# Glossary

### A

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Account</code></td><td><strong>Account Farming</strong></td><td>The practice of creating and managing multiple online accounts in bulk, typically to build trust, accumulate resources, or prepare accounts for a specific purpose.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Account Flagging</strong></td><td>A platform's automated or manual process of marking an account as suspicious based on unusual activity, policy violations, or detected patterns.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Account Suspension</strong></td><td>A temporary restriction placed on an account that limits or removes a user's access, often pending review or resolution of a policy violation.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Account</code></td><td><strong>Account Warmup</strong></td><td>The practice of gradually increasing an account's activity over time to build credibility and avoid triggering a platform's fraud detection systems.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>AdSense</strong></td><td>Google's advertising platform that allows website owners to earn revenue by displaying targeted ads, commonly used to monetize web traffic at scale.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>Affiliate Marketing</strong></td><td>A performance-based marketing model where a person earns a commission by promoting another company's product or service through a unique tracking link.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Marketing</code></td><td><strong>Airdrop</strong></td><td>A distribution method used by blockchain projects to send free tokens or NFTs directly to multiple wallet addresses, often as a promotional or reward mechanism.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Anti-Detect Browser</strong></td><td>A specialized browser designed to mask or spoof a user's digital fingerprint, making each browsing session appear as a unique, unrelated device to websites.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>API Key</strong></td><td>A unique authentication code passed with API requests to identify the calling application and control access to a service's features or data.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>ASN (Autonomous System Number)</strong></td><td>A unique identifier assigned to a network or group of IP addresses under a single organization's control, used to route internet traffic and identify the origin of an IP.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Audio Context Spoofing</strong></td><td>A technique that modifies the output of the browser's Web Audio API to prevent websites from using subtle audio signal differences to identify a device.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Audio Fingerprinting</strong></td><td>A browser tracking method that processes audio signals through a device's hardware and software stack to generate a unique identifier based on the output variations.</td><td></td><td></td></tr></tbody></table>

### B

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cloud</code></td><td><strong>Backup Profile Syncing</strong></td><td>The process of automatically saving and synchronizing browser profile data to a remote or cloud location to prevent loss and enable restoration across devices.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>Browser Automation</strong></td><td>The use of scripts or tools to programmatically control a browser, simulating user actions like clicking, typing, and navigating without manual input.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Browser Emulation Layers</strong></td><td>Software components that replicate the behavior and properties of a real browser environment, used to make automated or headless browsers appear more human-like to detection systems.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Browser Extension</strong></td><td>A small software add-on installed in a browser that adds or modifies functionality, such as blocking ads, managing passwords, or altering browser behavior.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Browser Fingerprint Entropy</strong></td><td>A measure of how unique and identifying a browser's fingerprint is. Higher entropy means the browser is more distinguishable across the web.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Browser Fingerprinting</strong></td><td>A tracking technique that collects attributes from a user's browser and device, such as fonts, screen size, and plugins, to create a unique identifier without using cookies.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Browser Isolation</strong></td><td>A security approach that separates each browser session into its own contained environment, preventing data, cookies, and fingerprints from leaking between sessions.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Browser Leaks</strong></td><td>Unintended exposure of a user's real identity or network information through the browser, often via WebRTC, DNS, or JavaScript APIs despite using a proxy or VPN.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Browser Profile</strong></td><td>A self-contained browser instance with its own isolated cookies, cache, fingerprint, and settings, used to manage separate identities or sessions independently.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Browser Tracking</strong></td><td>The practice used by websites and third parties to monitor a user's online behavior across sessions and sites, typically through cookies, fingerprinting, or pixel tags.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Browser Version Management</strong></td><td>The practice of controlling which browser version is used within a profile or session, ensuring compatibility and consistency when spoofing or automating browser environments.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>Bulk Profile Creation</strong></td><td>The automated generation of multiple browser profiles at once, each with unique fingerprints and settings, used to scale operations across many independent identities.</td><td></td><td></td></tr></tbody></table>

