logoalt Hacker News

Rasboratoday at 6:25 PM1 replyview on HN

TLS fingerprinting is not sufficient to stop residential proxies, the proxy acts as a transparent pass-through at the TLS layer making it trivial to use something like curl_cffi to mimic a real browser TLS fingerprint.

However residential proxies do have a weakness, since they need to maintain 2 separate TCP conenctions you can exploit RTT differences between layers 3 and 7 to detect if the connection to your server is being terminated somewhere along the path. Solutions exist that can reliably detect and block residential proxies, for example: https://layer3intel.com/tripwire


Replies

VladVladikofftoday at 9:29 PM

Cool link thanks for sharing. Too bad it is so expensive. Maybe I’ll find a way to DIY.