You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[CanvasLab](getting-started/CANVASLAB.md)| Record Canvas 2D, WebGL, and WebGL2 API calls to study tracking techniques and verify fingerprint protection. |
22
22
|[AudioLab](getting-started/AUDIOLAB.md)| Record Web Audio API calls to study audio fingerprint collection and verify audio privacy protection. |
Each tool reports a trust score or consistency status. A properly configured BotBrowser instance should show consistent fingerprint data across all reported properties.
39
+
Each tool reports either a trust score or detailed signal output. A properly configured BotBrowser instance should show consistent fingerprint data across all reported properties.
42
40
43
41
---
44
42
@@ -59,14 +57,14 @@ BotBrowser profiles define all of these properties consistently at the browser e
59
57
When you switch to a new profile version, run one fast pass first:
60
58
61
59
1. Launch with only `--bot-profile` and `--proxy-server`.
62
-
2. Open CreepJS and BrowserScan.
60
+
2. Open CreepJS and BrowserLeaks.
63
61
3. Confirm no obvious mismatch before adding advanced flags.
64
62
65
63
### Regression check before production rollout
66
64
67
65
Use the same machine, profile, and proxy to compare before/after results:
68
66
69
-
1. Capture screenshots from CreepJS, Iphey, and Pixelscan.
67
+
1. Capture screenshots from CreepJSand BrowserLeaks.
70
68
2. Save launch args used for each run.
71
69
3. Diff results and investigate any new mismatch signals.
72
70
@@ -121,31 +119,14 @@ await browser.close();
121
119
```
122
120
123
121
<aid="iphey"></a>
124
-
### Iphey
122
+
<aid="browserleaks"></a>
123
+
### BrowserLeaks
125
124
126
-
**URL:**`https://iphey.com/`
125
+
**URL:**`https://browserleaks.com/`
127
126
128
-
Iphey provides a straightforward pass/fail assessment with detailed breakdown by category.
127
+
BrowserLeaks is useful for drilling into individual fingerprint surfaces such as Canvas, WebGL, fonts, WebRTC, timezone, and headers.
129
128
130
-
Look for a green "Trusted" badge with all categories showing green checkmarks.
131
-
132
-
<aid="pixelscan"></a>
133
-
### Pixelscan
134
-
135
-
**URL:**`https://pixelscan.net/`
136
-
137
-
Pixelscan displays a consistency status for browser properties and network location.
138
-
139
-
Look for "Consistent" status across all tested categories with no mismatches.
140
-
141
-
<aid="browserscan"></a>
142
-
### BrowserScan
143
-
144
-
**URL:**`https://www.browserscan.net/`
145
-
146
-
BrowserScan tests a broad range of fingerprint surfaces and displays results in a clear dashboard.
147
-
148
-
Look for consistent values across all fingerprint sections with no warnings or mismatches.
129
+
Look for values that match your loaded profile and proxy configuration with no obvious contradictions between sections.
Copy file name to clipboardExpand all lines: docs/guides/getting-started/PROFILE_MANAGEMENT.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,7 +31,7 @@ chromium-browser \
31
31
32
32
### 3. Verify it works
33
33
34
-
Visit [CreepJS](https://abrahamjuliot.github.io/creepjs/) or [Iphey](https://iphey.com/) to confirm the fingerprint is active. See [First Verification](FIRST_VERIFICATION.md) for a complete verification checklist.
34
+
Visit [CreepJS](https://abrahamjuliot.github.io/creepjs/) or [BrowserLeaks](https://browserleaks.com/) to confirm the fingerprint is active. See [First Verification](FIRST_VERIFICATION.md) for a complete verification checklist.
0 commit comments