We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Here's the problem, currently it's easy to distinguish AG from a "clean" browser judging from the TLS fingerprint.
The difference is simple, Chrome sends one extra TLS extension compared to us: https://tlsfingerprint.io/find/extension/4469
Moreover, ideally, our TLS fingerprint should be the same as the browser's FP, not just as Chrome's.
The text was updated successfully, but these errors were encountered:
https://source.chromium.org/chromium/chromium/src/+/cc8598642336ec1fbf0eaf9c226f96b0d0acdaaf https://datatracker.ietf.org/doc/html/draft-vvv-tls-alps
Chrome has implemented a draft rfc allowing the exchange of HTTP/2 SETTINGS frames as part of the TLS handshake.
Sorry, something went wrong.
ngorskikh
No branches or pull requests
Here's the problem, currently it's easy to distinguish AG from a "clean" browser judging from the TLS fingerprint.
The difference is simple, Chrome sends one extra TLS extension compared to us: https://tlsfingerprint.io/find/extension/4469
Moreover, ideally, our TLS fingerprint should be the same as the browser's FP, not just as Chrome's.
The text was updated successfully, but these errors were encountered: