Skip to content

Log in to Twitch | Your browser is not currently supported #109

Closed Answered by kaliiiiiiiiii
tankow79 asked this question in Q&A
Discussion options

You must be logged in to vote

@tankow79
Yep. now this makes more sense:

  1. --disable-web-security, --allow-running-insecure-content, --no-sandbox, --disable-gpu, --headless=new are all flags which can make you detected
  2. using seleniumwire can be detected as well because of its not chrome-like tls fingerprint
  3. Using device emulation currently is detectable, see #58
  4. all chromedriver based libraries (like selenium & undetected-chromedriver) have leaks which can be detected.

Maybe https://github.com/kaliiiiiiiiii/Selenium-Driverless helps you.
It supports request interception without using proxy (see https://github.com/kaliiiiiiiiii/Selenium-Driverless#use-events)

Replies: 3 comments 4 replies

Comment options

You must be logged in to vote
4 replies
@tankow79
Comment options

@kaliiiiiiiiii
Comment options

@kaliiiiiiiiii
Comment options

@tankow79
Comment options

Comment options

You must be logged in to vote
0 replies
Answer selected by tankow79
Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants