DEV Community

FireKey Team
FireKey Team

Posted on

5 Browser Fingerprints Platforms Use to Ban Multi-Account Sellers (And How to Beat Them)

If you've ever had multiple seller accounts banned simultaneously — even though you used separate proxies — browser fingerprinting is likely the culprit.

What Is Browser Fingerprinting?

Browser fingerprinting identifies users based on unique browser/device characteristics. Unlike cookies, fingerprints can't be cleared by users.

The 5 Key Fingerprints

1. Canvas Fingerprint

When a website asks your browser to render an HTML Canvas element, your GPU produces results with tiny device-specific variations. The hash of this result is your Canvas fingerprint — consistent across sessions and surviving cookie deletion.

const canvas = document.createElement('canvas');
const ctx = canvas.getContext('2d');
ctx.fillText('fingerprint', 10, 40);
const hash = canvas.toDataURL(); // Unique per device
Enter fullscreen mode Exit fullscreen mode

2. WebGL Renderer Fingerprint

WebGL reveals your graphics card model and driver version. Five accounts all showing the same renderer string = strong evidence they're on the same machine.

3. AudioContext Fingerprint

Your sound card processes audio with subtle hardware variations, creating another unique identifier increasingly deployed by major platforms.

4. Font Enumeration

The specific combination of fonts installed on your system is surprisingly unique. Platforms test for 500+ fonts.

5. Navigator Fingerprint Cluster

Browser version + OS + screen resolution + timezone + language = coherent device profile. A proxy set to "Los Angeles" but timezone showing Asia/Shanghai? Flagged immediately.

Why Proxies Alone Don't Work

  1. Platform sees different IPs ✓
  2. Platform runs Canvas fingerprint → identical hash
  3. Accounts linked and flagged

The Solution

Anti-detect browsers intercept fingerprint APIs and return unique values per profile. FireKey (app.firekey.ai) handles 50+ parameters, is Chromium-based, and is currently free in open beta.

Quick Test

Open browserleaks.com in two of your "separate" profiles and compare Canvas hashes. If they match — you're vulnerable.

Top comments (0)