Glossary
Explore essential terms related to anti-detect browsing, identity separation, and modern web tracking.
A
Account
Account Farming
The practice of creating and managing multiple online accounts in bulk, typically to build trust, accumulate resources, or prepare accounts for a specific purpose.
Account
Account Flagging
A platform's automated or manual process of marking an account as suspicious based on unusual activity, policy violations, or detected patterns.
Account
Account Suspension
A temporary restriction placed on an account that limits or removes a user's access, often pending review or resolution of a policy violation.
Account
Account Warmup
The practice of gradually increasing an account's activity over time to build credibility and avoid triggering a platform's fraud detection systems.
Marketing
AdSense
Google's advertising platform that allows website owners to earn revenue by displaying targeted ads, commonly used to monetize web traffic at scale.
Marketing
Affiliate Marketing
A performance-based marketing model where a person earns a commission by promoting another company's product or service through a unique tracking link.
Marketing
Airdrop
A distribution method used by blockchain projects to send free tokens or NFTs directly to multiple wallet addresses, often as a promotional or reward mechanism.
Browser
Anti-Detect Browser
A specialized browser designed to mask or spoof a user's digital fingerprint, making each browsing session appear as a unique, unrelated device to websites.
Automation
API Key
A unique authentication code passed with API requests to identify the calling application and control access to a service's features or data.
Network
ASN (Autonomous System Number)
A unique identifier assigned to a network or group of IP addresses under a single organization's control, used to route internet traffic and identify the origin of an IP.
Fingerprint
Audio Context Spoofing
A technique that modifies the output of the browser's Web Audio API to prevent websites from using subtle audio signal differences to identify a device.
Fingerprint
Audio Fingerprinting
A browser tracking method that processes audio signals through a device's hardware and software stack to generate a unique identifier based on the output variations.
B
Cloud
Backup Profile Syncing
The process of automatically saving and synchronizing browser profile data to a remote or cloud location to prevent loss and enable restoration across devices.
Automation
Browser Automation
The use of scripts or tools to programmatically control a browser, simulating user actions like clicking, typing, and navigating without manual input.
Browser
Browser Emulation Layers
Software components that replicate the behavior and properties of a real browser environment, used to make automated or headless browsers appear more human-like to detection systems.
Browser
Browser Extension
A small software add-on installed in a browser that adds or modifies functionality, such as blocking ads, managing passwords, or altering browser behavior.
Fingerprint
Browser Fingerprint Entropy
A measure of how unique and identifying a browser's fingerprint is. Higher entropy means the browser is more distinguishable across the web.
Fingerprint
Browser Fingerprinting
A tracking technique that collects attributes from a user's browser and device, such as fonts, screen size, and plugins, to create a unique identifier without using cookies.
Browser
Browser Isolation
A security approach that separates each browser session into its own contained environment, preventing data, cookies, and fingerprints from leaking between sessions.
Browser
Browser Leaks
Unintended exposure of a user's real identity or network information through the browser, often via WebRTC, DNS, or JavaScript APIs despite using a proxy or VPN.
Browser
Browser Profile
A self-contained browser instance with its own isolated cookies, cache, fingerprint, and settings, used to manage separate identities or sessions independently.
Browser
Browser Tracking
The practice used by websites and third parties to monitor a user's online behavior across sessions and sites, typically through cookies, fingerprinting, or pixel tags.
Browser
Browser Version Management
The practice of controlling which browser version is used within a profile or session, ensuring compatibility and consistency when spoofing or automating browser environments.
Automation
Bulk Profile Creation
The automated generation of multiple browser profiles at once, each with unique fingerprints and settings, used to scale operations across many independent identities.
C
Browser
Cache Isolation
The separation of cached data between browser sessions or profiles, ensuring that stored files and resources from one session cannot be accessed or detected by another.
Fingerprint
Canvas Fingerprinting
A browser tracking method that draws invisible graphics using the HTML5 Canvas API and analyzes subtle rendering differences to generate a unique device identifier.
Fingerprint
Canvas Spoofing
A technique that alters or randomizes the output of the Canvas API to prevent websites from using canvas rendering differences to fingerprint and identify a device.
