From 029d456dde4b5256a1bf8da0ec0fd1a6ec0db306 Mon Sep 17 00:00:00 2001 From: z0ccc <70310180+z0ccc@users.noreply.github.com> Date: Mon, 6 Jun 2022 13:40:28 -0400 Subject: [PATCH] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 8a5d6c1..f5414f9 100755 --- a/README.md +++ b/README.md @@ -10,9 +10,9 @@ Vytal can mock your timezone, locale, geolocation and user agent. This data can Vytal is utilizes the chrome.debugger API to mock this data. This allows the data to be changed in frames, web workers and during the initial loading of a website. It also makes the spoofing completely undetectable. -Most extensions that provide anti-fingerprinting features rely on content scripts to inject script tags into webpages. Code injected with this method is used to spoof data points. There are many limitations to script tag injection method which you can read about here: https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/ +Most extensions that provide anti-fingerprinting features rely on content scripts to inject script tags into webpages. There are many limitations to script tag injection method which you can read about here: https://palant.info/2020/12/10/how-anti-fingerprinting-extensions-tend-to-make-fingerprinting-easier/ -The chrome.debugger API allows data points to be spoofed without the limitations of script tag injection's. +The chrome.debugger API can spoof data points without the limitations of script tag injection's. You can test and compare Vytal and other extensions on https://vytal.io