Jump to content

Saxon

Member
  • Posts

    478
  • Joined

  • Last visited

  • Days Won

    11
  • Donations

    0.00 USD 
  • Country

    Belgium

Everything posted by Saxon

  1. "Google Safe Browsing from Supermium. It blocks downloading VxKex Extended Kernel for Windows 7 (https://github.com/i486/VxKex/releases/tag/Version1.1.2.1428) and considers it a virus." https://github.com/win32ss/supermium/issues/1080
  2. So you emptied the bin, too?
  3. Oh yeah, the standard changes almost every month, and they also say "enabling both Kyber and ML-KEM simultaneously (e.g., as an interim phase until Kyber768 is completely removed) would mean the client sends an additional 2,432 bytes (1,216 for each plus 32 bytes for a fallback X25519 keyshare)." https://www.netmeister.org/blog/tls-hybrid-kex.html
  4. Why nor 121? In 122 you can't disable client hints.
  5. Tommy now also shown as a Canadian. The previous location was showing as USA. https://msfn.org/board/profile/279129-tommy/ Probably, the forced flags update just grabbed the real location IP? Not the one members choose.
  6. Do you use dev. versions from git?
  7. Not a known brand, and over 12 years old. https://forums.tomshardware.com/threads/xilence-psu-issues-several-questions-about-my-rig.1484467/
  8. Why no screenshot, then? It's not online, it even got worse. It now blocked the innocent third party site checker.
  9. It takes time to add those back. So far, only a couple of China forks (Cent, for example) still maintain V2, Supermium, also. When asked on the forum, the Chinese developer wrote he will go on with V2 until he's exhausted to revert the changes, and then moves to V3. So, time's not on our side.
  10. Most likely, your IP is set to "randomise". Good VPN providers are clever enough to randomise not only the IP itself.
  11. Chrome versions (in batches) have different JA4, JA4 changes, but not with every version, the gap is usually 10-15 versions.
  12. What good this "advice" could be if you never give what to study on? That dubious method with the cipher changes you took from the JA4 developer article (I linked to, it's a public, non-secret, common knowledge). So, I don't see anything to "study on" from you, again. Please stop with the patronising, useless posts and show us something useful, finally. Thanks. (as of now, for nothing).
  13. VPN providers also have the unique JA4+ So doesn't matter if you use a standard Chrome! In conjunction with VPN, your standard JA4+ changes to the VPN bearer's fingerprint JA4+. https://blog.foxio.io/ja4+-network-fingerprinting
  14. Chrome without VPN has the only one JA4+ out of the box. Probably, it's different in Supermium, most likely. https://blog.foxio.io/ja4+-network-fingerprinting
  15. Now it's completely gone, no ping.
  16. Introducing JA4+ "Optimise Network Visibility with JA4+ Fingerprinting!" https://netquestcorp.com/ja4-tracing-the-progress/
  17. Don't you get relaxed, JA4+ is in the development already! They will take that into the account, "JA4+: The Next Leap in Network Fingerprinting" https://www.peakhour.io/blog/overview-of-ja4-network-fingerprinting/
  18. "...Advanced Web Application Firewall (AWAF) to block traffic based on the "reputation"... " https://community.f5.com/kb/technicalarticles/fingerprinting-tls-clients-with-ja4-on-f5-big-ip/326298 https://community.f5.com/kb/technicalarticles/ja4-part-2-detecting-and-mitigating-based-on-dynamic-ja4-reputation/328663
  19. "Amazon CloudFront launches support for JA4 fingerprinting Posted on: Oct 11, 2024 Amazon CloudFront now supports JA4 fingerprinting of incoming requests, enabling customers to allow known clients or block requests from malicious clients. The JA4 fingerprint is passed via the Cloudfront-viewer-ja4-fingerprint header. You can inspect the JA4 fingerprints using custom logic on your application web servers or using CloudFront Functions or Lambda@Edge. A JA4 TLS client fingerprint contains a 38-character long fingerprint of the TLS Client Hello which is used to initiate a secure connection from clients. The fingerprint can be used to build a database of known good and bad actors to apply when inspecting HTTP requests. You can add the Cloudfront-viewer-ja4-fingerprint header to an origin request policy and attach the policy to your CloudFront distributions. You can then inspect the header value on your application web servers or in your Lambda@Edge and CloudFront Functions to compare the header value against a list of known malware fingerprints to block malicious clients. You can also compare the header value against a list of expected fingerprints to allow only requests bearing the expected fingerprints. Cloudfront-viewer-ja4-fingerprint headers are available for immediate use in all CloudFront edge locations. You can enable JA4 fingerprint headers in the CloudFront Console or using the AWS SDK. There are no additional fees to use JA4 fingerprint headers. For more information, see the CloudFront Developer Guide." https://aws.amazon.com/about-aws/whats-new/2024/10/amazon-cloudfront-ja4-fingerprinting/
  20. Can be checked here: https://browserleaks.com/ip "Fingerprinting TLS Clients with JA4 on F5 BIG-IP What is JA4? JA4 is a subset of the larger JA4+ set of network fingerprints. JA4+ is a set of simple network fingerprints for a number of protocols that are intended to be both human and machine readable, and replaces the JA3 TLS fingerprinting standard from 2017 (Salesforce is no longer maintaining JA3). Currently, JA4+ includes JA4/S/H/L/X/SSH, or JA4+ for short. JA4+ Fingerprints JA4 — TLS Client JA4S — TLS Server Response JA4H — HTTP Client JA4L — Light Distance/Location JA4X — X509 TLS Certificate JA4SSH — SSH Traffic More fingerprints are in development and will be added to the JA4+ family as they are released." https://community.f5.com/kb/technicalarticles/fingerprinting-tls-clients-with-ja4-on-f5-big-ip/326298
  21. Actually, is 11,763,650 (January 2024). https://en.wikipedia.org/wiki/Demographics_of_Belgium And most of internet users are on their phones, especially those born after 1997-2000.
  22. Yes, and the majority of them is being rich. Probably, 10-15. I think, closer to zero, read the first sentence of my reply. It's only a handful of die-hard old computers lovers, everyone else just buys new and shiny, hence no need of Supermium or the such.
  23. No, when I allow "variations" fingerprinting to get executed, I have a different tag, not like on the picture you shared with us, and then deleted with the wise advice by @Dixel.
  24. IP address can be shared. And or used by someone else (namely, "hackers"?), whereas your browser is you browser, period. Guilty, case closed
  25. Ever heard of circumstantial evidence? That's exactly what all of those "canvas" are. Whereas the Unique ID is used to build a case. No judge will ever get that much into such side technical aspects. But he will take the dog tag as the main proof, don't be delusional.
×
×
  • Create New...