Fingerprint Injection
In Camoufox, data is intercepted at the C++ implementation level, making the changes undetectable through JavaScript inspection.
To spoof fingerprint properties, pass a JSON containing properties to spoof to the Python interface:
>>> with Camoufox(config={"property": "value"}) as browser:
Config data not set by the user will be automatically populated using BrowserForge fingerprints, which mimic the statistical distribution of device characteristics in real-world traffic.
Camoufox does not support injecting Chromium fingerprints. Any competent WAF will test for JavaScript behavior unique to V8, which is impossible to spoof.
Getting started
Camoufox accepts the following properties: