Identical privacy posture on any OS • Cross-platform compatibility • Fingerprint protection validated across 31+ tracking scenarios
BotBrowser is a privacy first browser core that keeps fingerprint signals uniform across every platform, preventing tracking systems from collecting and correlating tracking data to identify users across devices. Run the same profile on Windows, macOS, or Linux and the fingerprint posture stays identical each time.
All engineering focuses on privacy research, cross-platform tracking-resistance validation, and maintaining protected environments for authorized defensive benchmarking. Review the project Legal Disclaimer and Responsible Use Guidelines before using the software.
What makes BotBrowser different: Cross-platform privacy browser core with unified fingerprint technology that prevents tracking data collection and device linkage.
| High-fidelity Profile Simulation keeps synthetic and aggregated fingerprints ready for policy-compliant privacy experiments | Latest Chromium Base stays synced to the newest stable Chrome so trackers cannot key on stale engines |
| Advanced Programmatic Control offers Playwright/Puppeteer integration with CDP leak blocking so privacy tooling leaves no telemetry residue | Network Stack Parity with Full-Proxy QUIC/STUN (UDP over SOCKS5, ENT Tier3 feature) delivers Chromium-level tunneling so geo metadata does not leak and privacy labs maintain clean transport parity |
| Distributed Privacy Consistency lets you verify privacy protection across multiple browser instances simultaneously with Mirror, validating privacy posture in parallel (ENT Tier3 feature) | Execution Environment Isolation provides clean contexts that prevent framework artifacts and external libraries from exposing privacy leaks through side channels |
- Single profile, every host OS: identical UA, screen metrics, touch surfaces, fonts, and device APIs on Windows, macOS, Linux, and Android emulation so trackers see the same fingerprint everywhere.
- Built-in configuration handles touch simulation, device metrics, and locale/timezone detection from the proxy IP while still allowing CLI overrides when privacy experiments require them.
- Quick demos:
▶️ CreepJS Android •▶️ Iphey •▶️ Pixelscan
Step 1: Download
- Latest release for your OS
- Demo profile (any
.encfile)
Step 2: Launch (
- Windows example:
chrome.exe --bot-profile="C:\absolute\path\to\profile.enc" --user-data-dir="%TEMP%\botprofile_%RANDOM%"
- macOS/Linux commands follow the same pattern; see INSTALLATION.md for full instructions.
Step 3: Verify
- Visit CreepJS or your preferred tracking observatory to confirm identical privacy posture.
- Timezone/locale/language auto-derive from your proxy/IP; override via CLI only when needed.
📖 Complete Installation Guide →
const browser = await chromium.launch({
headless: true,
executablePath: BOTBROWSER_EXEC_PATH,
args: [`--bot-profile=${BOT_PROFILE_PATH}`],
'--proxy-server="socks5://usr:pwd@127.0.0.1:8989"', // or: "http://usr:pwd@127.0.0.1:8989"
});
const page = await browser.newPage();
await page.addInitScript(() => { delete window.__playwright__binding__; delete window.__pwInitScripts; });
await page.goto('https://abrahamjuliot.github.io/creepjs/');Notes:
- Use
--user-data-dirwith a unique temporary folder to avoid conflicts with running Chromium instances - Prefer
--proxy-serveror per-context proxies (ENT Tier1); auto timezone/locale detection applies in both cases - Avoid framework-specific proxy/auth options (e.g.,
page.authenticate()), which disable BotBrowser's geo-detection and may leak location information
Examples: Playwright • Puppeteer
More options:
- Framework-less approach:
--bot-script+ CDP (privileged context, earlier hook, fewer artifacts) - Docker: docker/README.md
- Full flags: CLI_FLAGS.md
Professional-grade privacy technology built on multi-layer fingerprint protection, network-stack control, and hardening.
