Everyone should know that there are two types of supplementary orders: real people and self-supporting accounts.
That is, you need to find foreign relatives, friends, international students or foreign evaluation teams to do it.
1. Have a real environment
2. Some old accounts have high weight and leave comments for a long time
The market situation is: real-person accounts have all kinds of products, so the quality of the accounts varies , and the products are difficult to send out , the reviews are not timely , and there are many fake real -person evaluations, using black cards to place orders , malicious refunds , etc. lead to abnormal problems in the store
Self-supporting account evaluation, as the name suggests, is to realize self – registration , support account , place order , and purely manual operation by building a foreign server and IP.
1. You can control the time and quantity of the assessment by yourself, and you can measure it anytime, anywhere.
2. The evaluation cost is very low. The cost of registering an account is more than ten yuan, which can be used for a long time.
3. Don't worry about being maliciously refunded or using a black card to place an order
The disadvantage of self-support account evaluation is that it has high requirements on the environment, has a certain success rate, and has a relatively high technical threshold. It is necessary to simulate the real local environment of buyers. During the risk control period, the platform will obtain the model and area code of the device through ip. , supervision code , motherboard code , even color , fingerprint code , IP address , account operation status , account label confusion , payment environment and other parameters
If these environments are not done well, as soon as the risk control period is reached, a large number of account associations will occur, orders will be cut off, dead accounts will be seriously affected, and even the stores will be seriously affected . Control point , if you are a self-supporting account, you must have core technology and the ability to deal with risk control. Our company is also a professional evaluation technology incubation for four or five years, and we can communicate together when we have time.
We are building an overseas server, building a firewall through a remote security terminal, blocking the association of hardware parameters, then using a pure family residential private line IP, then using a fingerprint browser, and adding a privacy plug-in to block ping , HTM Tracking, this is a complete environmental solution
It can solve the high-quality resources required for various evaluations to realize value:
1. Self-supporting account can measure orders anytime, anywhere , upload rating , feedback , review , rush to sell , clear inventory, can defend and attack
2. The account is managed by itself, which is safe and controllable. Don't worry about failing to send the test , malicious refund , or placing an order with a black card
3. According to the demand, one order, two orders, three orders can be freely combined to place orders
4. Don't be afraid of any products, the recent tests are basically all electronic products
5. Save labor costs, it only takes less than 15 minutes for one person to make a finished product number from registration to placing an order
6. Unlimited traffic, can be replaced by multiple people and used all the time, only need to pay a fixed monthly rent
7. Stable success rate of about 95%, which indirectly reduces costs and easily retains sellers
8. There is no time limit for placing an order, morning, noon, afternoon, evening can be
9. One device can store thousands of accounts , greatly reducing the cost of the device
10. The mode is easy to copy, you can add equipment environment according to the number of people , you can test yourself , or you can do a professional evaluation studio
11. The IT technical team provides maintenance and technical updates , one-to -one technical guidance
12. First-hand registration resources docking (foreign email address , address , mobile phone number , credit card background , gift card channel)
Moreover, the store is easy to be detected. In addition to the security environment of the underlying environment, it is also because the way of placing an order is too simple. The general habit of placing an order is to browse and place an order with keywords. We also use other methods. To place an order, for example, off-site advertisements are like Facebook links, and there are AB accounts. This method of testing and selling links has changed the ordering method of the entire link into a very diversified method, which can be very effective in avoiding big data. risk of detection
Let's talk about most of the environmental solutions on the market:
Many reviewers understand that preparing a jailbroken phone of a specified version, using axj, als or awz, but this is only a one-click new phone tool, many hardware parameters are easily exposed, and parameters need to be debugged and disguised before they can be used.
There are many camouflage tools on the market, but not for Amazon. Many software companies only camouflage for public platforms, mainly to facilitate program developers to debug system programs, and cannot be used in the Amazon evaluation industry , and the risk control of each platform is not. In the same way, it is necessary to cooperate with software control from the underlying hardware environment, to do shielding technology and anti-association according to Amazon's detection rules, and to separate all environments independently, so that Amazon can only detect the parameters we give , and then match Use of foreign family line
1. Foreign servers
911 , luminati , googelfi , tm flow card , srocks line
1. Too many users, stuck, high repetition rate and easy account association
2. DNS will jump country to trigger verification
3. The blacklist is easy to cut off the order or directly block the account
Ads , VMlogin , Migratory Bird , Mammoth , mu , Lincoln Sphere, etc.
1. It can only solve the problem of association between cookies and caches, but cannot solve the problem of hardware parameter association. There is no real physical configuration, and the security code, area code, CMOS, hard disk and operating system are completely different
Solution: with a foreign server, run through a remote security terminal
2. WebRTC LANs are easily exposed in China
Solution: Install a privacy plugin that stops WebRTC from leaking IP addresses , stops HTMLI5 "ping" tracking, and also has significant speed improvements
Some of the current mainstream solutions on the market:
Virtual machine + V2: It can be said that it is an environmental solution three or four years ago. It is very stuck, there is no real physical configuration, and the DNS jumps across countries, which is easy to be detected, resulting in the cancellation of orders or bans.
Purple Bird Browser: IP is very expensive, a single IP is 58 yuan, not suitable for raising an account, the IP of the public network is not pure enough, there are many duplicate IPs, and it is easy to be detected and blocked or banned.
Endless Road: It was also an environmental solution from three or four years ago. IP is expensive and not suitable for evaluating and raising accounts. The IP of the public network is not pure enough, and there are many duplicate IPs, which are easy to be detected and blocked or banned.
Love camouflage / love new machine + luminati or srocks line
AWZ /AXJ is just a one-click new machine tool, many hardware parameters are easily exposed, and the parameters need to be debugged and disguised before they can be used. In addition, the srocks dedicated line is currently very stuck, too many people use it, and there are many blacklist blacklist IPs, which are easy to appear. Chopping or banning
At present, there is also a mobile phone evaluation system on the market. One mobile phone device can generate hundreds of account support environments. Such a mobile phone has been sold for tens of thousands of yuan in the market, not to mention the implementation cost of this solution. Through technical testing, many security problems of this system were discovered, and there are a large number of related factors. If there is no way to deal with the new risk control in the first time, it is only a matter of time for the platform to be discovered.
And another problem with this mobile phone evaluation system solution is that the efficiency of making orders is too low. The mobile phone environment is single. You must switch to the next environment to operate the second account when you make an order. You cannot do multi-account browsing. We can’t make many orders in a day. Our current solution is that one person can operate dozens of accounts at the same time. The operation efficiency of one person is dozens of times that of a single mobile phone.
Based on the above plan for raising a number, I will summarize it for you. It is to solve the problem from the dimensions of safety, cost and efficiency. There are many underlying technologies that need to be understood. It is not easy to blindly rely on blood to do it. It is not easy to raise a number. , I hope everyone can communicate and progress together
According to our years of testing, there are the following types of platform risk control
1. Association of underlying hardware parameters (security code, area code, mac and other parameters)
2. IP issues, whether DNS will jump country, whether webRTC is exposed in China, or blacklists blacklist IP
3. The success rate of payment cards, because many card heads are risk-controlled, so a credit card provider with the ability to update at any time is required to replace the update at any time.
4. The method of registering and placing an order, the maintenance cycle, and how to control the evaluation
Each link of these risk control needs to understand how to solve it, and everyone can communicate and make progress together!