Lord777
Professional
- Messages
- 2,578
- Reaction score
- 1,520
- Points
- 113
Dolphin{anty}functionality
The main task of the anti-detection browser is to bypass the anti-fraud systems of the system in order to be able to create many accounts on any site and work with them. You can do this by spoofing the browser fingerprints of our system. This anti-detection tool can replace many parameters, such as WebRTC, Canvas, WebGL, Client Rects, Time zone, language, GEO, processor, memory, screen, media, ports, and so on.Dolphin {anty} perfectly passes the test of browser fingerprint scanners, such as Pixelscan, CreepJS, and many others, which creates a reliable foundation for working with any sites
The browser has an important tool called Cookie robot, which "catches" cookies for you and saves you a lot of time. Now you don't need to go through the sites manually to fill yourself with a custom background and create the appearance of a real Internet user.
Dol Dolphin{anty} is very convenient to use, and you can use it to:
- tag your accounts;
- add browser extensions to all profiles at once by clicking the link from the Chrome store in a couple of clicks;
- add unique statuses to each profile. With them, it is easier to navigate through the many profiles and accounts inside them — which one is being farmed, which one is working, and which one is already in the bath;
- add notes for each profile. In bookmarks, you can specify, for example, information from your account: username, password, date of birth, and so on;
- save any number of proxies and manage them en masse;
- update the IP of mobile proxies directly from the anti-detection interface;
- copy profiles with fingerprint randomization. In a couple of clicks, you will create a copy of your existing profile, only with a unique fingerprint;
- configure start pages. When you start a new or existing profile, the necessary tabs with site pages will automatically open.;
- work as a team. You can set up multi-level access for each team member, and then monitor their activities;
- manage processes en masse. In a couple of clicks, you can perform actions that take a lot of time, such as launch, install, delete, transfer profiles or export cookies from them.;
- automate processes. The browser can be controlled using special automation services, such as Selenium or Puppeteer. It also has built-in automation called Scripts, where you can configure automation without knowing the code.
Prices for Dolphin{anty} fares are slightly lower than the market average. After registration, you will be able to use the browser for 4 days without any restrictions on functionality, and then all users will have access to 10 profiles absolutely free of charge.
Proxies: why they are needed and how to configure them
We can conclude that proxy is an extremely important parameter that plays a crucial role in successful multiaccounting. Proxies can vary depending on the degree of anonymity, type of placement, method of data modification, protocol used, and so on.
Mobile proxies
It's time to talk about the most popular, convenient and effective type of mobile proxy service!
Mobile proxies are proxies that work over the mobile Internet from GSM operators. All user requests on the network will pass through the mobile operator using the mobile IP address. This will allow you to use the Internet, getting all the advantages of working on a mobile network.
Due to the specifics of the mobile Internet, a mobile IP address is a unique technical solution in its parameters. Since the number of IP addresses is very limited, and there are a huge number of users of this connection. Thus, one IP address can be claimed by a thousand or even more users, which suggests the universality of such IP addresses. Simply put, if the same Facebook bans one such IP address, then too many users may be at risk of using it. This is completely illogical and not profitable for everyone, so mobile IP addresses are almost never blocked by popular sites, which is just perfect for multi-accounting
Thus, mobile proxies are a very convenient and profitable solution, because you just need to buy access to these proxies once and you will get a multi-thousandth pool of IP addresses. Yes, these proxies are more expensive and it is clear why, but the advantages are much greater. Once you open anti-detection and configure them, you can apply these proxies to any number of profiles and change the IP address directly in the browser interface. Dolphin{anty} allows you to do this as conveniently as possible in just a couple of clicks:
We think that now it is completely clear why these proxies are so loved by many users.
How to set up mobile proxies in Dolphin{anty}
Now let's set up a mobile proxy in the browser and show you how it works. For example, take the iproxy.online service, which is one of the most reliable providers of high-quality mobile proxies. Affordable prices, professional support and convenient-the admin panel will delight you. Let's start setting it up.
1. Click on the appropriate Proxy menu icon in the browser's sidebar:
2. Next, click on the " + " sign in the upper-right corner:
3. In the menu that opens, paste the proxy data into the rectangular text box on the right. If you want to add multiple proxies at once, write them in the column. When the data is entered, click on the"Add" button:
If you use mobile proxies, add a link to change the IP address after each proxy in square brackets. In other words, your record with a mobile proxy will look like this:
socks5://info2331:ff9e4d@185.129.40.213:10424[https://iproxy.online/api-rt/changeip/PfMlxTEqDd/x6R35PPATHP92HMYFT52G]
4. To check the operation of proxies, tick them to the left of the added proxies and click on the button to check the connection:
If proxies are configured correctly and work stably, the status "Working" will appear next to them in green.
5. To change the IP of the mobile proxy, click on the button in the form of arrows on the main screen next to the desired profile:
If the IP address was successfully changed, the information about it will be updated immediately.
At this stage, the proxy configuration is complete and they are ready to work. In the same way, you can add and save an unlimited number of any proxy and, of course, use them for your own tasks.