Anti‑Detect Browsers Overview of Features and testing experience

Before going ahead, some words of clarification.​

I am not affiliated with any anti detect provider and I sue them as tools, the field is dynamic and none of them is the best in every category or feature, it is important to understand how they work, why they work(or do not work). It is always a cat and mouse game vs mainly Google and “anti fraud” providers like SEON et all. One broswer might be the best at soemthing tomorrow and then collapse your whole infrastructure tomorrow. What you want is knowing how the config fields work and how to encapsulate bowser instances(“profiles”) from eachother. Some of them are consistently bad and the satin gloves are off, no prisoners will be taken, I have seen too many “recommendations” with no explanations for terrible products and terribly bad advise. Many people struggle to understand the concept of proxies and they play an important role in all this. Do not worry, this is a complicated field which requires IT expertise and/or the will to learn and constantly adapt. I will leave out the VM kernel level anti detects, they are far superior to any of the ones that will be mentioned here and they come with cons like exorbitant pricing and infrastructure requirements and they are definitely not for users who are not very very advanced and knowledgeable in IT and development. They rather dereve a separate thread.

Therefore, with no further ado, lets roll.

What Is an Anti-Detect Browser?​

An anti-detect browser is a specialized browser environment that allows users to create multiple isolated profiles(“instances”, each with its own unique digital fingerprint. This includes attributes like screen resolution, timezone, fonts, WebGL/Canvas/TLS characteristics, cookies, and more. By using these browsers, individuals can manage multiple online accounts without them being linked together, which is particularly useful for activities such as web scraping, automation, and privacy focused browsing aka multiaccounting, for example.

It is very important to understand that all these things, with the exception of VM generation, happen on network layer 7 aka application layer, aka Javascript, there are more things happening on web requests, but the anti detect browser manipulations are all happening on L7. You can, with a bit of NodeJS knowledge, fake almost every attribute.

Before going further, here is a good spot to mention the roles of proxies:

In simple terms, many commercial residential or mobile proxies are essentially real laptops or Android devices with a hotspot turned on , where the owner’s internet connection is shared in a controlled way so other people can route traffic through it. It’s akin to borrowing someone else’s connection for a short time to make requests appear to come from their device.

This brings us to…Why Use an Anti-Detect Browser?

  • Multi-Account Management: Operate multiple accounts on platforms like Facebook, Instagram, Amazon, or Google without risking bans or account linking. In real world terms, post many Trustpilot reviews from the same machine, for example.
  • Web Scraping & Automation: data extraction tasks while mimicking real user behavior to avoid detection.
  • Privacy & Anonymity: Mask your true digital fingerprint to enhance online privacy and prevent tracking. They do so in an elegant way, not by disabling everything raw like TOR, which is detectable everytime and you will be swimming in captchas.
  • Ad Verification & Testing: Simulate different user environments to verify ad placements and test website functionalities, this is testimony that these tools can be used for good.

How to Choose the Right Anti-Detect Browser​

You consider the following factors:

  • Use Case: Determine whether you need the browser for multi-account management, web scraping, automation, or privacy.
  • Fingerprint Control: Evaluate how well the browser can mask or randomize your digital fingerprint. Does it do something extremely random that just looks dumb in the https requests and headers?
  • Proxy Integration: Check if the browser supports proxy integration and the types of proxies supported (e.g., residential, mobile etc) and do they honor sticky times and where does the rotation take you on the next session? Do they clean their pools?
  • Automation Support: If automation is a priority, ensure the browser supports automation tools like Puppeteer or Playwright.
  • Mobile Emulation: For mobile based tasks, consider browsers with mobile emulation capabilities.
  • Team Collaboration: If working in a team, look for browsers that offer team collaboration features.

At this point, I would like to say very clearly that I would NEVER use the integrated proxies because the anti detect providers do not clean the pools and the proxies are used daily by less sophisticated users and 99% of the time, to do funny things. Assume the worst, if you use them use an exit IP checking tool before you do so, it will save you a lot of headaches and time.

