Bloxxy

Results 53 comments of Bloxxy

My bot already randomises the user agent, and the entire fingerprint. And puppeteer loads plugins via the args array

First network request when opening any youtube website. Used to track basic info about your fingerprint: network request data: ```json { "method": "POST", "headers": { "host": "www.youtube.com", "user-agent": "Mozilla/5.0 (Windows...

Request made when visiting a video. Possibly to fingerprint as well. Many details are the same as the first important request. network request data: ```json { "method": "POST", "headers": {...

Request made when accessing any *.youtube.com page, made for initializing the GRPC connection network request data: ```json { "method": "POST", "headers": { "host": "jnn-pa.googleapis.com", "user-agent": "Mozilla/5.0 (Windows NT 10.0; rv:102.0)...

Weird POST with encrypted data, internally named "LOG_EVENT", my best guess is that it's used to log stuff like hovering over suggestions, pausing, clicking, etc. network request data: ```json {...

Request sent every few seconds while watching a video, to show youtube your progress on the video: network request data: ```json { "method": "POST", "headers": { "host": "www.youtube.com", "user-agent": "Mozilla/5.0...

Event POST message. This affirms my theory that youtube sends your key strokes and mouse movements to their server to detect bot activity: ```json { "method": "POST", "headers": { "host":...

> I could be wrong but isn't this the automation detection that was bypassed in undetected_chromedriver v3.4.5? it could just be that this uses a deprecated and hence detectable version...

> No, i know it's using firefox But these mitigation techniques are what borked undetected_chromedriver a few months ago and caused the need for a complete overhall i'm pretty sure....