Open tflnh opened 1 week ago
duplicate of #797
i not tested yet SM126 but aware about "spoofer" for user agent data. see https://github.com/win32ss/supermium/issues/831#issuecomment-2315746158
the syntax is pretty simple - specify necessary values, splitted by ;;;
in next order
typedef enum UACHSpoofType{
UA, //navigator.userAgent, well complex composite value
UACHCustomName, //navigator.userAgentData.brands
UACHCustomVersion, //major browser version(left-most digits until first dot)
UACHCustomFullVersion, //full browser version, but i prefer UA-like reduced version (major.0.0.0)
UACHCustomPlatform, // Android, Chrome OS, Fuchsia, iOS, Linux, macOS, Windows, Unknown
UACHCustomPlatformVersion, // Win7-: 0.0.0; Win7: 0.1.0; Win8: 0.2.0; Win8.1: 0.3.0; Win10: 1.0.0 - 10.0.0; Win11: 13.0.0 - ?.0.0
UACHCustomModel, // on desktop usually blank, something like Pixel 2XL
UACHCustomArchitecture, // NOT a bittness, x86 (intel/amd win always), x86_x64 (not on win), ARM, [arm64-v8a, armeabi-v7a, armeabi]
UACHCustomBitness, // 32 or 64, not x64, not x86
UACHCustomIsMobile,
UACHCustomWOW64, // true if 32-bit browser run on 64-bit OS, not vice-versa 😏
//UACHCustomFormFactor // not present, so spoofing is problematic; Desktop, Automotive, Mobile, Tablet, XR, VR, EInk, Watch
}UACHSpoofType;
if you capable to read code see user_agent_utils.cc
but i assume that issue is not related to UACHs cuz cloudflare check not passed by browser on XP x64 SP2 with correctly spoofed ALL POSSIBLE UACHs via extension, includes workers!, while 7 with exactly same spoofed UACHs pass it without any errors
cloudfare sites could not identify user as human being
Steps to reproduce the behavior:
Desktop (please complete the following information):