Is someone using an antidetect browser? Which one would you recommend?

I have searched on the forum, and I havent found any thread focusing on this topic. Is anyone currently using an antidetect browser, if so, which one? I have come across a dozen of them, but I haven’t been able to decide which one is more private and secure. Is it perhaps a more drastic and safer solution than hardened browsers? Or, on the contrary, since most of them are closed source, is it not worth it?
I remember using “MultiLogin” a long time ago, and it seemed like a very useful application for simulating genuine profiles and making our activity more human-like. Do you recommend any such application?

In Safari upon activation of Developer Toolset you can select which User Agent you’d like to simulate. I dont know if this can be done in browsers for Windows.

If not, than you can always write your own JS script that will replace genuine user-agent string with whatever you like (upto 256 chars). Its not that difficult.

1 Like

I don’t recall Safari being recommended around here as a secure option for maintaining anonymity and privacy. I don’t want it solely to modify the User Agent; these types of browsers save an isolated profile with their own settings. It’s like having a new browser for each account. I find it very useful.

1 Like

Safari is not recommended. And changing your user agent will not make you undetectable. User agent is just one of many finger printing techniques. Per PG recommendation, Mullvad Browser is good for mitigating fingerprinting or if your threat model requires is Tor Browser is the most effective. You could also use Firefox + arkenfox user.js which will be similar but not quite as good as Mullvad Browser.

1 Like

What is an “anti-detect” browser and what value do you get from it (what problem does it solve for you)?


Maybe lynx

1 Like

Yes, I don’t just need it to replace the User Agent. They are also useful for hiding other identifiable parameters. I’m interested in them because, in addition to offering a rigorously similar anonymity to Mullvad or hardened Firefox, they are not so evident when it comes to hiding information. I mean, when you use Mullvad, the admin of the page you visit knows that you are using it to camouflage your identity, because they will see unique, strange, and invariant codes associated with your computer. This, from pov, I consider it a risk and a plausible way of tracking.
On the other hand, if you have an ordinary profile where any possible data extractable through the browser can be visualized and are common or frequently similar to usual browsers, nothing strange will be deduced, moreover, you can save your history, extensions, bookmarks, personal settings, etc.
You can generate multiple profiles, so you can appear to connect from multiple computers without being detected as one.

I couldn’t give you a precise definition, but I can tell you that they try to mimic the characteristics of Mullvad or browsers with modifications for anonymization.
The reason for my interest is written above this message.

I haven’t found any info about a browser with this name.

I might be misunderstanding something, but ^ I’m not sure that this is possible on a technical level.

My thinking is that:

  1. Users of mainstream browsers are all nearly uniquely identifiable (because mainstream browsers don’t have strong anti-fingerprinting or anti-tracking protections).
  2. Therefore in order to “blend in” with mainstream users, you would have to be as easily identifiable as mainstream users, which would defeat the purpose of blending in with this crowd in the first place since it is a crowd of uniquely identifiable browsers.

The reason Mullvad and Tor Browser which are considered the best and most serious browsers with respect to anti-fingerpinting take the approach they take (blending in with other users of the same browser, not trying to blend in with mainstream users, is in part because it is not technically feasible to blend in with mainstream users in a way that doesn’t break anonymity.

Sticking to the “fingerprint analogy” the Mullvad/Tor Browser approach is for everyone to wear the same exact gloves (stand out from the crowd, but not stand out from each other), because the alternative (not wearing gloves) means that you’ll blend in with everyone, but be leaving your uniquelly identifiable prints on everything you touch. Better to be part of a small group of identically gloved people leaving no prints, than a large group of people leaving unique prints everywhere you go. Where the analogy ends is that in the real world someone would have to actually check prints, online, fingerprints can be checked constantly and automatically.

If you feel I’ve missed something, this is a topic (fingerprinting) I am seekign to learn more about, so please push back on anything you think I misunderstand, or let me know anything I’ve overlooked or left out. There is a good chance I got something wrong, as I don’t have an example of a “antidetect” browser to base my response off of, and have never heard the term discussed in any privacy or security circles, so I’m fairly ignorant to the concept (but not ignorant to fingerprinting and tracking protections generally).

1 Like

Safari (especially on iOS) is one of the best options against fingerprinting, because of the huge homogeneous crowd per device type. It doesn’t have the best mitigations, but the homogeneous hardware and software stacks make up for that.


What do you mean exactly?

How will they do that if you look the same as many other users?

Then, Mullvad Browser ? The best way to spoof the Mullvad Browser is by using the Mullvad Browser. Spoofing it with extensions and modification will only make you stand-out more. There’s two main way to consider Web-Browser privacy :

  • either act as a ninja in a crowd, by spoofing and faking most of your fingerprintable data which might be what you are trying to do by anonymization.
  • and there’s wearing a standard jean and t-shirt in a crowd, looking as normal and identical as most users there, by creating a group of web-browser users which are all look-alike, with the same fixed fingerprintable information, hence the option the Tor Browser (And the Mullvad Browser by extension).
1 Like

I definitely agree with you :slight_smile: I use something similar to what you describe but Ive done it differently:

Installed bare Firefox, than enabled Firefox containers, and created new container for each activity.

@LongLivePutin as of Lynx: please see this page