- Multi Layer Noise: Canvas, WebGL, WebGPU, text, and AudioContext surfaces share deterministic, cross-worker noise with low-level Skia and HarfBuzz tuning so observers cannot correlate runs
- Execution Environment Isolation: Clean execution contexts prevent framework artifacts from exposing privacy leaks, framework-less
--bot-script, and console suppression PRO toggles maintain protected fingerprints across all execution modes - Configurable Stack: 30+ CLI overrides, per-context proxies (ENT Tier1) with auto geo, and session tooling (cookies, bookmarks, title, history) make privacy scripting flexible
- Typography Fidelity: DOM text renders from embedded Windows, macOS, and Android font packs so host fonts never leak during cross-OS simulation
- Client Hints Lockstep: DPR, device-memory, and UA-CH headers match JavaScript-visible values to keep header data in sync with runtime fingerprints
- Headless ↔ GUI Parity: Identical GPU, WebGPU, and media signals across browser modes so privacy regression tests remain stable
- Performance Controls: Precision FPS (ENT Tier2) and memory timings plus timing controls (ENT Tier1) and noise seeds (ENT Tier2) for reproducible privacy benchmarks
- Focus & Session Control: Always-active tabs, configurable ICE presets, and expanded media reporting keep privacy sessions believable
- Network Enhancements: per-context proxies (ENT Tier1) and optional local DNS solver (ENT Tier1), UDP-over-SOCKS5 (ENT Tier3), and SOCKS5H protocol support for tunnel-based resolution
Fingerprint Protection Implementation: Privacy Controls → Technical Design → Validation
This reference maps privacy protection goals to BotBrowser implementation details and validation evidence.
| Privacy Protection | Implementation | Reference |
|---|---|---|
| API standardization | navigator.webdriver standardized across all platforms so trackers cannot use API presence/absence as identification signal | ADVANCED_FEATURES#Chrome Behavior Emulation |
| Execution environment protection | Isolated execution context prevents framework artifacts from exposing privacy leaks | ADVANCED_FEATURES#Playwright/Puppeteer Integration |
| Graphics rendering consistency | Deterministic noise across Canvas, WebGL, WebGPU, and audio ensures protected fingerprints even in GPU-dependent scenarios | ADVANCED_FEATURES#Graphics & Rendering Engine |
| GPU fingerprint uniformity | Canvas and WebGPU rendering shares deterministic properties so GPU probes like WebBrowserTools return authentic results | CHANGELOG#2025-12-08 |
| Typography consistency | Embedded font engines for Windows, macOS, Linux, and Android ensure text rendering remains identical across platforms | ADVANCED_FEATURES#Cross-Platform Font Engine |
| Font availability uniformity | DOM queries return authentic font lists from embedded bundles so host system fonts cannot leak platform identity | ADVANCED_FEATURES#Cross-Platform Font Engine |
| Device capabilities | Profile-based device properties maintain protected device claims across all platforms | Profile Configs |
| Network topology privacy | WebRTC signaling stays protected through SDP and ICE controls preventing network topology leakage | ADVANCED_FEATURES#WebRTC Leak Protection |
| User agent coherence | Browser brand and version parity prevents UA string from revealing platform differences | CLI_FLAGS#Profile Configuration Override Flags |
| Header to API parity | Client Hints headers DPR, device-memory, and UA-CH align with JavaScript reported values preventing header based identification | ADVANCED_FEATURES#Browser & OS Fingerprinting |
| Execution mode parity | GPU, WebGPU, and media signals remain identical whether running headless or in GUI mode | ADVANCED_FEATURES#Headless & Incognito Compatibility |
| DNS privacy | Use local DNS solver (ENT Tier1) for private resolution that avoids DNS leaks and provider restrictions, or use SOCKS5H to keep DNS within proxy tunnels | CLI_FLAGS#Enhanced Proxy Configuration |
| Public IP discovery | Customizable IP lookup backend for geo derivation via --bot-ip-service (supports comma-separated endpoints; BotBrowser races them and uses the fastest successful response) |
CLI_FLAGS#Enhanced Proxy Configuration |
| Protocol conformance | HTTP/2 and HTTP/3 behavior matches Chrome specifications preventing protocol based differentiation | ADVANCED_FEATURES#Chrome Behavior Emulation |
| TLS fingerprint protection | JA3, JARM, and ALPN parameters optimized for uniform TLS negotiation across platforms | CHANGELOG |
Fingerprint Protection Matrix: Cross-Platform Coverage
| Category | Sample Capabilities |
|---|---|
| Graphics | Canvas/WebGL rendering, GPU micro-benchmarks, texture hash configuration |
| Network | WebRTC SDP configuration, proxy auth, connection management |
| Platform | Font fallback chains, cross-worker protection, OS-specific features |
| Performance | FPS simulation, memory timing, animation frame optimization |
📖 Complete Advanced Features Documentation →
📢 BotBrowser combines synthetic and aggregated profiles with flexible configuration for authorized privacy research. Profile protection and CLI settings enable comparative analysis without leaking host traits.