### C

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Cache Isolation</strong></td><td>The separation of cached data between browser sessions or profiles, ensuring that stored files and resources from one session cannot be accessed or detected by another.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Canvas Fingerprinting</strong></td><td>A browser tracking method that draws invisible graphics using the HTML5 Canvas API and analyzes subtle rendering differences to generate a unique device identifier.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Canvas Spoofing</strong></td><td>A technique that alters or randomizes the output of the Canvas API to prevent websites from using canvas rendering differences to fingerprint and identify a device.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Automation</code></td><td><strong>CAPTCHA</strong></td><td>A challenge-response test used by websites to distinguish human users from bots, typically requiring the user to identify images, solve puzzles, or check a box.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>CDP (Chrome DevTools Protocol)</strong></td><td>A protocol that allows external tools to communicate with and control Chromium-based browsers, widely used in browser automation and testing frameworks.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Chromium-based Browser</strong></td><td>A web browser built on Google's open-source Chromium engine, which serves as the foundation for browsers like Chrome, Edge, and most anti-detect browsers.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>ClientRects Fingerprinting</strong></td><td>A fingerprinting technique that measures the precise pixel positions of HTML elements on a page to exploit rendering differences across devices and identify users.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Cloaking</strong></td><td>A technique where different content or information is shown to search engines or detection systems than what is shown to regular users, often to avoid scrutiny or bypass filters.</td><td></td><td></td></tr><tr><td><code>Cloud</code></td><td><strong>Cloud Device</strong></td><td>A virtual device hosted on remote servers that can be accessed and operated over the internet, used to run browser sessions without relying on local hardware.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cloud</code></td><td><strong>Cloud Farming</strong></td><td>The practice of managing and operating multiple accounts or browser sessions remotely using cloud-based infrastructure, enabling large-scale automation without local resources.</td><td></td><td></td></tr><tr><td><code>Cloud</code></td><td><strong>Cloud Profile Sync</strong></td><td>The automatic synchronization of browser profile data, including cookies, settings, and fingerprint configurations, to cloud storage for access across multiple devices.</td><td></td><td></td></tr><tr><td><code>Cloud</code></td><td><strong>Cloud Storage</strong></td><td>A model of data storage where files and information are saved on remote servers accessed via the internet, rather than on a local device or hard drive.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cookie</code></td><td><strong>Cookie</strong></td><td>A small piece of data stored in a browser by a website to remember user information, session state, preferences, or tracking identifiers across visits.</td><td></td><td></td></tr><tr><td><code>Cookie</code></td><td><strong>Cookie Collector</strong></td><td>A tool or process that automatically gathers cookies from websites, used to warm up browser profiles or simulate authentic browsing history before account operations.</td><td></td><td></td></tr><tr><td><code>Cookie</code></td><td><strong>Cookie Converter</strong></td><td>A tool that transforms cookies from one format to another, allowing them to be imported or exported across different browsers, tools, or automation frameworks.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cookie</code></td><td><strong>Cookie Manager</strong></td><td>A browser feature or external tool that allows users to view, edit, import, export, and delete cookies stored within a browser session or profile.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Cross-Site Tracking</strong></td><td>A method used by advertisers and trackers to monitor a user's activity across multiple websites by sharing identifiers such as cookies, pixels, or fingerprints between domains.</td><td></td><td></td></tr><tr><td><code>Cookie</code></td><td><strong>Cookie Injection</strong></td><td>The process of manually or programmatically inserting cookies into a browser session to simulate a logged-in state or replicate a specific user session.</td><td></td><td></td></tr></tbody></table>

