TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

New headless Chrome has been released and has a near-perfect browser fingerprint

463 pointsby avastelabout 2 years ago

21 comments

natorionabout 2 years ago
I am the PM working on Headless. Feel free to ask questions in this thread and I will try to answer them if I can.<p>Edit: Please also note that we have not released New Headless yet. We &quot;merely&quot; landed the source code.
评论 #34857936 未加载
评论 #34857834 未加载
评论 #34862475 未加载
评论 #34857935 未加载
评论 #34858348 未加载
评论 #34862965 未加载
评论 #34862281 未加载
评论 #34860906 未加载
评论 #34868860 未加载
评论 #34858039 未加载
评论 #34857865 未加载
评论 #34857775 未加载
graderjsabout 2 years ago
I built a remote browser based on headless Chrome^0 and this is going to make things way easier. It&#x27;s also great to see Google supporting Chrome use cases beyond &quot;consumer browsing&quot;, and perhaps that&#x27;s in large part been pushed by the &quot;grass roots popularity&quot; of things like puppeteer and playwright.<p>One thing I&#x27;m hoping for (but have heard it would require <i>extensive</i> rejigging of almost absolutely everything) is Extensions support in this new headless.<p>However, if I&#x27;m reading the winds, it seems as if things <i>might</i> be going there, because:<p>- Tamper scripts now work on Firefox mobile<p>- Non-webkit iOS browsers are in the works<p>- It&#x27;s technically possible to &quot;shim&quot; much of the chrome.extension APIs using RDP (the low-level protocol that pptr and its ilk are based on) which would lead essentially to a &quot;parallel extensions runtime&quot; and &quot;alt-Webstore&quot; with less restrictions, something which Google may not look merrily upon<p>Anyway, back to &quot;headless detection&quot;, for the remote isolated browser, I have been using an extensive bot detection evasion script that proxied many of the normal properties on navigator (like plugins, etc), and tested extensively against detectors like luca.gg&#x2F;headless^1<p>Interestingly one of the most effective way to defeat &quot;first wave&quot; &#x2F; non-sophisticated bots used to be simply throwing up a JS modal (alert, confirm, prompt) -- for the convenient way it kills the JS runtime until dismissed, and how you have to explicitly dismiss it.<p>^0 = <a href="https:&#x2F;&#x2F;github.com&#x2F;crisdosyago&#x2F;BrowserBox">https:&#x2F;&#x2F;github.com&#x2F;crisdosyago&#x2F;BrowserBox</a><p>^1 = <a href="https:&#x2F;&#x2F;luca.gg&#x2F;headless&#x2F;" rel="nofollow">https:&#x2F;&#x2F;luca.gg&#x2F;headless&#x2F;</a>
评论 #34857989 未加载
supriyo-biswasabout 2 years ago
I&#x27;m assuming the next step will be to bring to Cloudflare&#x27;s pet project of TPM attestation into Chrome, otherwise known as PATs[1]. And just like that, not only would headless be defeated, but all of you using rooted devices and small time browsers would be left high and dry.<p>It&#x27;s &quot;Right to read&quot;[2] all over again.<p>[1] <a href="https:&#x2F;&#x2F;www.ietf.org&#x2F;archive&#x2F;id&#x2F;draft-private-access-tokens-01.html" rel="nofollow">https:&#x2F;&#x2F;www.ietf.org&#x2F;archive&#x2F;id&#x2F;draft-private-access-tokens-...</a><p>[2] <a href="https:&#x2F;&#x2F;www.gnu.org&#x2F;philosophy&#x2F;right-to-read.en.html" rel="nofollow">https:&#x2F;&#x2F;www.gnu.org&#x2F;philosophy&#x2F;right-to-read.en.html</a>
评论 #34860134 未加载
评论 #34860195 未加载
评论 #34858284 未加载
评论 #34862675 未加载
harrisonjacksonabout 2 years ago
We have a chatbot that can send users screenshots of their CMS views (kanban, calendar, tables, gallery, etc) from inside of Slack.<p>The screenshotting uses puppeteer and chromium and a read-only session to impersonate the user and screenshot their dashboard.<p>It uses the old version of chromium and there were many gotchas that required a lot of extra scaffolding to actually render ours and other websites like they would on my laptop. This will hopefully make it easier for us to maintain once implemented.
londons_exploreabout 2 years ago
If you add DRM video playback to the fingerprint, it is pretty much impossible to fake...<p>Either they have a real TPM with a real nvidia graphics card able to decrypt content with a real serial number... Or they don&#x27;t...<p>If one graphics card or TPM serial number starts acting bot-like, you can ban just that one.
评论 #34857771 未加载
评论 #34858030 未加载
评论 #34857716 未加载
评论 #34857781 未加载
评论 #34857729 未加载
评论 #34857724 未加载
评论 #34857806 未加载
评论 #34859245 未加载
chirauabout 2 years ago
How do i set the <i>new</i> part of the headless flag in Python?<p>The article mentions that to use this you need to specify the <i>--headless=new</i> flag.<p>I know that to set the headless flag i can just use this code:<p><pre><code> from selenium.webdriver.chrome.options import Options options = Options() options.headless = True </code></pre> But how would I specify the new part of the flag&#x2F;option?
评论 #34860254 未加载
评论 #34859125 未加载
transitivebsabout 2 years ago
The cat &amp; mouse game continues...
评论 #34857811 未加载
评论 #34857595 未加载
评论 #34859677 未加载
nullifidianabout 2 years ago
Are there non-headless browsers modified specifically to have extremely generic fingerprints? Hiding OS, GPU, fonts everything.
评论 #34857429 未加载
评论 #34857731 未加载
评论 #34857460 未加载
BonoboIOabout 2 years ago
At the end we come to a browser and we have to emulate a mouse that does all the clicking.
jasmerabout 2 years ago
We should assume anyone visiting a site without some kind of credentialed login is a &#x27;bot&#x27;.<p>Or for all intents and purposes &#x27;noise&#x27; traffic.<p>It&#x27;d be nice for the powers that be develop an anonymous cookie standard to allow people to flag themselves as &#x27;humans&#x27; without enabling the host to know anything about them.<p>We are fighting wars over problems that we have created for ourselves.
