Skip to main content

Browser Stealth Mode

For web data sets, crul's most useful feature is that it provides bindings to remotely control and extract data directly from a web browser (see open, requests, scrape, form commands). This data can include network requests, performance metrics and rendered HTML in a tabular format.

Remotely controlling a web browser leaves traces called browser fingerprints. Browser fingerprints can be used to distinguish a remotely controlled browser from a normal user controlled web browser.

By default, in Crul 1.1.0 Browser Stealth mode is enabled, hiding the browser's remote control state by erasing the browser fingerprint that is associated with a non-human user.

Please note: This is kind of a cat and mouse game. It's probably impossible to prevent all ways to detect a remotely controlled web browser, but it is possible to make it difficult and this is what Browser Stealth mode does.

To disable Browser Stealth mode, edit the packages/krull/.env setting:

STEALTH_PLUGIN_ENABLED = false