### D

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Datacenter Proxy</strong></td><td>A proxy server hosted in a datacenter rather than on a residential connection, offering fast speeds but more easily detected and blocked by websites due to its non-residential origin.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Data Isolation</strong></td><td>The practice of keeping data from different browser sessions, profiles, or users completely separated so that no information leaks or overlaps between them.</td><td></td><td></td></tr><tr><td><code>Security</code></td><td><strong>Data Leakage</strong></td><td>The unintended exposure of sensitive data, such as real IP addresses, cookies, or identifiers, outside of a secured or isolated environment.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Dedicated Proxy</strong></td><td>A proxy server assigned exclusively to a single user, providing a consistent IP address that is not shared with others, reducing the risk of blocks or bans.</td><td></td><td></td></tr><tr><td><code>Security</code></td><td><strong>Detection System</strong></td><td>A platform's automated infrastructure that analyzes behavioral, technical, and network signals to identify bots, fake accounts, or policy-violating activity.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Device Emulation</strong></td><td>The simulation of a specific device's hardware and software characteristics within a browser session, making it appear as though the user is operating from a different device.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Device Memory Spoofing</strong></td><td>A technique that falsifies the reported amount of RAM available on a device to prevent websites from using memory size as a fingerprinting signal.</td><td></td><td></td></tr><tr><td><code>Privacy</code></td><td><strong>Digital Anonymity</strong></td><td>The state of operating online without revealing one's true identity, achieved by masking identifiers such as IP address, browser fingerprint, and behavioral patterns.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Digital Fingerprint</strong></td><td>A unique combination of browser and device attributes collected by websites to identify and track a user without relying on cookies or login credentials.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Digital Fingerprint Spoofing</strong></td><td>The act of deliberately falsifying browser and device attributes to make a session appear as a different, unique identity and avoid fingerprint-based detection.</td><td></td><td></td></tr><tr><td><code>Privacy</code></td><td><strong>Digital Identity</strong></td><td>The complete set of digital attributes, including IP address, browser fingerprint, cookies, and behavior, that collectively represent a user's online presence.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>Distributed Automation</strong></td><td>The execution of automated browser tasks across multiple machines, proxies, or cloud instances simultaneously to scale operations and avoid detection from a single source.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>DNS Leak Protection</strong></td><td>A security measure that prevents DNS queries from being sent outside an encrypted tunnel, ensuring a user's real DNS server and location are not exposed to third parties.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Duplicate Account Detection</strong></td><td>A platform's mechanism for identifying when multiple accounts are operated by the same person, typically by matching shared fingerprints, IPs, cookies, or behavioral patterns.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Dynamic Fingerprinting</strong></td><td>A fingerprinting approach where the collected attributes change or adapt over time, making it harder for users to consistently spoof or evade detection across sessions.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Dynamic IP Rotation</strong></td><td>The automatic switching of IP addresses at set intervals or per request, used to distribute traffic across multiple IPs and avoid rate limiting or IP-based bans.</td><td></td><td></td></tr></tbody></table>

### E

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Emulated Device</strong></td><td>A virtual representation of a physical device — such as a phone or tablet — created by configuring a browser to mimic that device's screen size, user agent, and hardware properties.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Environment Isolation</strong></td><td>The practice of keeping each browser session's data, including cookies, cache, and local storage, completely separate so activity in one session cannot affect or be detected by another.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Extension Fingerprinting</strong></td><td>A tracking technique that identifies a browser by detecting which extensions are installed, since the combination of installed extensions can be unique to a specific user.</td><td></td><td></td></tr></tbody></table>

### F

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Fingerprint Rotation</strong></td><td>The practice of periodically switching a browser's fingerprint attributes to prevent long-term tracking based on a consistent fingerprint signature.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Font Fingerprinting</strong></td><td>A tracking method that identifies a browser by measuring which fonts are available on a device, since the installed font set often varies between users and operating systems.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Fraud Detection</strong></td><td>A system used by websites and platforms to identify suspicious or rule-breaking behavior by analyzing patterns in user actions and browser signals.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Fingerprint Consistency</strong></td><td>The degree to which all browser fingerprint attributes such as timezone, language, and hardware specs match each other logically, making a profile appear as a real, coherent device.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Fingerprint Noise Injection</strong></td><td>A privacy technique that introduces small, randomized variations into fingerprint data to prevent tracking systems from consistently identifying the same browser across sessions.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Fingerprint Profile</strong></td><td>A saved collection of browser fingerprint attributes such as screen resolution, fonts, and hardware details that defines how a browser session presents itself to websites.</td><td></td><td></td></tr></tbody></table>

