You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Chrome's TLS fingerprint when connecting to a websocket is different than its usual fingerprint (for example, the ALPN tls extension only advertises http/1.1 as a supported protocol). To fully impersonate Chrome on a websocket connection, we need to modify the TLS fingerprint and some HTTP headers.
Currently I'm not aware of any websocket server blocking connections based on fingerprint, so this is on a bit of lower priority.
The text was updated successfully, but these errors were encountered:
Chrome's TLS fingerprint when connecting to a websocket is different than its usual fingerprint (for example, the ALPN tls extension only advertises
http/1.1
as a supported protocol). To fully impersonate Chrome on a websocket connection, we need to modify the TLS fingerprint and some HTTP headers.Currently I'm not aware of any websocket server blocking connections based on fingerprint, so this is on a bit of lower priority.
The text was updated successfully, but these errors were encountered: