CarderPlanet
Professional
- Messages
- 2,552
- Reaction score
- 712
- Points
- 83
Bypassing Socks and VPNs, you can:
Test for detecting an internal IP address
Go to http://net.ipcalf.com through Firefox or Chrome, even through a VPN or socks5, it will give out internal IP addresses. This way, you can determine the presence of a Vmware virtual machine and others. An interesting example is that on USB modems, you can determine where you are (IP addresses inside nats are distributed by area).
Geolocation Detection Test
Install the Firefox browser, go to http://www.browserleaks.com/geo
If your laptop has GPS modules, your location will be determined exactly up to 20 meters. Trusted sites, including Google, can use VPNs and Sox to find out your real location without permission. Wake up, for example, Firefox, and then merges on geo.mozilla.org completely without asking, then you can be identified by your browser ID.
An E-tag is a reliable feature for detection
The browser cache is saved.
Browser Specificity Test
Try changing the headers for IE in any browser (make it as small as possible for IE) and go to https://browserleaks.com. In the Internet Explorer Features section, it will write No Internet Explorer found and it does not work out in any way, even if you change it, it will still determine that it is not IE
Profile systems / fingerprint
You can determine that you are you by a hash that is generated from a number of browser parameters (fonts, timezone, headers, javascript internals, and much more). Use your Firefox account to https://panopticlick.eff.org The point is that all bits of identifying information should be less than 20. Otherwise, you can be identified. And this means that even if you change the IP, even if you don't change it, you can be calculated.
Mass detection of various parameters
Go to fox on https://whoer.net/extended. It defines different browser parameters such as screen resolution and other things
Palevo IP via DNS
Through the DNS, you can burn your real IP without using a VPN. Go to https://www.dnsleaktest.com
Implementation in the router. Definition.
Go to http://samy.pl/mapxss/. Enter your MAC address and click Search MAC.
HTML5 Canvas Fingerprinting
Watch this video http://browserleaks.com/canvas
It's hard to get around this thing.
And that's not all, there are some things that no one will tell us.
- There are several ways to determine your real location via a VPN
- Even through a VPN, using the browser ID, Google and other offices know that you are you and what IP addresses you are changing and what you are doing
- Use the browser to determine that you are running a virtual machine, such as VMware
- You can use Socks or VPN to find out the real IP address
Test for detecting an internal IP address
Go to http://net.ipcalf.com through Firefox or Chrome, even through a VPN or socks5, it will give out internal IP addresses. This way, you can determine the presence of a Vmware virtual machine and others. An interesting example is that on USB modems, you can determine where you are (IP addresses inside nats are distributed by area).
Geolocation Detection Test
Install the Firefox browser, go to http://www.browserleaks.com/geo
If your laptop has GPS modules, your location will be determined exactly up to 20 meters. Trusted sites, including Google, can use VPNs and Sox to find out your real location without permission. Wake up, for example, Firefox, and then merges on geo.mozilla.org completely without asking, then you can be identified by your browser ID.
An E-tag is a reliable feature for detection
The browser cache is saved.
Browser Specificity Test
Try changing the headers for IE in any browser (make it as small as possible for IE) and go to https://browserleaks.com. In the Internet Explorer Features section, it will write No Internet Explorer found and it does not work out in any way, even if you change it, it will still determine that it is not IE
Profile systems / fingerprint
You can determine that you are you by a hash that is generated from a number of browser parameters (fonts, timezone, headers, javascript internals, and much more). Use your Firefox account to https://panopticlick.eff.org The point is that all bits of identifying information should be less than 20. Otherwise, you can be identified. And this means that even if you change the IP, even if you don't change it, you can be calculated.
Mass detection of various parameters
Go to fox on https://whoer.net/extended. It defines different browser parameters such as screen resolution and other things
Palevo IP via DNS
Through the DNS, you can burn your real IP without using a VPN. Go to https://www.dnsleaktest.com
Implementation in the router. Definition.
Go to http://samy.pl/mapxss/. Enter your MAC address and click Search MAC.
HTML5 Canvas Fingerprinting
Watch this video http://browserleaks.com/canvas
It's hard to get around this thing.
And that's not all, there are some things that no one will tell us.