Logs: real Fingerprint vs. Generated Fingerprint.

kasper2

Carder
Messages
51
Reputation
0
Reaction score
11
Points
8
I know real fingerprint beats antifraud and can log into gmail, bank account social media ect. My question is generated fingerprint fresh log from genesis.market with (500 - 2000+ cookies) enough to gain email access ect.
Thanks in advance, this would help me out so much. :))
 

Mutt

Professional
Messages
1,057
Reputation
7
Reaction score
595
Points
113
Real Fingerprints and Generated Fingerprint - how to get around them
The real fingerprint of the user's device is memorized by the anti-fraud system on a specific site on which he made a payment or performed certain actions.
If the order was successful and the chargeback was not received, then this fingerprint is assigned a "trust" status, that is, the status of a "reliable" user, and this work from this account appears to be more successful with further payment.

The generated fingerprints are only needed to work with different accounts from one device, the generated fingerprints are installed in the antidetect browser in order to emulate the visibility of different unique users.
That is, the generated financial prints are needed primarily to work with the registration and development of NEW accounts on one site or service and are not suitable for existing accounts from logs.

Of course, even if you use the generated fingerprint for existing accounts, the anti-fraud system may also approve this action, since it is assumed that the user could change the device to log into this account (for example, buy a new laptop or phone), but the system may request an additional verification, if it was connected, for example two-factor authorization by SMS (OTP) and / or confirmation by e-mail.

A real fingerprint must be received specifically for each account - banking, payment system, online store, e-mail or any service so that the anti-fraud system sees and thinks that the same person is using this account.

Materiel
Fingerprint or sometimes foorptrint is a complete digital fingerprint of a device, consisting of information about your operating system, settings, active browsers, installed plugins, etc. Such a fingerprint is presented in the form of a unique code or picture.
What is the difference from cookies? To begin with, cookies are relevant within the same domain, while fingerprint allows you to track the sources of referrals to the target site and the paths of referrals from that site. Cookies, including eternal ones, can be cleared or blocked, which, by the way, is not a laborious process. In turn, fingerprints can only be replaced.

The fingerprints we deserve.
The most common, browser-based:
  • Current IP
  • Browser headers (User Agent, HTTP, ACCEPT, Do Not Track);
  • Screen options
  • JavaScript,
  • Information about cookies and super cookies enabled or disabled in the browser;
  • Installed browser plugins, their versions and updates;

Do not think that anonymous mode or changing your browser will help maintain your privacy on the network. Anonymous mode does not block the collection of information about the computer and the operating system, and modern trackers allow you to track information from different browsers on the same hardware and easily identify the end user. This technology is called Cross-Browser.

Fingerprinting and it allows you to track:
  • Operating system
  • The number of cores in the processor
  • List of fonts and installed languages
  • Analyze responses to browser operations involving the operating system and hardware components of the computer. (rendering lines, volumetric figures, pictures, creating shadows, etc.). Such data is browser independent.

Now let's discuss how to get around this.

VPN and proxy servers
Here is short.
VPN is the easiest method to bypass regional bans. Changes your IP to the one available on the service. Does not protect against multiple trackers and does not affect already picked up cookies.
A proxy is a free spacer that does not encrypt your traffic.
Do not skimp on a good multi-channel VPN - and turn it on even when switching to a dedicated server, which we will talk about further

Browsers
Firefox is considered the most reliable. Install plugins on it:
User Agent Swither - plugin replaces browser identification.
Antidetect is a plugin similar to the previous one with more advanced settings. Paid and quite expensive.
Ghoster is a plugin that blocks analytics trackers, ads and other beacons.
Multiloginapp is a platform designed to replace different browser footprints. The program is designed to work with a large number of browser profiles. Each profile is in its own "container" and the option that history will go from one browser, cookies and fingerprints is excluded.
There are also specially assembled browsers for anonymous web surfing.
TOR is the most famous and popular of these browsers, the gateway to the darknet.
Pale Moon - open source browser based on Firefox

Manually
Manual changes can help make your digital footprint less unique.
  • Changing the time zone of the device;
  • Installing a different language for the operating system of the device;
  • Installing a different browser language;
  • Change the screen resolution of the device;
  • Changing the scale of a web page;
  • Installing or removing browser plugins
  • Disable Flash, Javascript and WebGL Execution
Radical methods, but extremely inconvenient for surfing.

Dedicated servers (RDP)
The use of Dedicated Servers (from the word dedicated server) is still considered one of the most effective ways to maintain your anonymity. It is a separate physical machine from which no data is transferred to your main and work.
Pros: Configuring an HTTP / SOCKS proxy or SSH / VPN connection to choose from; Control of the history of requests; Rescues when attacking through Flash, Java, JavaScript, if you use a remote browser;
Cons: Relatively high cost Technical knowledge required to set up correctly
The main reason for the popularity and effectiveness of this method is that such a virtual computer is completely new and clean for the Internet, it works around the clock and does not transmit any information about the end user and the characteristics of his computer (they say Facebook even tracks the MAC address)

Some more useful things:
Blocking ourselves from Google Analytics tracking
Many people use the popular CloudFlare service to cover their PBN tracks. However, the service cannot be considered a panacea for moderation.
In this blog are well described CloudFlare footprint and how to treat them.

Test
After all the manipulations, you need to check all the current footprints that your browser sends. These sites contain all relevant information at the moment.
Check each profile when using Multiloginapp:
  • Whoer.net
  • Panopticlick.eff.org
  • Browserleaks.com
  • Audiofingerprint.openwpm.com

Conclusions
The modern Internet collects a huge database of information about each of its users. This is mainly done by various analytics sites, which is completely harmless. Some collect social information for the organization and the state, which is also not scary, unless of course you are involved in serious crime. For ordinary affiliates who earn their bread on the Internet, you need to go through various moderations - Google, Facebook, etc. The Internet society actively creates and promotes a variety of tools to preserve online privacy, which, on the one hand, protect against fraudsters, and on the other hand, help to circumvent the rules for advertisers.
Even if you work in white niches and are not going to break any rules, it will not be superfluous to use the described tools and their analogues for comfortable and secure work on the network. VPN allows you to save on services that offer different prices for their products to different GEOs, multi-profile platforms allow you to organize and effectively manage a large number of accounts at the same time, dedicated servers make it possible to safely test different bundles and adapt the product to different technical requirements.
For those who confidently possess the skills of cloaking or raise their nets, and now, after reading the article, have strengthened their positions in safety. After all, it seems that the VPN-VDS-Multiloginapp-VPN bundle will never lose its relevance.
 

kasper2

Carder
Messages
51
Reputation
0
Reaction score
11
Points
8
Thanks again mutt, your explanation is always on point. This helped me out alot.
 
Top