Skip to main content

Documentation Index

Fetch the complete documentation index at: https://none-38c466ad.mintlify.app/llms.txt

Use this file to discover all available pages before exploring further.

The Fingerprint Layer governs browser identity and session state, both of which are major detection surfaces. Adversaries cluster traffic using inconsistencies in headers, cookies, and fingerprint reuse. High churn (rotating on every request) is as detectable as excessive persistence. This layer attaches plausible browser identities and manages session lifecycles. It enforces reuse long enough to appear natural, while rotating before linkability becomes excessive. Cookies and transport state remain isolated per session, avoiding cross-domain contamination. Two cooperating mechanisms enforce this discipline:
  1. Fingerprint management – assigns browser fingerprints and synthesizes consistent headers.
  2. Session management – governs reuse, cookie handling, and proxy alignment.

6.1 Design Philosophy

Fingerprinting is one of the strongest clustering signals available to adversaries. Even minor mismatches between User-Agent and associated headers, or unrealistic churn in identities, are sufficient to expose automation. This design avoids both extremes. Fingerprints persist across requests and domains to simulate natural browsing, but rotate deterministically before becoming long-lived anomalies. Sessions preserve continuity via cookies and aligned headers, while failures trigger isolation. The distinctive element is explicit entropy balancing: reuse distributions are bounded, rotation probability is nonzero but controlled, and sequences are validated against population baselines. This prevents both over-rotation and under-rotation, keeping identity traces statistically aligned with human populations. Common pitfalls
  • Inconsistent header families (User-Agent drift, UA-CH mismatch)
  • Excessive churn creating volatile identity traces
  • Over-persistence yielding long-lived clusters
  • Cookie bleed across domains or sessions
  • Proxy or TLS misalignment with fingerprint family

6.2 Fingerprint Management

Fingerprint management maintains a pool of plausible browser identities and maps them to domains. Rotation occurs under three conditions: no mapping exists, reuse bounds are exceeded, or a bounded randomization condition triggers rotation. Invariant:
  • Headers generated for a fingerprint remain internally consistent (e.g., User-Agent aligned with Sec-CH-UA).
  • Identities persist for multiple uses, but not indefinitely.
Formally, the reuse probability after uu consecutive uses is: Pr(reuse)=(1protate)u,\Pr(\text{reuse}) = (1 - p_{\mathrm{rotate}})^u, with an upper cap on the number of reuses. Parameters omitted by design. Failure modes include header inconsistencies, synthetic churn, long-lived anomalies, and referer leakage.

6.3 Session Management

Session management creates and reuses HTTP sessions tied to specific fingerprints and transport connectors. Each session carries cookies, aligned headers, and proxy information. Invariants:
  • Session reuse is bounded by a maximum count.
  • Cookies are isolated per session and domain, preventing cross-contamination.
  • Sessions are invalidated after sustained failures.
  • Proxy associations remain stable within a session.
Common pitfalls include cookie bleed across domains, header drift, proxy mismatch, or exhaustion of session descriptors if pooling exceeds safe limits.

6.4 Interplay and Entropy Balancing

Fingerprints define headers and platform signals, while sessions preserve continuity. The two interact to balance entropy: fingerprints rotate at controlled intervals, and sessions reuse them for bounded lifespans. Expected reuse is given by: Pr(reuse)=(1protate)u,\Pr(\text{reuse}) = (1 - p_{\mathrm{rotate}})^u, with hard caps to prevent extreme persistence. This ensures sequences are neither too volatile (synthetic churn) nor too sticky (long-lived clusters), but remain statistically consistent with real-world distributions.

6.5 Selection Flow

The Fingerprint Layer enforces its contract through a staged selection process: assign or reuse a fingerprint, align headers, preserve session state, and rotate under deterministic conditions. Selection Flow

6.6 Operational Outcome

The Fingerprint Layer ensures that:
  • Browser identities remain plausible, avoiding unrealistic churn or long-lived anomalies.
  • Sessions preserve continuity, with cookies and headers aligned to their fingerprints.
  • Failures are isolated deterministically, preventing contamination across domains.
  • Entropy matches background baselines, reducing linkability across requests.
Fingerprinting, a major adversarial vector, is thus transformed into a controlled identity substrate integrated with timing, concurrency, resolution, and transport layers.