snf Posted November 2, 2015 Share Posted November 2, 2015 You can try test here :https://html5test.com/index.html Link to comment Share on other sites More sharing options...
Pequi Posted November 2, 2015 Share Posted November 2, 2015 Requires Javascript, which is suicide if you frequent certain sitesThis one does not:http://whatsmyuseragent.com/ Link to comment Share on other sites More sharing options...
CODYQX4 Posted November 2, 2015 Share Posted November 2, 2015 Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique. Link to comment Share on other sites More sharing options...
dcs18 Posted November 2, 2015 Share Posted November 2, 2015 For Spoofer of User-Agent , site can detect you're spoofing !It could not detect my spoofed User-Agent. :think: Link to comment Share on other sites More sharing options...
straycat19 Posted November 3, 2015 Share Posted November 3, 2015 For Spoofer of User-Agent , site can detect you're spoofing !It could not detect my spoofed User-Agent. :think:LOL, mine neither. Link to comment Share on other sites More sharing options...
CODYQX4 Posted November 3, 2015 Share Posted November 3, 2015 It's possible their "spoof" detection looks at the JS navigator object. My User Agent extension spoofs that too.That's how they could check the HTTP Header in the simplest way, but every spoofer I've used handled the Navigator object. Link to comment Share on other sites More sharing options...
Whi5t1eR Posted November 3, 2015 Share Posted November 3, 2015 Some of you may (or may not) be interested in Random Agent Spoofer, it is a privacy enhancing firefox addon which aims to hinder browser fingerprinting. It does this by changing the browser/device profile on a timer.https://addons.mozilla.org/en-US/firefox/addon/random-agent-spoofer/Also Peter Eckersley from the EFF wrote a good paper called "how unique is your web browser" which you may like.https://panopticlick.eff.org/browser-uniqueness.pdf Link to comment Share on other sites More sharing options...
zavana Posted November 4, 2015 Share Posted November 4, 2015 Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox. For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique. More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable. Link to comment Share on other sites More sharing options...
CODYQX4 Posted November 4, 2015 Share Posted November 4, 2015 Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable.A sufficiently advanced tracking JS file (and I'd assume most of them can do this), would just check your browser for inconsistencies.I'd think even the rarest UA is less unique than someone trying to be the most common browser. Really, only Tor Browser can pull it off because everyone is using the exact same config/browser and they disable as much OS leaking as possible. Link to comment Share on other sites More sharing options...
zavana Posted November 4, 2015 Share Posted November 4, 2015 Even without JavaScript, I hear that the actual HTTP Header order is different between Chrome and Firefox.For all the masking I do, I leave my User-Agent alone. I'm sure the fact I run Chrome on OS X makes me a small sample, but running Chrome on OS X while lying to be Firefox makes me all but unique.More unique, more trackable. I suppose the general idea of spoof UA is blend into the suitable common crowd, less fingerprints, less detectable.A sufficiently advanced tracking JS file (and I'd assume most of them can do this), would just check your browser for inconsistencies.I'd think even the rarest UA is less unique than someone trying to be the most common browser. Really, only Tor Browser can pull it off because everyone is using the exact same config/browser and they disable as much OS leaking as possible.Agreed on Tor Browser and likewise a rare UA would place you stand-out among the commoners.https://panopticlick.eff.org/ Link to comment Share on other sites More sharing options...
Recommended Posts
Archived
This topic is now archived and is closed to further replies.