Block Browser Emulation and Device Spoofing
There are a number of easy tricks fraudsters can use to alter their digital fingerprints, such as changing the user-agent string or using software tools that spoof OS and graphic hardware. Some of these tools are used in development and testing, such as built-in browser developer tools that change device characteristics on the fly, or software like Selenium that enables developers to automate testing across many different browsers and devices.
Block browser emulation and device spoofing are sophisticated to involves emulators that can replicate specific device models, OS versions and other technical features, which make it more difficult for detection systems to detect a fake fingerprint. For example, Picasso, a rendering engine developed by Google, understands a browser’s device classification by performing certain operations that are heavily dependent on the operating system and graphic hardware.
Blocking Browser Emulation and Device Spoofing in Real-Time
Other techniques include IP spoofing with a VPN, and MAC address spoofing to mask the device’s unique ID. In general, fraudsters can also obfuscate their identity by manipulating the operating system version, screen resolution and apps installed. This allows them to evade primitive bans based on these attributes and bypass other security mechanisms that require more complex spoofing tactics.
A good way to detect these spoofing techniques is by pairing device intelligence with location intelligence, as these two signals are less likely to be manipulated. SEON’s SHIELD technology incorporates both of these elements by detecting emulators and other commonly used spoofing tools, as well as detecting inconsistencies between the device fingerprint and expected behavior to identify suspicious activity.