Automation
CAPTCHA
A challenge-response test used by websites to distinguish human users from bots, typically requiring the user to identify images, solve puzzles, or check a box.
Automation
CDP (Chrome DevTools Protocol)
A protocol that allows external tools to communicate with and control Chromium-based browsers, widely used in browser automation and testing frameworks.
Browser
Chromium-based Browser
A web browser built on Google's open-source Chromium engine, which serves as the foundation for browsers like Chrome, Edge, and most anti-detect browsers.
Fingerprint
ClientRects Fingerprinting
A fingerprinting technique that measures the precise pixel positions of HTML elements on a page to exploit rendering differences across devices and identify users.
Fingerprint
Cloaking
A technique where different content or information is shown to search engines or detection systems than what is shown to regular users, often to avoid scrutiny or bypass filters.
Cloud
Cloud Device
A virtual device hosted on remote servers that can be accessed and operated over the internet, used to run browser sessions without relying on local hardware.
Cloud
Cloud Farming
The practice of managing and operating multiple accounts or browser sessions remotely using cloud-based infrastructure, enabling large-scale automation without local resources.
Cloud
Cloud Profile Sync
The automatic synchronization of browser profile data, including cookies, settings, and fingerprint configurations, to cloud storage for access across multiple devices.
Cloud
Cloud Storage
A model of data storage where files and information are saved on remote servers accessed via the internet, rather than on a local device or hard drive.
Cookie
Cookie
A small piece of data stored in a browser by a website to remember user information, session state, preferences, or tracking identifiers across visits.
Cookie
Cookie Collector
A tool or process that automatically gathers cookies from websites, used to warm up browser profiles or simulate authentic browsing history before account operations.
Cookie
Cookie Converter
A tool that transforms cookies from one format to another, allowing them to be imported or exported across different browsers, tools, or automation frameworks.
Cookie
Cookie Manager
A browser feature or external tool that allows users to view, edit, import, export, and delete cookies stored within a browser session or profile.
Tracking
Cross-Site Tracking
A method used by advertisers and trackers to monitor a user's activity across multiple websites by sharing identifiers such as cookies, pixels, or fingerprints between domains.
Cookie
Cookie Injection
The process of manually or programmatically inserting cookies into a browser session to simulate a logged-in state or replicate a specific user session.
D
Network
Datacenter Proxy
A proxy server hosted in a datacenter rather than on a residential connection, offering fast speeds but more easily detected and blocked by websites due to its non-residential origin.
Browser
Data Isolation
The practice of keeping data from different browser sessions, profiles, or users completely separated so that no information leaks or overlaps between them.
Security
Data Leakage
The unintended exposure of sensitive data, such as real IP addresses, cookies, or identifiers, outside of a secured or isolated environment.
Network
Dedicated Proxy
A proxy server assigned exclusively to a single user, providing a consistent IP address that is not shared with others, reducing the risk of blocks or bans.
Security
Detection System
A platform's automated infrastructure that analyzes behavioral, technical, and network signals to identify bots, fake accounts, or policy-violating activity.
Browser
Device Emulation
The simulation of a specific device's hardware and software characteristics within a browser session, making it appear as though the user is operating from a different device.
Fingerprint
Device Memory Spoofing
A technique that falsifies the reported amount of RAM available on a device to prevent websites from using memory size as a fingerprinting signal.
Privacy
Digital Anonymity
The state of operating online without revealing one's true identity, achieved by masking identifiers such as IP address, browser fingerprint, and behavioral patterns.
Fingerprint
Digital Fingerprint
A unique combination of browser and device attributes collected by websites to identify and track a user without relying on cookies or login credentials.
Fingerprint
Digital Fingerprint Spoofing
The act of deliberately falsifying browser and device attributes to make a session appear as a different, unique identity and avoid fingerprint-based detection.
Privacy
Digital Identity
The complete set of digital attributes, including IP address, browser fingerprint, cookies, and behavior, that collectively represent a user's online presence.
