Engineering Articles

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection
March 6, 2024

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection

Learn how Apple Safari 17's new anti-fingerprinting techniques impact audio fingerprinting methods. This article will cover how audio fingerprints are generated and provide a step-by-step breakdown of how to adapt traditional audio fingerprinting techniques for improved browser differentiation.

The Limits of JA3 - What it is, why it's not enough for accurate device identification
October 26, 2023

The Limits of JA3 - What it is, why it's not enough for accurate device identification

Learn what JA3 fingerprinting is, how it works, why it's used for device identification, and how it's not enough for a comprehensive device identification strategy--and what is enough for accurate and robust device identification.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

How to Increase Revenue by Identifying & Preventing Account Sharing
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Account sharing has a significant impact on revenue and security. This tutorial will show you how to detect it, allowing you to address the issue and potentially convert users into paying customers.

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14
October 16, 2023

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14

Sensitive clipboard data on Android 14 devices may be compromised without your consent or knowledge. Learn more about this security issue with a full demonstration and discover how you can limit app access and protect your data.

vpn-detection icon
September 22, 2023

What is VPN Detection? How to detect a VPN with an API

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
July 13, 2023

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS

Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.

cost savings in software development
November 18, 2022

Building Efficient Software Products In Uncertain Times

Software development processes are an unexpected yet efficient way organizations can save money on time, which can have enormous benefits for teams of all sizes. Expanding your product doesn’t always need to mean overwhelming rising costs. We discuss some considerations you can take in your development processes with only a few changes.

illustration of a phone on an orange background
May 9, 2022

An Overview of iOS Fraud Detection APIs and Device Fingerprinting Techniques

Discussing existing techniques and APIs native to iOS that allow developers to harden application security. It weighs all the main pros and cons of methods that are provided by Apple and covers an alternative approach that is successfully deployed in our fraud detection solutions on other platforms.

illustration of incognito browser window
March 22, 2022

Storing Anonymous Browsing Preferences Using Browser Fingerprinting

Let's take a look at how Fingerprint works and some of its use cases, followed by a tutorial on implementing dark mode to demonstrate how to remember anonymous users’ cloaked preferences.

device fingerprinting accuracy
February 16, 2022

Why is 99.5% accuracy important for preventing fraud?

Fingerprint Pro's visitorID is the most accurate device identifier available. Learn why this matters when it comes to catching fraudsters and protecting your online business.

Safari 15 IndexDB API vulnerability
January 14, 2022

Exploiting IndexedDB API information leaks in Safari 15

In this article we discuss a software bug introduced in Safari 15’s implementation of the IndexedDB API that lets any website track your internet activity and even reveal your identity.