Glossary
Explore essential terms related to anti-detect browsing, identity separation, and modern web tracking.
A
Account
Account Farming
The practice of creating and managing multiple online accounts in bulk, typically to build trust, accumulate resources, or prepare accounts for a specific purpose.
Account
Account Flagging
A platform's automated or manual process of marking an account as suspicious based on unusual activity, policy violations, or detected patterns.
Account
Account Suspension
A temporary restriction placed on an account that limits or removes a user's access, often pending review or resolution of a policy violation.
Account
Account Warmup
The practice of gradually increasing an account's activity over time to build credibility and avoid triggering a platform's fraud detection systems.
Marketing
AdSense
Google's advertising platform that allows website owners to earn revenue by displaying targeted ads, commonly used to monetize web traffic at scale.
Marketing
Affiliate Marketing
A performance-based marketing model where a person earns a commission by promoting another company's product or service through a unique tracking link.
Marketing
Airdrop
A distribution method used by blockchain projects to send free tokens or NFTs directly to multiple wallet addresses, often as a promotional or reward mechanism.
Browser
Anti-Detect Browser
A specialized browser designed to mask or spoof a user's digital fingerprint, making each browsing session appear as a unique, unrelated device to websites.
Automation
API Key
A unique authentication code passed with API requests to identify the calling application and control access to a service's features or data.
Network
ASN (Autonomous System Number)
A unique identifier assigned to a network or group of IP addresses under a single organization's control, used to route internet traffic and identify the origin of an IP.
Fingerprint
Audio Context Spoofing
A technique that modifies the output of the browser's Web Audio API to prevent websites from using subtle audio signal differences to identify a device.
Fingerprint
Audio Fingerprinting
A browser tracking method that processes audio signals through a device's hardware and software stack to generate a unique identifier based on the output variations.
B
Cloud
Backup Profile Syncing
The process of automatically saving and synchronizing browser profile data to a remote or cloud location to prevent loss and enable restoration across devices.
Automation
Browser Automation
The use of scripts or tools to programmatically control a browser, simulating user actions like clicking, typing, and navigating without manual input.
Browser
Browser Emulation Layers
Software components that replicate the behavior and properties of a real browser environment, used to make automated or headless browsers appear more human-like to detection systems.
Browser
Browser Extension
A small software add-on installed in a browser that adds or modifies functionality, such as blocking ads, managing passwords, or altering browser behavior.
Fingerprint
Browser Fingerprint Entropy
A measure of how unique and identifying a browser's fingerprint is. Higher entropy means the browser is more distinguishable across the web.
Fingerprint
Browser Fingerprinting
A tracking technique that collects attributes from a user's browser and device, such as fonts, screen size, and plugins, to create a unique identifier without using cookies.
Browser
Browser Isolation
A security approach that separates each browser session into its own contained environment, preventing data, cookies, and fingerprints from leaking between sessions.
Browser
Browser Leaks
Unintended exposure of a user's real identity or network information through the browser, often via WebRTC, DNS, or JavaScript APIs despite using a proxy or VPN.
Browser
Browser Profile
A self-contained browser instance with its own isolated cookies, cache, fingerprint, and settings, used to manage separate identities or sessions independently.
Browser
Browser Tracking
The practice used by websites and third parties to monitor a user's online behavior across sessions and sites, typically through cookies, fingerprinting, or pixel tags.
Browser
Browser Version Management
The practice of controlling which browser version is used within a profile or session, ensuring compatibility and consistency when spoofing or automating browser environments.
Automation
Bulk Profile Creation
The automated generation of multiple browser profiles at once, each with unique fingerprints and settings, used to scale operations across many independent identities.
C
Browser
Cache Isolation
The separation of cached data between browser sessions or profiles, ensuring that stored files and resources from one session cannot be accessed or detected by another.
Fingerprint
Canvas Fingerprinting
A browser tracking method that draws invisible graphics using the HTML5 Canvas API and analyzes subtle rendering differences to generate a unique device identifier.
Fingerprint
Canvas Spoofing
A technique that alters or randomizes the output of the Canvas API to prevent websites from using canvas rendering differences to fingerprint and identify a device.
Automation
CAPTCHA
A challenge-response test used by websites to distinguish human users from bots, typically requiring the user to identify images, solve puzzles, or check a box.
Automation
CDP (Chrome DevTools Protocol)
A protocol that allows external tools to communicate with and control Chromium-based browsers, widely used in browser automation and testing frameworks.