Automation
Distributed Automation
The execution of automated browser tasks across multiple machines, proxies, or cloud instances simultaneously to scale operations and avoid detection from a single source.
Network
DNS Leak Protection
A security measure that prevents DNS queries from being sent outside an encrypted tunnel, ensuring a user's real DNS server and location are not exposed to third parties.
Account
Duplicate Account Detection
A platform's mechanism for identifying when multiple accounts are operated by the same person, typically by matching shared fingerprints, IPs, cookies, or behavioral patterns.
Fingerprint
Dynamic Fingerprinting
A fingerprinting approach where the collected attributes change or adapt over time, making it harder for users to consistently spoof or evade detection across sessions.
Network
Dynamic IP Rotation
The automatic switching of IP addresses at set intervals or per request, used to distribute traffic across multiple IPs and avoid rate limiting or IP-based bans.
E
Browser
Emulated Device
A virtual representation of a physical device — such as a phone or tablet — created by configuring a browser to mimic that device's screen size, user agent, and hardware properties.
Browser
Environment Isolation
The practice of keeping each browser session's data, including cookies, cache, and local storage, completely separate so activity in one session cannot affect or be detected by another.
Fingerprint
Extension Fingerprinting
A tracking technique that identifies a browser by detecting which extensions are installed, since the combination of installed extensions can be unique to a specific user.
F
Fingerprint
Fingerprint Rotation
The practice of periodically switching a browser's fingerprint attributes to prevent long-term tracking based on a consistent fingerprint signature.
Fingerprint
Font Fingerprinting
A tracking method that identifies a browser by measuring which fonts are available on a device, since the installed font set often varies between users and operating systems.
Tracking
Fraud Detection
A system used by websites and platforms to identify suspicious or rule-breaking behavior by analyzing patterns in user actions and browser signals.
Fingerprint
Fingerprint Consistency
The degree to which all browser fingerprint attributes such as timezone, language, and hardware specs match each other logically, making a profile appear as a real, coherent device.
Fingerprint
Fingerprint Noise Injection
A privacy technique that introduces small, randomized variations into fingerprint data to prevent tracking systems from consistently identifying the same browser across sessions.
Fingerprint
Fingerprint Profile
A saved collection of browser fingerprint attributes such as screen resolution, fonts, and hardware details that defines how a browser session presents itself to websites.
G
Network
Geolocation Spoofing
The act of falsifying a browser's reported geographic location to make websites believe the user is accessing them from a different country or region.
Browser
Ghost Browsing
A browsing mode that does not save any session data locally, ensuring no cookies, history, or cache persist after the session ends.
Account
Ghost Account
A dormant or inactive account kept alive to occupy a username or maintain platform presence without regular activity.
Cookie
Global Cookie Management
The centralized handling of cookies across multiple browser profiles or sessions, allowing users to import, export, and sync cookie data from a single interface.
Fingerprint
GPU Fingerprinting
A tracking technique that identifies a device by analyzing how its graphics processor renders specific visual elements, since GPU output varies across hardware and driver combinations.
Account
Group Profile Management
The ability to organize, configure, and control multiple browser profiles as a batch, allowing teams to apply settings, assign proxies, or share access across many profiles at once.
H
Fingerprint
Hardware Concurrency
The number of logical CPU cores reported by a device, often used as a signal in browser fingerprinting.
Fingerprint
Hardware Fingerprinting
The process of identifying a device based on its hardware-related attributes such as CPU, GPU, and memory characteristics.
Browser
Headless Browser
A browser that operates without a graphical user interface and is typically used for automation or testing tasks.
Fingerprint
Headless Detection
The technique of identifying whether a browser is running in headless mode using behavioral or technical signals.
Network
HTTP Header
Metadata sent with HTTP requests and responses that can reveal information about the client, environment, and request context.
Network
HTTP Proxy
An intermediary server that routes HTTP requests between a client and destination, masking the original IP address.
Automation
Human Behavior Simulation
The practice of mimicking realistic user actions such as mouse movement, typing, and timing patterns to reduce detection.
I
Network
IP Address
A unique numerical identifier assigned to a device on a network, used to route traffic and identify its origin.
