Engineering Articles

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection
March 6, 2024

How We Bypassed Safari 17's Advanced Audio Fingerprinting Protection

Explore how Safari 17’s new anti-fingerprinting techniques affect audio fingerprinting and browser differentiation.

The Limits of JA3 - What it is, why it's not enough for accurate device identification
October 26, 2023

The Limits of JA3 - What it is, why it's not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

How to Increase Revenue by Identifying & Preventing Account Sharing
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14
October 16, 2023

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14

Your clipboard data on Android 14 might be at risk. See how to protect your information with our guide.

vpn-detection icon
September 22, 2023

What is VPN detection? How to detect a VPN with an API

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
July 13, 2023

Demo: Brute-forcing a macOS user’s real name from a browser using mDNS

Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.

cost savings in software development
November 18, 2022

Building Efficient Software Products In Uncertain Times

Optimize your software development process for cost efficiency with practical considerations and changes.

illustration of a phone on an orange background
May 9, 2022

An Overview of iOS Fraud Detection APIs and Device Fingerprinting Techniques

Discuss iOS application security techniques, their pros and cons, and alternative fraud detection approaches.

illustration of incognito browser window
March 22, 2022

Storing Anonymous Browsing Preferences Using Browser Fingerprinting

Discover how Fingerprint works, its use cases, and how to implement dark mode for remembering users’ preferences.

device fingerprinting accuracy
February 16, 2022

Why is 99.5% accuracy important for preventing fraud?

Discover why Fingerprint Pro's visitorID is the most accurate device identifier for catching fraud and protecting online businesses.

Safari 15 IndexDB API vulnerability
January 14, 2022

Exploiting IndexedDB API information leaks in Safari 15

Discover how a software bug in Safari 15's IndexedDB API can track your online activity and reveal your identity.