Hey, Pier! There's an issue with this test that impacts the validity of the results. Some browsers, like Gologin, don't actually add any audio noise in the fingerprint, even if you turn it on in settings. As a result, they appear superior compared to other solutions. You can confirm this by creating two Gologin profiles and comparing their audio hashes - they will be identical. Conversely, with Octo, you'll find different hashes, showcasing its proper functionality.
It would be more accurate to test all participants without the addition of audio noises. Could you include this information in the article? We're more than willing to provide further expertise to educate the community and prevent the spread of misinformation.
Hopefully, it's not a strong signal for antibots (tbh, none of the well-known use it anyway)... because adding noise to the audio fingerprint just makes you shine in the crowd. It's a fixed hash based on OS and browser, so you precompute all combinations or collect them online. Then, if you add noise, you are out of those values, which means you are lying and now marked as suspicious, gg
Is someone running these browsers at scale inside docker containers? If yes can you please share your learnings.
eg: I see there is a docker container for gologin https://github.com/gologinapp/docker but this didn't work out of the box. Also doesn't seem to have been updated in a while.
Hey, Pier! There's an issue with this test that impacts the validity of the results. Some browsers, like Gologin, don't actually add any audio noise in the fingerprint, even if you turn it on in settings. As a result, they appear superior compared to other solutions. You can confirm this by creating two Gologin profiles and comparing their audio hashes - they will be identical. Conversely, with Octo, you'll find different hashes, showcasing its proper functionality.
It would be more accurate to test all participants without the addition of audio noises. Could you include this information in the article? We're more than willing to provide further expertise to educate the community and prevent the spread of misinformation.
Hopefully, it's not a strong signal for antibots (tbh, none of the well-known use it anyway)... because adding noise to the audio fingerprint just makes you shine in the crowd. It's a fixed hash based on OS and browser, so you precompute all combinations or collect them online. Then, if you add noise, you are out of those values, which means you are lying and now marked as suspicious, gg
Is someone running these browsers at scale inside docker containers? If yes can you please share your learnings.
eg: I see there is a docker container for gologin https://github.com/gologinapp/docker but this didn't work out of the box. Also doesn't seem to have been updated in a while.