There is a problem that is often asked by our community. It is about passive OS Fingerprinting. We would like to tell you what is the problem exactly and how you can solve it.
Many privacy fans prefer to check their Browser Fingerprint configuration on the whatleaks.com website. It is an okay website with a couple of false positive alerts. There is also an issue that we should talk about. It is the Passive OS fingerprinting.
Passive OS Fingerprinting is a method how a web server can decide the visitor machine’s OS. It cannot be spoofed with Kameleo or other Privacy Tools. It can purely tell if the machine that connects to the server is a Windows or a Mac OS X. If you are using a Proxy it will show your proxy’s machine’s OS.
On the above picture you can see that we are using a Mac OS X Base Profile but the whatleaks.com website sees that we are connecting with a Windows machine. (Our proxy was a Windows).
Passive OS fingerprinting is not a popular technology so you don’t really have to care about it. If you really want to solve this issue you can do 2 things:
Find a matching proxy
Try until you find a proxy that matches your profile. In the above case if I would really like to use the Base Profile with Mac OS X I’ll have to search for a proxy that is also Mac OS X. There can be some proxy providers that will tell you what OS does the proxy run. Or you can just simply try until you find one.
Change your Browser Fingerprint
If you found a pretty good proxy you can just simply pick an other Base Profile that will match your proxy.
Check the end of the video to see it in action