Engineering Articles

Audio fingerprinting: What it is + how it works with Web API
July 9, 2025

Audio fingerprinting: What it is + how it works with Web API

Learn how audio fingerprinting, a highly stable browser fingerprinting technique, is used to uniquely identify visitors without cookies.

How to detect a VPN to prevent fraud in 2025
July 3, 2025

How to detect a VPN to prevent fraud in 2025

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

Demo: Exploiting leaked timestamps from Google Chrome extensions
October 30, 2024

Demo: Exploiting leaked timestamps from Google Chrome extensions

In this demo, learn how Chromium extensions are unintentionally exposing an exploit that can be used to track a user’s activity across multiple websites.

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection
March 6, 2024

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection

Explore how Safari 17’s new anti-fingerprinting techniques affect audio fingerprinting and browser differentiation.

The limits of JA3: Why it’s not enough for accurate device identification
October 26, 2023

The limits of JA3: Why it’s not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

Account Sharing: The Step-By-Step Prevention Guide
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.

Demo: How apps can hide clipboard data copying on Android 14
October 16, 2023

Demo: How apps can hide clipboard data copying on Android 14

Your clipboard data on Android 14 might be at risk. See how to protect your information with our guide.

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
July 13, 2023

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS

Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.

Building Efficient Software Products In Uncertain Times
November 18, 2022

Building Efficient Software Products In Uncertain Times

Optimize your software development process for cost efficiency with practical considerations and changes.

Overview of iOS fraud detection APIs and device fingerprinting
May 9, 2022

Overview of iOS fraud detection APIs and device fingerprinting

Discuss iOS application security techniques, their pros and cons, and alternative fraud detection approaches.

 Storing Anonymous Browsing Preferences Using Browser Fingerprinting
March 22, 2022

Storing Anonymous Browsing Preferences Using Browser Fingerprinting

Discover how Fingerprint works, its use cases, and how to implement dark mode for remembering users’ preferences.