Browser
Chromium-based Browser
A web browser built on Google's open-source Chromium engine, which serves as the foundation for browsers like Chrome, Edge, and most anti-detect browsers.
Fingerprint
ClientRects Fingerprinting
A fingerprinting technique that measures the precise pixel positions of HTML elements on a page to exploit rendering differences across devices and identify users.
Fingerprint
Cloaking
A technique where different content or information is shown to search engines or detection systems than what is shown to regular users, often to avoid scrutiny or bypass filters.
Cloud
Cloud Device
A virtual device hosted on remote servers that can be accessed and operated over the internet, used to run browser sessions without relying on local hardware.
Cloud
Cloud Farming
The practice of managing and operating multiple accounts or browser sessions remotely using cloud-based infrastructure, enabling large-scale automation without local resources.
Cloud
Cloud Profile Sync
The automatic synchronization of browser profile data, including cookies, settings, and fingerprint configurations, to cloud storage for access across multiple devices.
Cloud
Cloud Storage
A model of data storage where files and information are saved on remote servers accessed via the internet, rather than on a local device or hard drive.
Cookie
Cookie
A small piece of data stored in a browser by a website to remember user information, session state, preferences, or tracking identifiers across visits.
Cookie
Cookie Collector
A tool or process that automatically gathers cookies from websites, used to warm up browser profiles or simulate authentic browsing history before account operations.
Cookie
Cookie Converter
A tool that transforms cookies from one format to another, allowing them to be imported or exported across different browsers, tools, or automation frameworks.
Cookie
Cookie Manager
A browser feature or external tool that allows users to view, edit, import, export, and delete cookies stored within a browser session or profile.
Tracking
Cross-Site Tracking
A method used by advertisers and trackers to monitor a user's activity across multiple websites by sharing identifiers such as cookies, pixels, or fingerprints between domains.
Cookie
Cookie Injection
The process of manually or programmatically inserting cookies into a browser session to simulate a logged-in state or replicate a specific user session.
D
Network
Datacenter Proxy
A proxy server hosted in a datacenter rather than on a residential connection, offering fast speeds but more easily detected and blocked by websites due to its non-residential origin.
Browser
Data Isolation
The practice of keeping data from different browser sessions, profiles, or users completely separated so that no information leaks or overlaps between them.
Security
Data Leakage
The unintended exposure of sensitive data, such as real IP addresses, cookies, or identifiers, outside of a secured or isolated environment.
Network
Dedicated Proxy
A proxy server assigned exclusively to a single user, providing a consistent IP address that is not shared with others, reducing the risk of blocks or bans.
Security
Detection System
A platform's automated infrastructure that analyzes behavioral, technical, and network signals to identify bots, fake accounts, or policy-violating activity.
Browser
Device Emulation
The simulation of a specific device's hardware and software characteristics within a browser session, making it appear as though the user is operating from a different device.
Fingerprint
Device Memory Spoofing
A technique that falsifies the reported amount of RAM available on a device to prevent websites from using memory size as a fingerprinting signal.
Privacy
Digital Anonymity
The state of operating online without revealing one's true identity, achieved by masking identifiers such as IP address, browser fingerprint, and behavioral patterns.
Fingerprint
Digital Fingerprint
A unique combination of browser and device attributes collected by websites to identify and track a user without relying on cookies or login credentials.
Fingerprint
Digital Fingerprint Spoofing
The act of deliberately falsifying browser and device attributes to make a session appear as a different, unique identity and avoid fingerprint-based detection.
Privacy
Digital Identity
The complete set of digital attributes, including IP address, browser fingerprint, cookies, and behavior, that collectively represent a user's online presence.
Automation
Distributed Automation
The execution of automated browser tasks across multiple machines, proxies, or cloud instances simultaneously to scale operations and avoid detection from a single source.
Network
DNS Leak Protection
A security measure that prevents DNS queries from being sent outside an encrypted tunnel, ensuring a user's real DNS server and location are not exposed to third parties.
Account
Duplicate Account Detection
A platform's mechanism for identifying when multiple accounts are operated by the same person, typically by matching shared fingerprints, IPs, cookies, or behavioral patterns.
Fingerprint
Dynamic Fingerprinting
A fingerprinting approach where the collected attributes change or adapt over time, making it harder for users to consistently spoof or evade detection across sessions.
Network
Dynamic IP Rotation
The automatic switching of IP addresses at set intervals or per request, used to distribute traffic across multiple IPs and avoid rate limiting or IP-based bans.
Last updated
Was this helpful?