Jump to content

For Spoofer of User-Agent , site can detect you're spoofing !


snf

Recommended Posts

  • Replies 9
  • Views 1.3k
  • Created
  • Last Reply

Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.

For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.

Link to comment
Share on other sites


For Spoofer of User-Agent , site can detect you're spoofing !

It could not detect my spoofed User-Agent. :think:

Link to comment
Share on other sites


For Spoofer of User-Agent , site can detect you're spoofing !

It could not detect my spoofed User-Agent. :think:

LOL, mine neither.

Link to comment
Share on other sites


It's possible their "spoof" detection looks at the JS navigator object. My User Agent extension spoofs that too.

That's how they could check the HTTP Header in the simplest way, but every spoofer I've used handled the Navigator object.

Link to comment
Share on other sites


Some of you may (or may not) be interested in Random Agent Spoofer, it is a privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer.

https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/

Also Peter Eckersley from the EFF wrote a good paper called "how unique is your web browser" which you may like.

https://panopticlick.eff.org/browser-uniqueness.pdf
Link to comment
Share on other sites


Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.

For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.

More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable.

Link to comment
Share on other sites


Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.

For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.

More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable.

A sufficiently advanced tracking JS file (and I'd assume most of them can do this), would just check your browser for inconsistencies.

I'd think even the rarest UA is less unique than someone trying to be the most common browser. Really, only Tor Browser can pull it off because everyone is using the exact same config/browser and they disable as much OS leaking as possible.

Link to comment
Share on other sites


Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.

For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.

More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable.

A sufficiently advanced tracking JS file (and I'd assume most of them can do this), would just check your browser for inconsistencies.

I'd think even the rarest UA is less unique than someone trying to be the most common browser. Really, only Tor Browser can pull it off because everyone is using the exact same config/browser and they disable as much OS leaking as possible.

Agreed on Tor Browser and likewise a rare UA would place you stand-out among the commoners.

https://panopticlick.eff.org/
Link to comment
Share on other sites


Archived

This topic is now archived and is closed to further replies.

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...