Passive OS fingerprinting

There is a problem that is often asked by our community. It is about passive OS Fingerprinting. We would like to tell you what is the problem exactly and how you can solve it.

Many privacy fans prefer to check their Browser Fingerprint configuration on the whatleaks.com website. It is an okay website with a couple of false-positive alerts. There is also an issue that we should talk about. It is the Passive OS fingerprinting.

Passive OS Fingerprinting is a method of how a web server can decide the visitor machine’s OS. It cannot be spoofed with Kameleo or other Privacy Tools. It can tell with a good percentage if the machine that connects to the server is a Windows or a Mac OS X simply analyzing the network packets' size. If you are using a Proxy it will show your proxy’s machine’s OS.

Kameleo-Passive-OS-Fingerprinting.png

In the above picture, you can see that we are using a Mac OS X Base Profile but the whatleaks.com website sees that we are connecting with a Windows machine. (Our proxy was a Windows).

Solution

Passive OS fingerprinting is not a popular technology so you don’t really have to care about it. And no website will block you just because of this. That would damage the user experience for regular users. If you really want to solve this issue you can do 2 things:

Find a matching proxy

Try until you find a proxy that matches your profile. In the above case if I would really like to use the Base Profile with Mac OS X I’ll have to search for a proxy that is also Mac OS X. There can be some proxy providers that will tell you what OS does the proxy run. Or you can just simply try until you find one.

Change your Browser Fingerprint

If you found a pretty good proxy you can just simply pick another Base Profile that will match your proxy. Windows profiles have an advantage since there are more proxies running on Windows.

Video

Check the end of the video to see it in action

Was this article helpful?
0 out of 0 found this helpful