1
0
mirror of https://github.com/niespodd/browser-fingerprinting.git synced 2021-11-01 22:44:07 +03:00
2021-01-24 01:29:57 +01:00
2021-01-24 01:29:57 +01:00

Random, maybe useful

puppeteer-extra-plugin-stealth 😈

✔️ Win / Fail / 👔 Tie :

  • 👔 p0f - detect host OS from TCP struct - Not possible to fix via Puppeteer APIs. Used in Akamai Bot Manager to match against JS and browser headers (Client Hints and User-Agent). There is a detailed explaination of the issue. The most reliable evasion seems to be not spoofing host OS at all, or using OSfooler-ng.
  • 👔 Browser dimensions - Although stealth plugin provides window.outerdimensions evasion, it won't work without correct config on non-default OS in headless mode; almost always fails when viewport size >= screen resolution (low screen resolution display on the host).
  • core-estimator - detect mismatch between navigator.hardwareConcurrency and SW/WW execution profile - Not possible to limit/bump the ServiceWorker/WebWorker thread limit via existng Puppeteer APIs.
  • WebGL extensions profiling - desc. tbd
  • RTCPeerConnection when behind a proxy - Applies to both SOCKS and HTTP(S) proxies.
  • Performance.now - desc. tbd (red pill)
  • WebGL profiling - desc. tbd
  • Client Hints - desc. tbd
  • Behavior Detection - desc. tbd (events, params, ML+AI buzz)
  • Font fingerprinting - desc. tbd (list+version+renderer via HTML&canvas)
  • Network Latency - desc. tbd (integrity check: proxy det., JS networkinfo, dns resolv profiling&timing)
  • Battery API - desc. tbd
  • Gyroscope and other (mostly mobile) device sensors - desc. tbd

Multilogin, Kameleo, copycats and others

tbd

Languages
JavaScript 99.7%
HTML 0.3%