Introduction
It's easier to name the undetected ones that I haven't tested than it is to list all the others. they are all built on the same principle and with the same foundation: block, or at least make it possible to block, the main methods of deanon.FAQ
- Everything is free?
- How long?
the report will be updated with an influx of new questions
Guide
required extensions
- download and install the
You do not have permission to view link Log in or register now.
- installing the core of extensions
-
You do not have permission to view link Log in or register now..
- no mobile proxy? install
You do not have permission to view link Log in or register now.to configure a separate proxy for each container
- we are setting a
You do not have permission to view link Log in or register now.
- no mobile proxy? install
-
You do not have permission to view link Log in or register now.. We will use it to connect a proxy
-
You do not have permission to view link Log in or register now.. Protects against ip address deanonation
-
You do not have permission to view link Log in or register now.. Roughly speaking, video card anti-detection
-
You do not have permission to view link Log in or register now.. Blocking data transfer between different sites. the technology isYou do not have permission to view link Log in or register now.in the torah
-
You do not have permission to view link Log in or register now.. changes js and events
-
You do not have permission to view link Log in or register now.
-
You do not have permission to view link Log in or register now.. spoofing time for an ip address
-
You do not have permission to view link Log in or register now.. it loads the CPU relatively lightly
-
- 3. enabling the proxy
adding a proxy
selecting and connecting a proxy
4. Creating containers.I recommend using mobile proxies. If you sit on a data center proxy (proxy6.net etc.), the chance to fly away and get a black eye is 100% after completing work on one container, you need to change the ip address before entering the other one
We call the container names and save them. We perform the $(number of accounts) manipulation once. The browser is ready for anti-detection.
Additional extensions
-
You do not have permission to view link Log in or register now.
-
-
You do not have permission to view link Log in or register now.
- F2 — to open the panel
Features
- the name of the container is displayed in the search bar
- it's easy to switch between containers
1, 2, 3-container names
- enabling individual requests for each container.
- Go to the extension => Proxies => + => enter data from the proxy, save it.
Go to Assign => select the container and the desired proxy
- The active First Party Isolation extension is lit red
disabled extension
enabled extension
-