering --use-gl=swiftshader - Limit CPU usage from SwiftShader by redraw freq. of Chromium in AVD
puppeteer-extra-plugin-stealth 😈
✔️ Win / ❌ Fail / 👔 Tie :
- 👔 p0f - detect host OS from TCP struct - Not possible to fix via Puppeteer APIs. Used in Akamai Bot Manager to match against JS and browser headers (Client Hints and
User-Agent). There is a detailed explaination of the issue. The most reliable evasion seems to be not spoofing host OS at all, or using OSfooler-ng. - 👔 Browser dimensions - Although stealth plugin provides
window.outerdimensionsevasion, it won't work without correct config on non-default OS in headless mode; almost always fails whenviewport size >= screen resolution(low screen resolution display on the host). - ❌ core-estimator - detect mismatch between navigator.hardwareConcurrency and SW/WW execution profile - Not possible to limit/bump the
ServiceWorker/WebWorkerthread limit via existng Puppeteer APIs. - ❌ WebGL extensions profiling - desc. tbd
- ❌ RTCPeerConnection when behind a proxy - Applies to both SOCKS and HTTP(S) proxies.
- ❌ Performance.now - desc. tbd (red pill)
- ❌ WebGL profiling - desc. tbd
- ❌ Client Hints - desc. tbd
- ❌ Behavior Detection - desc. tbd (events, params, ML+AI buzz)
- ❌ Font fingerprinting - desc. tbd (list+version+renderer via HTML&canvas)
- ❌ Network Latency - desc. tbd (integrity check: proxy det., JS networkinfo, dns resolv profiling&timing)
Multilogin, Kameleo, copycats and others
tbd