- Profile Foundation: Synthetic and aggregated profiles provide realistic fingerprint data for authorized privacy testing
- CLI Flexibility: Override profile settings at runtime without modifying encrypted files
- Cross-Platform Compatibility: A macOS profile works on Ubuntu; a Windows profile works on macOS; an Android profile can be fully emulated on any OS
- Smart Configuration: Timezone, locale, and languages intelligently derived from IP/proxy
- CLI Flags: See the ⚙️ CLI flags reference - Recommended for most users
⚠️ Note: This project must only be used in environments you own or where you have explicit authorization. Use against third-party services without permission is strictly prohibited and undermines the privacy mission.
Prefer a GUI launcher? See console/README.md for BotBrowserConsole usage, multi-instance management, and privacy profile selection.
Ensure your privacy protection works effectively across platforms and networks. Run a controller instance and multiple client instances to verify that all instances maintain identical privacy defenses, protecting you from tracking across Windows, macOS, Linux, and remote environments.
Launch with CLI flags: --bot-mirror-controller-endpoint=127.0.0.1:9990 on the controller, --bot-mirror-client-endpoint=127.0.0.1:9990 on each client. Runtime activation via CDP is also supported for programmatic control.
See Mirror documentation for detailed setup, testing procedures, and troubleshooting.
Our fingerprint protection validation examines how standardized browser fingerprints prevent tracking systems from collecting tracking data to identify users across platforms. By maintaining identical fingerprints across operating systems, we demonstrate how privacy protection prevents the tracking methods that malicious observers rely on.
⚠️ Research validation uses authorized test environments. See DISCLAIMER.
- Windows Profile on macOS: Fingerprint protection maintained so privacy defenses remain effective across platforms
- Android Emulation on Desktop: Mobile API parity enables fingerprint testing for cross-device privacy research
- Headless vs GUI Mode: Identical fingerprint behavior ensures privacy validation results remain effective across execution contexts
📖 Complete Validation Results & Research Data → - 31+ tracking analysis scenarios, 15+ tracking methodologies, statistical analysis
| Document | Description | Content Preview |
|---|---|---|
| Installation Guide | Platform-specific setup | Windows/macOS/Ubuntu guides, Docker deployment, troubleshooting |
| Advanced Features | Technical capabilities | 30+ CLI flags, privacy noise augmentation, GPU micro-benchmarks |
| Validation Results | Research data | 31+ tracking observatories, 50,000+ test sessions, statistical analysis |
| CLI Flags Reference | Command-line options | --bot-config-* flags, proxy auth, session management |
| Profile Configuration | Profile customization | Fingerprint control, cross-platform compatibility |
| Mirror | Distributed privacy consistency | Verify privacy protection across multiple browser instances simultaneously |
| CanvasLab | Canvas forensics tool | Canvas 2D recording with JSONL viewer (deterministic replay under development) |
| Examples | Code samples | Playwright, Puppeteer, bot-script integration |
Framework Integration:
- Playwright Examples - TypeScript/Python integration
- Puppeteer Examples - JavaScript scripting
- Bot-Script Examples - Framework-less
chrome.debuggerAPI
Profile Management:
- Demo profiles available in profiles/ directory
- Premium privacy profiles: Contact botbrowser@bk.ru
| Technical questions, source code access | botbrowser@bk.ru | |
| 📱 Telegram | Community support, quick questions | @botbrowser_support |
For advanced users who want to build BotBrowser from source:
- Requirements: Linux build environment, Chromium build tools
- Source Access: Available to qualified researchers and institutions
Contact botbrowser@bk.ru for source code access and compilation instructions.
| Issue | Platform | Solution |
|---|---|---|
| "Chromium" is damaged | macOS | Run xattr -rd com.apple.quarantine /Applications/Chromium.app |
| Missing dependencies | Ubuntu | Run sudo apt-get install -f |
| Profile file permission errors | All | Ensure .enc file has read permissions (chmod 644) |
| BotBrowser won't start or crashes | All | Check that your OS and Chromium version match the build; update BotBrowser to the latest release |
- Review the detailed Responsible Use Guidelines and Legal Disclaimer before requesting binaries or premium profiles.
- Maintain written authorization for every environment you test, and record the synthetic data sets you rely on.
- Contact the maintainers at botbrowser@bk.ru if you observe suspicious activity or need to report an abuse incident.
Legal Disclaimer & Terms of Use • Responsible Use Guidelines. BotBrowser is for authorized fingerprint protection and privacy research only.
