Skip to content

Spoofing Detection

Detect fingerprint tampering by cross-referencing browser signals for inconsistencies.

Usage

ts
const fp = await neoprint.get()
const spoof = neoprint.detectSpoofing(fp)

console.log(spoof.isLikely)  // true / false
console.log(spoof.score)     // 0.0 – 1.0
console.log(spoof.signals)   // ['gpu_vendor_mismatch', ...]

Detection Rules

RuleWhat it catches
gpu_vendor_mismatchWebGL vendor differs from WebGPU vendor
platform_ua_mismatchPlatform says Mac but UA says Windows
webdriver_detectednavigator.webdriver is true
touchpoints_screen_mismatchDesktop screen with mobile touch points
memory_concurrency_mismatch16 cores but 2GB RAM
canvas_blockedCanvas blocked but WebGL works
audio_blockedAudio context unavailable
too_many_fonts100+ fonts detected (font spoofing)
timer_precision_anomalyTimer rounded to 100ms (resistFingerprinting)

Released under the MIT License.