### G

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Geolocation Spoofing</strong></td><td>The act of falsifying a browser's reported geographic location to make websites believe the user is accessing them from a different country or region.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Ghost Browsing</strong></td><td>A browsing mode that does not save any session data locally, ensuring no cookies, history, or cache persist after the session ends.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Ghost Account</strong></td><td>A dormant or inactive account kept alive to occupy a username or maintain platform presence without regular activity.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cookie</code></td><td><strong>Global Cookie Management</strong></td><td>The centralized handling of cookies across multiple browser profiles or sessions, allowing users to import, export, and sync cookie data from a single interface.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>GPU Fingerprinting</strong></td><td>A tracking technique that identifies a device by analyzing how its graphics processor renders specific visual elements, since GPU output varies across hardware and driver combinations.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Group Profile Management</strong></td><td>The ability to organize, configure, and control multiple browser profiles as a batch, allowing teams to apply settings, assign proxies, or share access across many profiles at once.</td><td></td><td></td></tr></tbody></table>

### H

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Hardware Concurrency</strong></td><td>The number of logical CPU cores reported by a device, often used as a signal in browser fingerprinting.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Hardware Fingerprinting</strong></td><td>The process of identifying a device based on its hardware-related attributes such as CPU, GPU, and memory characteristics.</td><td></td><td></td></tr><tr><td><code>Browser</code></td><td><strong>Headless Browser</strong></td><td>A browser that operates without a graphical user interface and is typically used for automation or testing tasks.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Headless Detection</strong></td><td>The technique of identifying whether a browser is running in headless mode using behavioral or technical signals.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>HTTP Header</strong></td><td>Metadata sent with HTTP requests and responses that can reveal information about the client, environment, and request context.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>HTTP Proxy</strong></td><td>An intermediary server that routes HTTP requests between a client and destination, masking the original IP address.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Automation</code></td><td><strong>Human Behavior Simulation</strong></td><td>The practice of mimicking realistic user actions such as mouse movement, typing, and timing patterns to reduce detection.</td><td></td><td></td></tr></tbody></table>

### I

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>IP Address</strong></td><td>A unique numerical identifier assigned to a device on a network, used to route traffic and identify its origin.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>IP Rotation</strong></td><td>The process of periodically changing a device’s IP address to reduce tracking and distribute network activity.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>IP Reputation</strong></td><td>A score or classification assigned to an IP address based on its historical behavior and trustworthiness.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>IP Leak</strong></td><td>An unintended exposure of a device’s real IP address despite the use of a proxy or masking layer.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>ISP Proxy</strong></td><td>A proxy that uses IP addresses assigned by Internet Service Providers, combining residential trust with datacenter performance.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Identity Linking</strong></td><td>The process of connecting multiple accounts or sessions to the same user based on shared signals or behaviors.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>IndexedDB</strong></td><td>A browser-based storage system that allows websites to store large amounts of structured data on the client side.</td><td></td><td></td></tr></tbody></table>

### J

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>JavaScript Fingerprinting</strong></td><td>The use of JavaScript to collect device and browser attributes for the purpose of uniquely identifying users.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>JavaScript Injection</strong></td><td>The act of inserting and executing custom JavaScript code within a webpage to modify behavior or automate interactions.</td><td></td><td></td></tr></tbody></table>

### K

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Keystroke Dynamics</strong></td><td>A behavioral biometric technique that analyzes typing patterns such as speed and rhythm to identify users.</td><td></td><td></td></tr></tbody></table>

### L

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Local Storage</strong></td><td>A browser-based storage mechanism that allows websites to store data persistently on a user's device.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Location Spoofing</strong></td><td>The practice of altering a device’s reported geographic location to match a desired region or IP address.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Login Session</strong></td><td>A temporary authenticated state that allows a user to interact with an account without re-entering credentials.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Login Fingerprinting</strong></td><td>The process of analyzing device and behavioral signals during login to identify or verify a user.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Latency Simulation</strong></td><td>The intentional adjustment of network response timing to mimic realistic connection conditions.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>Lookalike Audience</strong></td><td>A targeting method that uses existing user data to find new users with similar characteristics and behaviors.</td><td></td><td></td></tr></tbody></table>

