Shared verdict
Technology
fingerprinting prevention proxy. It's a localhost tls terminating proxy that changes TLS, HTTPS, JS, and TCP/IP layers. The proxy handles almost everything, then eBPF handles TCP/IP fingerprinting vectors (TTL, MSS, etc. values used by p0f and nmap). It's profile centered, so you get a profile like "Chrome on Windows" and certain values are rotated to amke you look like a believable "chrome on windows". This is to fight cross session tracking and identity resolution via browser fingerprinting.
2 for it3 with caveats3 against
◉ Share this verdict
Top expert takes
Lead Security Researcher, Browser Fingerprinting
“Ambitious, but maintaining believability is an Everest-level challenge.”
Principal Software Engineer, Browser Development
“You're creating a new fingerprint, not hiding an old one.”
Startup CTO, Privacy Tech
“Deep-tech disruption. This tackles the problem at its roots.”
◉ Your turn
Run your own decision.
Type any dilemma. Eight domain experts argue it out and hand you a verdict in under thirty seconds. Free, no sign-up.
◉ Explore more decisions