CONCEPT Cited by 1 source
Browser telemetry fingerprint¶
Definition¶
A browser telemetry fingerprint is a composite signature computed from client-side-collected properties of a running browser session: canvas / WebGL / audio-context rendering properties, installed fonts, screen + window geometry, input- device event timing, JavaScript-engine introspection, and behavioural patterns of interaction (mouse paths, keystroke cadence, scroll rhythm). It is used by bot-management systems as a content-independent identity signal for a session, feeding ML classifiers that score human-vs-bot likelihood.
The defining property: features come from how the browser
runtime behaves, not what the client declares in headers.
The User-Agent string is trivially spoofable; the full
telemetry fingerprint requires the attacker to run an actual
browser (or a very good simulation of one) and still emits
distinguishable artefacts from automation tooling.
Canonical wiki instance¶
Vercel's 2026-04-21 BotID post discloses browser telemetry as the primary feature class:
- "Telemetry data that looked completely legitimate."
- "Each presenting fingerprints and behavioral patterns that hadn't been seen before."
- "Browser sessions that had initially appeared legitimate" — telemetry alone was not decisive in either direction.
- The remediation is to "force these sessions back through the verification process to collect fresh browser telemetry" — the same signal class, re-collected after a correlation trigger.
The post does not publish the specific features in the fingerprint — the deliberate-opacity principle shared by bot- management vendors (systems/cloudflare-bot-management takes the same position on its TLS-level fingerprint).
Why telemetry (not UA / IP)¶
| Signal | Forgeability | Rotation cost | Per-session vs per-operator |
|---|---|---|---|
User-Agent header |
trivial | ~0 | per-request |
| IP address | moderate (proxies) | cheap | per-session |
| TLS / HTTP/2 fingerprint | hard (requires new stack) | expensive | per-stack |
| Browser telemetry fingerprint | hard (requires new automation) | expensive | per-session or per-automation-tool |
Browser telemetry sits in the hard-to-forge quadrant: you cannot rotate a telemetry fingerprint by flipping a header or routing through a proxy. Changing it requires changing the automation tooling itself — a cost that ~absorbs across a whole bot fleet.
Behavioural telemetry as sub-signal¶
The Vercel post pairs "fingerprints and behavioral patterns" — behavioural telemetry is a distinct sub-class:
- Mouse-movement trajectories (humans produce curved, overshooting paths; headless automation produces linear or step-function paths).
- Typing cadence (keystroke-interval distributions).
- Scroll and focus-event timing.
- Form-field interaction order.
Behavioural features are observation-time dependent — require the session to run long enough to accumulate interaction events — whereas device-fingerprint features are immediately available on first page load.
The mitigation ↔ tracking duality¶
Like all fingerprint-class signals, browser telemetry suffers the concepts/fingerprinting-vector trade-off: the same signal that identifies a stealth bot also re-identifies real users across sites. In a bot-mitigation deployment the trade-off is accepted because the target is clearly abusive; in privacy- sensitive contexts (ad tracking, cross-site analytics) the same mechanism is contested.
Relationship to concepts/ml-bot-fingerprinting¶
Browser-telemetry fingerprinting is a sibling of the TLS / HTTP-level fingerprinting Cloudflare describes in the 2025-08-04 post. Both:
- Use content-independent features.
- Feed ML classifiers producing bot scores.
- Keep feature lists unpublished.
- Operate at layers the attacker can't cheaply rotate.
They differ on collection site:
- TLS / HTTP-level — features are visible to an edge/proxy tier; no client-side instrumentation needed.
- Browser telemetry — requires JavaScript execution on the client; only works for clients that run the bot- management vendor's script.
Defenders commonly combine them (cf. concepts/composite-fingerprint-signal).
Weaknesses¶
- Script-requirement. API clients that don't execute JS can't be telemetry-fingerprinted; for those clients, the TLS/HTTP-layer signal is the fallback.
- High-end automation. Advanced tools (Puppeteer + stealth plugins, browserless runtimes with randomised fingerprints) produce telemetry indistinguishable from real users for short windows. The 2026-04-21 post documents precisely this case — "For a few minutes, BotID's models carefully analyzed this new data, determining whether these sessions were genuine or malicious."
- Novel-profile cold start. First appearance of a new automation tool's fingerprint has no classifier history; falls into the concepts/adaptive-bot-reclassification window.
- Collection overhead. Running the fingerprinting script adds latency and bandwidth to every page load.
When to apply¶
- Logins, checkouts, AI-agent endpoints, APIs reachable through a browser — any endpoint where the attacker's cost-to-abuse per-session justifies the defender's per-session instrumentation cost.
- Where systems/vercel-botid / Kasada / Cloudflare Bot Management can be deployed.
- As one layer inside a concepts/composite-fingerprint-signal stack — rarely used alone.
Seen in¶
- sources/2026-04-21-vercel-botid-deep-analysis-catches-a-sophisticated-bot-network-in-real-time — canonical wiki instance. Vercel BotID / Kasada use browser telemetry (fingerprints + behavioural patterns) as the primary feature space; the post explicitly disclaims a feature-list disclosure and describes telemetry as the signal that is re-collected on forced re-verification.
Related¶
- concepts/ml-bot-fingerprinting — sibling concept (TLS / HTTP layer).
- concepts/composite-fingerprint-signal — the combining framework.
- concepts/fingerprinting-vector — the mitigation-vs- tracking duality.
- concepts/proxy-node-correlation-signal — the cross- session correlation trigger that resolves ambiguous telemetry cases.
- concepts/adaptive-bot-reclassification — the legitimate- looking window that telemetry alone can't resolve.
- patterns/stealth-crawler-detection-fingerprint / patterns/correlation-triggered-reverification.
- systems/vercel-botid / systems/vercel-botid-deep-analysis / systems/kasada-bot-management.