-
-
Notifications
You must be signed in to change notification settings - Fork 290
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Observing differences in the fingerprint between chrome131 impersonate and chrome 132 #493
Comments
Thanks for the heads up. I can confirm this on my Chrome 132 on macOS. Update is on my TODO list now. But I think there are some other high priority issues, such as #471. For you questions:
Yes, that's what we observed.
Yes, I personally trust them. But be aware that js3(n) string does not cover all the details in a TLS fingerprint.
Two ways, first, you CAN capture the packet with network sniff tools, just dig deeper. Second, you can write a simple app with the target http lib, e.g. okhttp, and point the url to one of the fingerprint websites. |
Thank you for acknowledging this. As mentioned by you, there appears to be other high priority fixes. Since chrome fingerprint for Desktop and Mobile both have changed, what approach must we follow to avoid detection until there is support? It looks like Safari has also been updated to version 18_3 for Mac and iOS. I did not observe a change in the fingerprint form Safari18_0 and Safari18_0_ios with version 18_3 at my end. Have you verified this at your end as well? Should we continue with Safari 18_3 for MacOS and iOS? I saw somewhere that we will have Firefox support with curl-cffi. Will this be available anytime soon? Another option that I see is this: https://curl-cffi.readthedocs.io/en/latest/impersonate.html#how-to-use-my-own-fingerprints-other-than-the-builtin-ones-e-g-okhttp
If it isn't too much to ask, would you be able to elaborate on the second approach? I did not quite understand it. Would be great if you can share a reference article or possibly an example. |
Yes, once I figure out how to build against the new Windows binary.
|
Let me verify that later tomorrow after my scheduled midnight macOS update. |
The question
We have chrome v131 impersonate support on curl-cffi with
chrome131
for desktop (Mac, Windows) andchrome131_android
for Mobile devices.I was verifying my chrome browsers on mac and on android device and found that Google has updated their chrome browser versions to chrome v132 on desktop and mobile.
As far as my understanding goes, the
ja3n
hash will remain the same for a given browser version. Correct?As per https://tls.browserleaks.com/json:
Following are my questions:
ja3n
string for a device? I do not see anything related to ja3n using Wireshark and Wireshark is also not usable with android devices.Versions
If it's related to a specific environment, paste your env info here.
The text was updated successfully, but these errors were encountered: