How to carry out effective security replenishment orders is simple and easy, but it is also difficult to say. It is not difficult to understand the main logic.
The two biggest problems that need to be solved in the security replenishment order are the environment and the IP address. The IP address is how you can achieve a real overseas IP address. In fact, it is not that simple. It cannot be achieved by just using a VPN to turn over the wall and use a VPS. If the same device is used to fill so many orders every day, can't the system detect abnormal operations? How many service providers have done so many anti-association operations, but it is still impossible to avoid being officially judged as account associations, so next we will talk about how to truly place orders with overseas IPs and how to use only one device to Build different hardware environments so that the system can determine that you are not operating and placing orders on the same device.
First of all, regarding IP, we need to buy a foreign family residential IP with a high enough purity in the market, and then use this pure IP in conjunction with the environment to truly achieve accurate positioning, but there is something called Internet web instant messaging, which is WebRTC , WebRTC establishes a connection through the UDP protocol, so it does not route through the proxy you use in your browser configuration file, proxy server routing, even if you use a proxy website, you can get your real public and local IP address. So we have to disable the WebRTC function and modify the local IP and public IP through WebRTC to correspond to the bound proxy server IP, but disabling WebRTC may be detected by the mechanism as a risk of cheating, even if there is no conclusive evidence to do to your account. If there is a penalty, it is also very likely that your account operation is invalid, so theoretically it is difficult to place an order with a truly traceless overseas IP address.
The next step is how to build a hardware environment for order replenishment. There is a concept called canvas, which is canvas. Different browsers use different image processing engines, different image export options, and different default compression levels in terms of image formats. At the pixel level, different operating systems use different settings and algorithms for anti-aliasing and pixel rendering operations. Even if the image data and crc checks generated by the same drawing operation are different, different operating systems have different browsers. The image content generated by different devices is also different, and the computer program can identify the subtle differences in the rendering results of different hardware devices by calculating the hash value of the image data. In this way the website can identify and identify the user based on the canvas fingerprint.
To sum up, if we change the operating system of the device, the browser will affect the generation of the canvas image, that is, we can hide the real fingerprint by modifying the browser of the device operating system. This is what we need to do to build the environment. Web pages identify us Whether it is operated by the same device can also be judged based on audio, webgl, DNT, cookie, etc. The difficulty of excluding all factors is very high.
Then the underlying logic is clear, and it is relatively simple to build a stable self-supporting number system. Use a foreign server to remotely build a secure terminal on the cloud, set the underlying parameters of the device to block the unlimited generation of hardware environment, and then use the IP of a foreign family residence for precise positioning. Use the fingerprint browser (with a privacy plug-in to block the leakage of IP addresses in the LAN, and prevent HTMLI5 and ping tracking) to browse and place orders. Friends who need to know can communicate.