The next point, all the mobile emulators ran from a windows or MAC OS are basically suicidal, unless the target website has no protections at all. Do you wanna know how easy it is to detect this? They can try to trigger open web dev console and youre done, or they can just check if the JS touchevent is available, if not, you are done. A laptop with touch screen functionality can be useful for this, and surprisinlgy, only 2 website I have come accross try to open dev tools, and even that, they do by accident because they want to hide someone checking their netwrok requests(one of them being bet365).

Now, in no particular order:

Multilogin

The good parts:
Fingerprint control: Fine grained, all the relevant settings are available

Automation support: API avaialble, very solid and nice

Team collab: Yes

Support: Human live support, I will leave this one as “good part” but with objections and reservations.

Stealthfox aka FF fork available.

The bad and the ugly parts:

The default settings are terrible and you are risking to be exposed badly. Navigator settings is making up total BS values if set to masked.

Live support is either forced to give dishonest advise or badly schooled, or worst case, maybe both. For the easy questions, they are very good.

Firefox fork get detected by Google before you can count to 2.

The proxy configs do not consistently maintain state.

No warm up feature, they have import cookies but you do not want to import cookies on a profile with no history and where you dont know wth they put into these cookies, the target websites know exactly what they put into their cookies.

Insomniac:

Fingerprint control: Zero

Automation support: Nope

Team collab: Nope and you do not want it.

Insomniac is on this list because it is the worst POS I have ever had the displeasure of dealing with. It emulates Edge browser 4 versions back with no way to set anything, it is a black box with generates fingerprints that do not pass Pixelscan, but it actually, somehow let me create gmails anyway, at least the few times I have played around with it. Documentation is horrendous, support does not exist at all. Think of the most dumb thing you could do with money for a second…got it? Okay now do that thing, its still better than buying a subscription for this anti detect.

LinkenSphere2:

As of typing this, this is the current king of the road. The best warm up feature with real cookies and history generated, the best because…They are the only ones to do so.
Various Browsers available, extremly important, remember Chrome is hostile grounds ran by a company with nothing but bad intentions and snooping on you on mind to make a buck. Btw, do not trsut FF or its forks either, there are people out there who believe a naked firefox comes close to an antidetect, which is a riduclous notion only a fanboi/girl could come up with, FF has 100-500 times less engineers than Chrome , MS has given up ambitions on own browser and they just use a Chromium fork now instead, that should tell you all you need to know about FF.
LS2 offers very granular control over the settings, which should be used with great care, if you do not know how the settings play together, leave something like default or close to your real machine.

The negatives are, I have no idea where to find their support team, so I cannot say if you are on your own if something goes wrong. Gmail account creation works here to a degree and under some circumstances, btw.

The remaining anti detects are kind of equally good or bad, I will mention the most important things.

Incognition, MoreLogin and Gologin all have only moderate levels of fingerprint control, which is bad, I believe it should be high, if you mess up, it is on you and you go back to the drawing board, but to trust any provider with FP creation automatically disqualifies the product to me.

Octobrowser, Kameleo and Adspower all have granular control over FP but support is damned slow, which also automatically disqualifies the provider for me, they will not be there to even tell you whats happening if something happens.

Every single other provider not mentioned here will mostly be because they have a very bad AI bot for support, which I consider them peepeeing on my head and telling me its raining. Anti D subs cost loads of money and are supposed to provide anonymity and privacy for your infrastructure and if you pay them, you deserve better than a poorly configured AI bot taking your questions. This is not something like a Lebara prepaid card topup matter, this is something peoples livelihood might depend on.

I hope this was a good and enjoyable read, do not be a stranger and engage if I have not mentioned something or you agree, or disagree.

Precise settings I will not give away here, firstly because it might be interpeted as a guide to web abuse and because the setting depends on various factors, there is not really a one size fits all, it comes down to what is the task, whats the goal, whats the proxy and well, which anti detect.