Contact
Stealth

JA3 Fingerprint

A method for creating SSL/TLS client fingerprints by hashing the cipher suites, extensions, and elliptic curves from the Client Hello message. Created by Salesforce researchers. Produces a 32-character MD5 hash unique to each TLS implementation.

Related Articles

More Stealth Terms

Account Warming

The practice of gradually building activity on new accounts to appear as legitimate users before using them at scale. Involves realistic browsing patterns, organic interactions, and progressive feature usage over days or weeks.

Anti-Detect Browser

A specialized browser that manages multiple isolated browser profiles, each with unique fingerprints (canvas, WebGL, fonts, timezone, user agent). Used for multi-account operations, ad verification, and privacy. Leading tools: Multilogin, GoLogin, AdsPower.

Audio Fingerprinting

A fingerprinting technique that uses the Web Audio API to generate audio signals and measure how the browser processes them. Differences in audio hardware, drivers, and software produce unique oscillation patterns per device.

Bot Detection

Technology that identifies automated traffic by analyzing behavioral patterns, fingerprints, and network characteristics. Detection signals include mouse movement, typing patterns, navigation timing, TLS fingerprints, and JavaScript execution anomalies.

Browser Fingerprinting

A tracking technique that identifies users by collecting unique characteristics of their browser and device — screen resolution, installed fonts, WebGL renderer, timezone, language, and dozens more. More persistent than cookies because it requires no stored data.

Browser Profile

An isolated browser environment with its own fingerprint, cookies, local storage, and proxy configuration. Each profile appears as a distinct device to websites. Managed by anti-detect browsers or browser profile managers.

Related Resources