lexiforest / curl_cffi

Python binding for curl-impersonate via cffi. A http client that can impersonate browser tls/ja3/http2 fingerprints.
https://curl-cffi.readthedocs.io/
MIT License
2.1k stars 249 forks source link

Is it possible to get ja3 fingerprint randomly? #21

Closed pengyanbing84 closed 1 year ago

perklet commented 1 year ago

Yes, with the release of extension permutation in chrome 110, the ja3 fingerprint is already random if you set impersonate=chrome110.

If all you wish is only to set a different fingerprint in different requests, then it’s better to use a library like httpx, which is much more mature than curl_cffi.

However, AFAIK, most websites use an allowlist, not a blocklist to filter out bot traffic. So I don’t think random ja3 fingerprints would work in the wild.