Update README & bump to beta.7

This commit is contained in:
daijro 2024-09-22 22:46:14 -05:00
parent 8385561b19
commit a6aeb19ca9
2 changed files with 35 additions and 10 deletions

View file

@ -16,13 +16,15 @@ Camoufox aims to be a minimalistic browser for robust fingerprint injection & an
## Features ## Features
- Fingerprint injection (override properties of `navigator`, `window`, `screen`, etc) ✅ - Invisible to **all major anti-bot systems** 🎭
- Patches to avoid bot detection ✅ - Fingerprint injection (without JS injection!) ✅
- Custom Playwright Juggler implementation for the latest Firefox ✅ - Override properties for device, viewport, screen, navigator, etc. ✅
- Font spoofing & anti-fingerprinting ✅ - Font spoofing & anti-fingerprinting ✅
- WebRTC IP spoofing ✅ - WebRTC IP spoofing ✅
- Debloated & optimized for memory and speed ✅ - Geolocation & timezone spoofing ✅
- [PyPi package](https://pypi.org/project/camoufox/) for updates & unique fingerprint injection 📦 - Blocks & circumvents ads 🛡️
- Debloated & optimized for memory and speed 🚀
- [PyPi package](https://pypi.org/project/camoufox/) for updates & fingerprint rotation 📦
- Stays up to date with the latest Firefox version 🕓 - Stays up to date with the latest Firefox version 🕓
## Sponsors ## Sponsors
@ -64,8 +66,7 @@ Camoufox is built on top of Firefox/Juggler instead of Chromium because:
### What's planned? ### What's planned?
- Continue research on potential leaks - Continue research on potential leaks
- ~~Create a PyPi package for downloading & updating Camoufox~~ - Integrate into [hrequests](https://github.com/daijro/hrequests)
- ~~Integrate [BrowserForge](https://github.com/daijro/browserforge) for fingerprint generation~~
- Built in TLS fingerprinting protection using [Hazetunnel](https://github.com/daijro/hazetunnel) - Built in TLS fingerprinting protection using [Hazetunnel](https://github.com/daijro/hazetunnel)
- Create integration tests - Create integration tests
- Chromium port (long term) - Chromium port (long term)
@ -259,6 +260,26 @@ Camoufox can override the following network headers:
</details> </details>
<details>
<summary>
Geolocation
</summary>
| Property | Status | Description |
| --------------------- | ------ | ------------------------------------------------------------------------------------------------------------------------------------------------------ |
| geolocation:latitude | ✅ | Latitude to use. Requires `geolocation:longitude` to be set as well. |
| geolocation:longitude | ✅ | Longitude to use. Requires `geolocation:longitude` to be set as well. |
| geolocation:accuracy | ✅ | Accuracy in meters. This will be calculated automatically using the decminal percision of `geolocation:latitude` & `geolocation:longitude` if not set. |
| timezone | ✅ | Set a custom TZ timezone (e.g. "America/Chicago"). This will also change `Date()` to return the local time. |
**Notes:**
- Setting `geolocation:latitude` & `geolocation:longitude` will automatically accept Location permission prompts.
- `timezone` **must** be set to a valid TZ identifier. See [here](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones) for a list of valid timezones.
- To change your locale, set the `intl.accept_languages` preference.
</details>
<details> <details>
<summary> <summary>
WebRTC IP WebRTC IP
@ -338,6 +359,7 @@ Miscellaneous (WebGl spoofing, battery status, etc)
- Support for spoofing both inner and outer window viewport sizes - Support for spoofing both inner and outer window viewport sizes
- Network headers (Accept-Languages and User-Agent) are spoofed to match the navigator properties - Network headers (Accept-Languages and User-Agent) are spoofed to match the navigator properties
- WebRTC IP spoofing at the protocol level - WebRTC IP spoofing at the protocol level
- Geolocation & timezone spoofing
- etc. - etc.
#### Anti font fingerprinting #### Anti font fingerprinting
@ -380,6 +402,9 @@ Miscellaneous (WebGl spoofing, battery status, etc)
## Stealth Performance ## Stealth Performance
In Camoufox, all of Playwright's internal Page Agent Javascript is sandboxed and isolated.
This makes it **impossible** for a page to detect the presence of Playwright through Javascript inspection.
### Tests ### Tests
Camoufox performs well against every major WAF I've tested. (Original test sites from [Botright](https://github.com/Vinyzu/botright/?tab=readme-ov-file#browser-stealth)) Camoufox performs well against every major WAF I've tested. (Original test sites from [Botright](https://github.com/Vinyzu/botright/?tab=readme-ov-file#browser-stealth))

View file

@ -1,2 +1,2 @@
version=130.0.1 version=130.0.1
release=beta.6 release=beta.7