Blog Articles

All Articles

The Limits of JA3 - What it is, why it's not enough for accurate device identification
October 26, 2023

The limits of JA3: Why it’s not enough for accurate device identification

Discover JA3 fingerprinting, its uses in device identification, its limitations, and what's needed for robust identification.

How to Prevent Coupon and Promo Abuse and Increase Repeat Sales
October 25, 2023

How to Prevent Coupon and Promo Abuse

Learn strategies to mitigate coupon and promo abuse to safeguard your profit margins and enhance customer experiences.

Maximizing Identification Accuracy with Fingerprint’s Cloudflare Proxy Integration
October 23, 2023

Maximize identification accuracy with Cloudflare proxy integration

Learn how Fingerprint Pro’s Cloudflare Proxy Integration aids in accurate device identification despite privacy policies.

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites
October 19, 2023

Demo: Chrome Site Engagement Feature Can Leak Frequently Visited Sites

We explain how Chromium’s Lookalike Warnings and Site Engagement can leak information on frequently visited sites to untrustworthy websites.

How to Increase Revenue by Identifying & Preventing Account Sharing
October 18, 2023

Account Sharing: The Step-By-Step Prevention Guide

Address account sharing impacts with our tutorial on detection techniques and converting users into paying customers.

Announcing our Series C Fundraising Round
October 17, 2023

Announcing our Series C Fundraising Round

Fingerprint raises $33 million in Series C funding to bolster fraud prevention and support for Enterprise organizations.

Demo: How Malicious Apps Can Easily Hide Copying Clipboard Data on Android 14
October 16, 2023

Demo: How apps can hide clipboard data copying on Android 14

Your clipboard data on Android 14 might be at risk. See how to protect your information with our guide.

SMS OTP Replacement Device Identification
October 10, 2023

Replace SMS OTP with device fingerprinting for secure and frictionless authentication

Understand PSD2, EBA, and SCA regulations, and how device fingerprinting can enhance secure payment compliance.

Apple & Google Privacy Updates Webinar Recap
October 2, 2023

Apple & Google Privacy Updates Webinar Recap

Get updated on the recent browser privacy changes from Apple and Google in this recap of our webinar with our co-founder and CTO Valentin Vasilyev.

vpn-detection icon
September 22, 2023

What is VPN detection? How to detect a VPN with an API

Learn VPN detection methods including database validation, timezone mismatch, OS mismatch & more. Detecting VPNs better identify users and prevents fraud.

large language model fraud
September 20, 2023

LLM-generated fraud: Guide to malware and vulnerabilities

Learn how fraudsters use Large Language Models for attacks and get strategies to combat AI-powered cybercrime.

Using VPN and Tor: Benefits, Risks, and How They Affect Browser Fingerprints
September 19, 2023

Using VPN and Tor: Benefits, risks, and impact on fingerprinting

VPNs and Tor offer anonymity by hiding your true IP address. Discover their benefits and what to consider for privacy and security.