Skip to main content

Browser Stealth Mode

For web data sets, crul's most useful feature is that it provides bindings to remotely control and extract data directly from a web browser (see open, requests, scrape, form commands). This data can include network requests, performance metrics and rendered HTML in a tabular format.

Remotely controlling a web browser leaves traces called browser fingerprints. Browser fingerprints can be used to distinguish a remotely controlled browser from a normal user controlled web browser.

By default, in Crul 1.1.0 Browser Stealth mode is enabled, hiding the browser's remote control state by erasing the browser fingerprint that is associated with a non-human user.

Please note: This is kind of a cat and mouse game. It's probably impossible to prevent all ways to detect a remotely controlled web browser, but it is possible to make it difficult and this is what Browser Stealth mode does.

To disable Browser Stealth mode, edit the packages/krull/.env setting:

STEALTH_PLUGIN_ENABLED = false

Hi there

We're busy right now, but if you submit a help request we'll get right back to you.

close

Submit Help Request

attach_fileAdd up to 5 files

Max 2.0 MB per file. Accepted file types: .csv, .jpg, .jpeg, .pdf, .png, .txt