### M

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Tracking</code></td><td><strong>Machine Learning Detection</strong></td><td>The use of trained models to identify patterns and anomalies in user behavior or device signals for detection purposes.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Mobile Fingerprinting</strong></td><td>The process of identifying mobile devices based on their unique hardware, software, and behavioral attributes.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Multi-Account Management</strong></td><td>The practice of operating and maintaining multiple user accounts in a structured and organized manner.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Multi-Session Isolation</strong></td><td>The separation of multiple browsing sessions to prevent shared data, fingerprints, or tracking between them.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Minting Wallet</strong></td><td>A cryptocurrency wallet specifically used to create or participate in the minting of digital assets such as NFTs.</td><td></td><td></td></tr></tbody></table>

### N

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Navigator Object</strong></td><td>A JavaScript object that provides information about the browser and device, often used in fingerprinting.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Network Fingerprinting</strong></td><td>The identification of a user based on network-level characteristics such as IP behavior and connection patterns.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Network Latency</strong></td><td>The time delay between a request and response over a network, often used as a behavioral signal.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Non-Persistent Storage</strong></td><td>A type of browser storage that is cleared after a session ends and does not retain data permanently.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>NFT Minting</strong></td><td>The process of creating a new non-fungible token on a blockchain by recording its data on-chain.</td><td></td><td></td></tr></tbody></table>

### O

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Operating System Fingerprinting</strong></td><td>The identification of a device’s operating system based on system-level attributes and signals.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Online Tracking</strong></td><td>The practice of monitoring user activity across websites using various tracking technologies and identifiers.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>Organic Traffic</strong></td><td>Website visitors acquired through unpaid sources such as search engines or direct discovery.</td><td></td><td></td></tr></tbody></table>

### P

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Page Visibility API</strong></td><td>A browser API that detects whether a webpage is active or hidden, often used to monitor user engagement and behavior.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>PPC</strong></td><td>A digital advertising model where advertisers pay a fee each time their ad is clicked.</td><td></td><td></td></tr><tr><td><code>Cookie</code></td><td><strong>Pre-Made Cookies</strong></td><td>Previously collected and stored cookies that can be reused to replicate an existing session or user state.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Privacy Browser</strong></td><td>A web browser designed to limit tracking and enhance user privacy by blocking or minimizing data collection.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Privacy Sandbox</strong></td><td>A set of technologies aimed at replacing traditional tracking methods with privacy-focused alternatives in web browsers.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Private Proxy</strong></td><td>A proxy server exclusively assigned to a single user, offering consistent identity and reduced risk of shared reputation issues.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Proxy Pool</strong></td><td>A collection of multiple proxy servers used to distribute requests and reduce detection risk.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Proxy Rotation Strategy</strong></td><td>A defined method for changing proxies over time or per request to maintain anonymity and avoid detection.</td><td></td><td></td></tr></tbody></table>

### R

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>Rate Limiting</strong></td><td>A technique used to restrict the number of requests a client can make within a given time period.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Redirect Tracking</strong></td><td>The use of intermediate redirects to monitor user activity and capture tracking data during navigation.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Residential Proxy</strong></td><td>A proxy that routes traffic through real residential IP addresses assigned by Internet Service Providers.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Automation</code></td><td><strong>Retry Logic</strong></td><td>A mechanism that automatically repeats failed requests or actions to improve reliability in automation workflows.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Risk Scoring</strong></td><td>The process of assigning a risk level to a user or session based on behavioral, device, and network signals.</td><td></td><td></td></tr></tbody></table>

### S

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Cookie</code></td><td><strong>Session Cookie</strong></td><td>A temporary cookie that stores session data and is deleted when the browser is closed.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Session Replay</strong></td><td>A technique that records and replays user interactions on a website for analysis and monitoring.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Session Hijacking</strong></td><td>The unauthorized takeover of a user session by exploiting session identifiers or vulnerabilities.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>Signal Correlation</strong></td><td>The process of combining multiple device and behavioral signals to identify or link users across sessions.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>SOCKS5 Proxy</strong></td><td>A proxy protocol that routes traffic at a lower level without modifying request headers or content.</td><td></td><td></td></tr></tbody></table>

