From https://panopticlick.eff.org/ I have come to understand webGL - GPU - and audio content - audio in hardware - are the most unique parameters / hard to mess with. Have you guys seen more success spoofing these or leaving them as is and are they device unique or computer model specific?
The complete step-by-step guide to get back to selling today!
I stopped using that tool since for me it's kinda useless. No matter how you tweak your browser, that tool will simply detect that you are not secured.
Understood, even with other tools browserleaks.com for example it seems like GPU / WebGL hash is the bottleneck of using VMs as it can't be spoofed or altered easily. Do you have any insights into how to solve this / use VM's without detection that you are using VM?
If using VM, the harddrive comes up as virtual and the mouse and other stuff
You need to go into the VM settings / regisrty and manually change it all so it looks like a real machine
Go into your device manage on your VM ware and you will see the list of devices that show up as virtual.... you need to change / spoof all of them
How is this done - can you link any resources/tuts?, and what VMware model supports this - would this work for a regular Macbook pro, or is this device-specific in your experience?
How is this done - can you link any resources/tuts?, and what VMware model supports this - would this work for a regular Macbook pro, or is this device-specific in your experience?
I saw a youtube video a few months ago
Some security expert was showing how to do it
I cant find the vid at the moment
The guys name is Jim Browning on youtube
The Following User Says Thank You to FirstorLast For This Useful Post:
Seems we might need a 'browser fingerprint' section here in the forum.
By the way I found the more changes you make in browser the worse off you become as far as stealth goes. It's much better to try and blend in rather than hide.
I agree. If you are using Virtual Machine software, there is no need to change anything. Everything is virtual and not the identity of the host computer. However, you still need to get a IP then your old one, and there are several methods that seem to work best, such as IPBurger or a tethered cell phone that never been used on the selling platform. Make sure the cell phone is not connected to your old WIFI and is communicating directly with the cell phone service provider.
The Following User Says Thank You to NLS For This Useful Post: