Engineering Articles

Demo: Exploiting leaked timestamps from Google Chrome extensions
October 30, 2024

Demo: Exploiting leaked timestamps from Google Chrome extensions

In this demo, learn how Chromium extensions are unintentionally exposing an exploit that can be used to track a user’s activity across multiple websites.

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection
March 6, 2024

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection

Explore how Safari 17’s new anti-fingerprinting techniques affect audio fingerprinting and browser differentiation.

The limits of JA3: Why it’s not enough for accurate device identification
October 26, 2023

The limits of JA3: Why it’s not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

Account Sharing: The Step-By-Step Prevention Guide
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.

Demo: How apps can hide clipboard data copying on Android 14
October 16, 2023

Demo: How apps can hide clipboard data copying on Android 14

Your clipboard data on Android 14 might be at risk. See how to protect your information with our guide.

What is VPN detection? How to detect a VPN with an API
September 22, 2023

What is VPN detection? How to detect a VPN with an API

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
July 13, 2023

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS

Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.

Building Efficient Software Products In Uncertain Times
November 18, 2022

Building Efficient Software Products In Uncertain Times

Optimize your software development process for cost efficiency with practical considerations and changes.

Overview of iOS fraud detection APIs and device fingerprinting
May 9, 2022

Overview of iOS fraud detection APIs and device fingerprinting

Discuss iOS application security techniques, their pros and cons, and alternative fraud detection approaches.

 Storing Anonymous Browsing Preferences Using Browser Fingerprinting
March 22, 2022

Storing Anonymous Browsing Preferences Using Browser Fingerprinting

Discover how Fingerprint works, its use cases, and how to implement dark mode for remembering users’ preferences.

Product Update - November 2021
November 8, 2021

Product Update - November 2021

Learn about all the new features and updates for Fingerprint Pro as of November 2021.