评论 #34867349 未加载
novaleafabout 2 years ago
I am using the new headless Chrome for my Browser-Automation SaaS (PhantomJsCloud.com) and it is working great.<p>It fixes some nagging compatibilities with certain websites. I don&#x27;t bother with anti-bot mitigations, and I don&#x27;t expect this to be useful in that regard. commercial Anti-Bot doesn&#x27;t care about how much you spoof your browser fingerprint.<p>feel free to AMA
评论 #34862832 未加载
评论 #34865147 未加载
评论 #34862723 未加载
chuckwolfeabout 2 years ago
I tried with akami and it still didn’t work. Still need the stealth plugin and some additional tweaks to bypass
eimrineabout 2 years ago
&gt; navigator.plugins.length = 0<p>So, any website on the Internets can know how many plugins my browser has? Ridiculously!
评论 #34862440 未加载
thekingshorsesabout 2 years ago
I wish I can automate some of the banking tasks. I tried but couldn&#x27;t automate Chase, Citi or CapitalOne.<p>If anyone has a working script to login and perform simple task on one of these sites, please share it.
评论 #34862705 未加载
TAKEMYMONEYabout 2 years ago
&gt; <i>the new headless Chrome can still be detected using JS browser fingerprinting techniques [...] however, the task has become more challenging [...] I’m not going to share any new detection signals</i><p>Any guesses?
评论 #34857432 未加载
PascLeRascabout 2 years ago
This is off topic but when did we get the ability to use spaces in URLs?
评论 #34862531 未加载
评论 #34862596 未加载
shp0ngleabout 2 years ago
The best way to catch a robot is just to slap a captcha there. Everything else is kind of useless and not effective.
评论 #34857404 未加载
评论 #34857704 未加载
评论 #34857422 未加载
评论 #34857390 未加载
评论 #34857391 未加载
评论 #34857412 未加载
评论 #34857416 未加载
评论 #34857428 未加载
jaimex2about 2 years ago
No one stopped a Chromium fork from this earlier.
mike_hearnabout 2 years ago
The game continues. Back in 2010 when I was writing the first in-browser bot detection signals for Google (so BotGuard could spot embedded Internet Explorers) I wondered how long they might last. Surely at some point embedded browsers would become undetectable? It never happened - browsers are so complex that there will probably always be ways to detect when they&#x27;re being automated.<p>There are some less obvious aspects to this that matter a lot in practice:<p>1. You have to force the code to actually run inside a real browser in the first place, not simply inside a fast emulator that sends back a clean response. This is by itself a big part of the challenge.<p>2. Doing so is useful even if you miss some automated browsers, because adversaries are often CPU and RAM constrained in ways you may not expect.<p>3. You have to do something sensible if the User-Agent claims to be something obscure, old or alternatively, too new for you to have seen before.<p>4. The signals have to be well protected, otherwise bot authors will just read your JS to see what they have to patch next. Signal collection and obfuscation work best when the two are tightly integrated together.<p>These days there are quite a few companies doing JS based bot detection but I noticed from write-ups by reverse engineers that they don&#x27;t seem to be obfuscating what they&#x27;re doing as well as they could. It&#x27;s like they heard that a custom VM is a good form of obfuscation but missed some of the reasons why. I wrote a bit about why the pattern is actually useful a month ago when TikTok&#x27;s bot detector was being blogged about:<p><a href="https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;programming&#x2F;comments&#x2F;10755l2&#x2F;reverse_engineering_tiktoks_vm_obfuscation_part_2&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.reddit.com&#x2F;r&#x2F;programming&#x2F;comments&#x2F;10755l2&#x2F;revers...</a><p>tl;dr you want to use a mesh oriented obfuscation and a custom VM makes that easier. It&#x27;s a means, not an end.<p>Ad: Occasionally I do private consulting on this topic, mostly for tech firms. Bot detectors tend to be either something home-grown by tech&#x2F;social networking firms, or these days sold as a service by companies like DataDome, HUMAN etc. Companies that want to own their anti-abuse stack have to start from scratch every time, and often end up with something subpar because it&#x27;s very difficult to hire for this set of skills. You often end up hiring people with a generic ML background but then they struggle to obtain good enough signals and the model produces noise. You do want some ML in the mix (or just statistics) to establish a base level of protection and to ensure that when bots are caught their resources are burned, but it&#x27;s not enough by itself anymore. I offer training courses on how to construct high quality JS anti-bot systems and am thinking of maybe in future offering a reference codebase you can license and then fork. If anyone reading this is interested, drop me an email: mike@plan99.net
评论 #34857791 未加载
评论 #34858055 未加载
评论 #34857858 未加载
评论 #34858377 未加载
评论 #34857818 未加载
ilytabout 2 years ago
Why my first reaction on the last part is &quot;oh no!&quot;? Seems something that would have more illegitimate&#x2F;annoying use cases than good
评论 #34858079 未加载
评论 #34860459 未加载
cratermoonabout 2 years ago
&gt; As you can imagine, given my position at DataDome (a bot detection company), I’m not going to share any new detection signals as I used to do<p>Here comes the sales pitch....