### T

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>TLS Fingerprinting</strong></td><td>The identification of clients based on characteristics of their TLS handshake and encryption behavior.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>Timezone Spoofing</strong></td><td>The manipulation of a browser’s reported timezone to match a specific geographic or network profile.</td><td></td><td></td></tr><tr><td><code>Account</code></td><td><strong>Two-Factor Authentication (2FA)</strong></td><td>A security method that requires a second verification step in addition to a password to access an account.</td><td></td><td></td></tr></tbody></table>

### U

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Fingerprint</code></td><td><strong>User Agent</strong></td><td>A string sent by a browser that identifies the browser type, version, and operating system.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>User Behavior Tracking</strong></td><td>The collection and analysis of user actions such as clicks, scrolling, and navigation patterns.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Unique Identifier</strong></td><td>A distinct value assigned to a user or device to enable consistent recognition across sessions.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Account</code></td><td><strong>User Session</strong></td><td>A period of interaction between a user and a system that is maintained across multiple requests.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>User Profiling</strong></td><td>The process of analyzing user data to build a detailed representation of behavior, preferences, or identity.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>UTM Parameters</strong></td><td>Tags added to URLs that allow marketers to track the source, medium, and performance of campaigns.</td><td></td><td></td></tr></tbody></table>

### V

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Browser</code></td><td><strong>Virtual Browser</strong></td><td>A browser environment that runs in an isolated or remote system rather than directly on a local device.</td><td></td><td></td></tr><tr><td><code>Cloud</code></td><td><strong>Virtual Machine (VM)</strong></td><td>A software-based system that emulates a physical computer and runs its own operating system.</td><td></td><td></td></tr><tr><td><code>Cloud</code></td><td><strong>VPS (Virtual Private Server)</strong></td><td>A virtualized server that provides dedicated resources within a shared hosting environment.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>VPN (Virtual Private Network)</strong></td><td>A service that routes internet traffic through an encrypted tunnel to mask the user’s IP address and location.</td><td></td><td></td></tr><tr><td><code>Tracking</code></td><td><strong>Visitor ID</strong></td><td>A unique identifier assigned to a visitor to track interactions and behavior across sessions.</td><td></td><td></td></tr></tbody></table>

### W

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>WebRTC Leak</strong></td><td>An exposure of a user’s real IP address through WebRTC despite the use of proxies or VPNs.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>WebRTC Spoofing</strong></td><td>The manipulation of WebRTC data to prevent the exposure of real network information.</td><td></td><td></td></tr><tr><td><code>Fingerprint</code></td><td><strong>WebGL Fingerprinting</strong></td><td>The use of WebGL rendering behavior to identify devices based on graphical output differences.</td><td></td><td></td></tr></tbody></table>

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Automation</code></td><td><strong>Web Scraping</strong></td><td>The automated extraction of data from websites using scripts or software tools.</td><td></td><td></td></tr><tr><td><code>Automation</code></td><td><strong>Webhook Automation</strong></td><td>A method of triggering automated actions based on real-time events sent from external systems.</td><td></td><td></td></tr><tr><td><code>Marketing</code></td><td><strong>White Hat SEO</strong></td><td>The practice of optimizing websites using ethical techniques that comply with search engine guidelines.</td><td></td><td></td></tr></tbody></table>

### X

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Network</code></td><td><strong>XMLHttpRequest (XHR)</strong></td><td>A browser API used to send and receive data asynchronously without reloading the page.</td><td></td><td></td></tr><tr><td><code>Security</code></td><td><strong>XSS (Cross-Site Scripting)</strong></td><td>A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.</td><td></td><td></td></tr></tbody></table>

### Z

<table data-view="cards"><thead><tr><th></th><th></th><th></th><th data-hidden data-card-target data-type="content-ref"></th><th data-hidden data-card-cover data-type="files"></th></tr></thead><tbody><tr><td><code>Tracking</code></td><td><strong>Zero-Day Detection</strong></td><td>The identification of previously unknown threats or behaviors using advanced analysis techniques without relying on known signatures.</td><td></td><td></td></tr><tr><td><code>Network</code></td><td><strong>Zero-Trust Security</strong></td><td>A security model that requires continuous verification of users and devices rather than assuming trust based on network location.</td><td></td><td></td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.incogniton.com/glossary/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
