-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Removal of some parts #6
base: master
Are you sure you want to change the base?
Conversation
Hey @zfcsoftware will check this out, but I see you removed the device memory, while not that needed, its part of fingerprinting by some tools that they catch you by reusing the same memory all the time. On which software did you see detection because of this? |
https://www.browserscan.net/en/bot-detection |
Even when these updates are made, they are mostly caught. Do you know why this happens? When I turn off the plugin, it never gets caught. 2024-04-21.18-25-54.mp4 |
From a couple of tests I have done, it mostly seems that they are using their backend API to detect it there, as it comes from an API response, but the API seems closed. They are detecting webdriver by some technique, my first guess would be a worker or something to get past. Even when disabling my plugin, there is not a lot of difference between detections. WIll need to play around a bit, but first need to find where do they get the data from |
Maybe they save the fingerprint value on the first request. 2. Since the fingerprint value is different from the same ip address on login, the browser catches it because it is the same. Another option is the line below. I will check it too, thanks for your interest. Line 178 in ad935f4
|
It functions a bit differently from initial tests, basically they are somehow getting a ton of data about the browser, but its not via that call, they are doing something that is not shown directly when visiting the website(in network tab). either an iframe or something similar |
They probably get ids like here. They are really good at detecting the same user. They can create an id here and track the entries of the same ip address for a certain period of time and detect if the id changes. |
But the id changes when you use my plugin :) And most of the IP ranges from ISPs are NAT, so basically multiple people from same ISP are using them at the same time, so that kinda wouldnt make sense for them to keep track of that with IPs. |
Just a guess :) They couldn't detect it before, I guess there was an update. I will try to find the problem too. |
I did a test on Openai. 2 wafs appear when logging in. It skips both without any problem. However, when the 2nd WAF comes out, if the fingerprint plugin is active, it detects that it is a bot. When I turn off the fingerprint plugin, it can access from the same ip address without any problem. A section in the plugin content causes detection. Many services such as Cloudflare can detect it. |
Fixes #
Proposed Changes
Hi, a couple of parts I have already added are causing it to be detected. Can you accept this pull request?