Network
IP Rotation
The process of periodically changing a device’s IP address to reduce tracking and distribute network activity.
Network
IP Reputation
A score or classification assigned to an IP address based on its historical behavior and trustworthiness.
Network
IP Leak
An unintended exposure of a device’s real IP address despite the use of a proxy or masking layer.
Network
ISP Proxy
A proxy that uses IP addresses assigned by Internet Service Providers, combining residential trust with datacenter performance.
Tracking
Identity Linking
The process of connecting multiple accounts or sessions to the same user based on shared signals or behaviors.
Browser
IndexedDB
A browser-based storage system that allows websites to store large amounts of structured data on the client side.
J
Fingerprint
JavaScript Fingerprinting
The use of JavaScript to collect device and browser attributes for the purpose of uniquely identifying users.
Automation
JavaScript Injection
The act of inserting and executing custom JavaScript code within a webpage to modify behavior or automate interactions.
K
Fingerprint
Keystroke Dynamics
A behavioral biometric technique that analyzes typing patterns such as speed and rhythm to identify users.
L
Browser
Local Storage
A browser-based storage mechanism that allows websites to store data persistently on a user's device.
Fingerprint
Location Spoofing
The practice of altering a device’s reported geographic location to match a desired region or IP address.
Account
Login Session
A temporary authenticated state that allows a user to interact with an account without re-entering credentials.
Fingerprint
Login Fingerprinting
The process of analyzing device and behavioral signals during login to identify or verify a user.
Network
Latency Simulation
The intentional adjustment of network response timing to mimic realistic connection conditions.
Marketing
Lookalike Audience
A targeting method that uses existing user data to find new users with similar characteristics and behaviors.
M
Tracking
Machine Learning Detection
The use of trained models to identify patterns and anomalies in user behavior or device signals for detection purposes.
Fingerprint
Mobile Fingerprinting
The process of identifying mobile devices based on their unique hardware, software, and behavioral attributes.
Account
Multi-Account Management
The practice of operating and maintaining multiple user accounts in a structured and organized manner.
Browser
Multi-Session Isolation
The separation of multiple browsing sessions to prevent shared data, fingerprints, or tracking between them.
Account
Minting Wallet
A cryptocurrency wallet specifically used to create or participate in the minting of digital assets such as NFTs.
N
Fingerprint
Navigator Object
A JavaScript object that provides information about the browser and device, often used in fingerprinting.
Fingerprint
Network Fingerprinting
The identification of a user based on network-level characteristics such as IP behavior and connection patterns.
Network
Network Latency
The time delay between a request and response over a network, often used as a behavioral signal.
Browser
Non-Persistent Storage
A type of browser storage that is cleared after a session ends and does not retain data permanently.
Account
NFT Minting
The process of creating a new non-fungible token on a blockchain by recording its data on-chain.
O
Fingerprint
Operating System Fingerprinting
The identification of a device’s operating system based on system-level attributes and signals.
Tracking
Online Tracking
The practice of monitoring user activity across websites using various tracking technologies and identifiers.
Marketing
Organic Traffic
Website visitors acquired through unpaid sources such as search engines or direct discovery.
P
Browser
Page Visibility API
A browser API that detects whether a webpage is active or hidden, often used to monitor user engagement and behavior.
Marketing
PPC
A digital advertising model where advertisers pay a fee each time their ad is clicked.
Cookie
Pre-Made Cookies
Previously collected and stored cookies that can be reused to replicate an existing session or user state.
Browser
Privacy Browser
A web browser designed to limit tracking and enhance user privacy by blocking or minimizing data collection.
Tracking
Privacy Sandbox
A set of technologies aimed at replacing traditional tracking methods with privacy-focused alternatives in web browsers.
Network
Private Proxy
A proxy server exclusively assigned to a single user, offering consistent identity and reduced risk of shared reputation issues.
Network
Proxy Pool
A collection of multiple proxy servers used to distribute requests and reduce detection risk.
Network
Proxy Rotation Strategy
A defined method for changing proxies over time or per request to maintain anonymity and avoid detection.
Last updated
Was this helpful?