Closed prescience-data closed 4 years ago
Out of interest, is anyone obfuscating the scripts they inject into the main context with something like: https://github.com/javascript-obfuscator/javascript-obfuscator
It doesn't address the actual problem in the method, but I imagine it would make it a damn bit harder?
Right now canvas fingerprint starting to get detected from browser validations. Multilogin team(im not the team lul) right now is on research for new tech called natural canvas fingerprint that the goal can spoof the javascripts/browser fingerprint from the browser perfectly. The point is not to mimic it but make it same so there is no way serverside can detect at least until few year again lul like first time antidetect browser
The aim of the post wasn't about canvas part of the problem, it was the mutation observers that are monitoring scripts injected into the page and searching for patterns / signatures, then undoing the changes (ie undoing deletion of webdriver etc).
My first "quick and dirty" solution is to obfuscate the code being injected, but that adds a ton of overhead at runtime or at the very least, adds an annoying build process every time you make a change to your code, so clearly that's not optimal.
Upon testing this here https://github.com/prescience-data/prescience-data.github.io/blob/master/execution-monitor.html#L32 I no longer believe this is an issue.
Reading over this (2018) method of extracting canvas noise vectors is interesting, as I can see it would potentially be trivial to abstract that technique out to catch scripts injected into the main execution context (and potentially reverse them).
https://antoinevastel.com/tracking/2018/07/01/eval-canvasdef.html
The concerning parts:
Does anyone know if this has this been handled since then? Ie is there a way to hide the injections from the Mutation Observer API?