Antidetect‑appVM with FOSS Antidetect Browsers. Windows fingerprint. Random fingerprint in dvm

Change your browser fingerprint and make Firefox and Ungoogled‑Chromium appear as Google Chrome and Microsoft Edge, and make Linux look like Windows. Create disposable browsers with unique fingerprints (OS (Windows, Mac), CPU, GPU, timezone …etc) in DispVM!

This guide is intended for regular users. Experienced users can improve this guide.

I used these two antidetect-browsers based on Firefox and Ungoogled-Chromium:

Download the AppImage from the releases Release Donut Browser v0.12.0 · zhom/donutbrowser · GitHub. If the AppImage doesn’t start (as happened to me), create a new antidetect template and install the necessary RPM or DEB packages there. Then create an “antidetect‑dvm” template and add Donut Browser. Next, create an appVM based on the “antidetect” template ( Or you can create two appVMs - camoufox and win‑chromium).

Launch Donut Browser in template
http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 donutbrowser
and wait for components to download, then click + and select Download Camoufox . After downloading in template, run Donut Browser in appVM (without proxy) and donwload Camoufox too. After downloading in appVM, you will be able to create profiles with different fingerprints.

Then download the fingerprint‑chromium from github into /home in appVM, and follow the instructions to run the browser with the various antidetect functions, for example:
./ungoogled-chromium-139.0.7258.154-1-x86_64.AppImage --fingerprint=2023 --fingerprint-platform=windows --fingerprint-platform-version="15.2.0" --fingerprint-brand="Edge" --timezone="Europe/Berlin" --fingerprint-hardware-concurrency="2" --user-data-dir=%TEMP%\chromium

Create app shortcuts into template:
/home/user/.local/share/applications/chrome.desktop

[Desktop Entry]
Type=Application
Name=Chromium
Exec=/home/user/ungoogled-chromium-139.0.7258.154-1-x86_64.AppImage --fingerprint=2023 --fingerprint-platform=windows --fingerprint-platform-version="15.2.0" --fingerprint-brand="Edge" --timezone="Europe/Berlin" --fingerprint-hardware-concurrency="2" --user-data-dir=%TEMP%\chromium
Terminal=false

(Change exec to your desired fingerprints)
Then:
sudo chmod +x /home/user/.local/share/applications/chrome.desktop
(In my case I had to create this file inside the appVM; otherwise the browser wouldn’t start)

Choose Donut Browser when launching DispVM (antidetect‑dvm), click the ‘+’ button, and select ‘Antidetect’ and ‘Automatic’. Camoufox will create a new browser with random unique fingerprints. Or run Chromium with different fingerprints that you specify for it. Now you’ll always be able to have different fingerprints in DispVM browsers!

Create a debian-13-minimal template with Donat Browsers - Thanks @qubesnoob for the guide!

  1. Create a debian-13-minimal template with the necessary packages installed.

To install the template debian-13-minimal, we need to have the repository qubes-templates-itl-testing enabled.

In dom0 terminal, run:

sudo qubes-dom0-update qubes-template-debian-13-minimal

Clone the template debian-13-minimal and name it as d13m-antidetect

qvm-clone debian-13-minimal d13m-antidetect

Start the template:

qvm-run -u root d13m-antidetect xterm&

In d13m-antidetect’s terminal, install the following packages:

apt install qubes-core-agent-networking qubes-core-agent-passwordless-root wget

Download the donut browser .deb (AppImage does’t work for me)

https_proxy=http://127.0.0.1:8082 wget https://github.com/zhom/donutbrowser/releases/download/v0.12.2/Donut.Browser_0.12.2_amd64.deb

Install the donut browser

apt install ./Donut.Browser_0.12.2_amd64.deb

Shutdown the template

poweroff
  1. Create a disposable template

In dom0 terminal, run:

qvm-create --label=red --template d13m-antidetect d13m-antidetect-dvm
qvm-prefs d13m-antidetect-dvm template_for_dispvms True

In Qube Manager, right click on d13m-antidetect-dvm, choose Settings, at the bottom of the Basic tab, increase the Private storage max size from 2.0 GiB to 3.0 GiB. Click OK to save the settings and quit the Qube Manager. (The download and extraction of the camoufox on the later steps may use up all the storage.)

Now, launch the the disposable template ‘d13m-antidetect-dvm’ and make customization (install the camoufox). In dom0 terminal, run:

qvm-run d13m-antidetect-dvm xterm&

In d13m-antidetect-dvm terminal, run:

donutbrowser&

The initialization may take 30 seconds or more, just wait for it to finish. Click the ‘+’ icon, under ‘Anti-Detect’, click “Firefox” and it will start to update GeoIP database. After that, you can start to download the Camoufox. Once finished, you can set a profile name and save it. Close the donut browser and the disposable template. Everything is done.

  1. Start the donut browser in a disposable VM

Now you can start a disposable VM based on the above dvm template. In dom0 terminal, run:

qvm-run --dispvm d13m-antidetect-dvm donutbrowser&

Click the ‘+’ icon and create a Anti-Detect Browser profile. Choose Automatic to allow the donut browser to generate "random“ fingerprint. Give a profile name and save it. Click ‘…’ → ‘configure fingerprint’ to view or customize it. Launch the browser and verify the fingerprint.

:sunglasses: Browsers effectively fool even the most advanced browser‑fingerprint scanners


Use a Firefox user‑agent in Camoufox and an Edge user‑agent in fingerprint‑chromium for maximum realism of browser fingerprints.
It reliably bypass Facebook and Google. I also tested this on Telegram

(I do NOT recommend using Telegram: Send Telegram Messages over Tor with Whonix ™ I used it only for testing the browsers!)

:thinking: It might be a good idea to add the uBlock Origin and NoScript extensions to these browsers. Follow this guide to add extensions to Ungoogled Chromium.

:sunglasses: :shushing_face: You can use these appVMs in RAM to protect against forensic analysis by employing these solutions:
Qubes dom0 ZRAM Live Mode
Qubes dom0 OverlayFS Live Mode
Really disposable (RAM based) qubes

10 Likes

Sooo… what it do?

I’m a bit confused by the amount of information here, but how is it related to Qubes OS?

2 Likes

Make your browsing look like Firefox and Edge running on Windows.

2 Likes

Fantastic work. Thank you for posting this. I have been running a similar setup for many years that produces a disposable VM generates a new antidetect profile, automatically assign a residential IP using a paid proxy service and everything nicely syncs up (tiime zone, etc) with just one click on the start menu! It passes all the advanced browser checks (fv.pro, browserleaks, pixelscan) and runs over sys-whonix nicely.

I never posted about it because most people are not familiar with antidetect browsers, the software i use is closed source and expensive (identory.com) and will probably never be well received here. I also don’t trust it (but that is great thing about Qubes!). Great to see open source version on the market.

I use Mullvad Browser for 99% of my web browsing but the reason this is useful to me is sometimes I get so frustrated with all the captchas so it is good to have this setup just for those times when the internet impossible to browse.

3 Likes

Thank you. I’m also very glad that powerful open‑source anti‑detect browsers have appeared. This guide is suitable for those who work with traffic, but it’s an important guide for residents of totalitarian countries, where a Linux fingerprint in the browser can already raise questions from intelligence agencies and government. Now you can split life into two parts: working with sites where you can present yourself as a Linux user, and sites where it’s risky and better to be a plain, unnoticed everyday user who uses Windows and Edge.

1 Like

This is a very cool guide. People in Europe and USA don’t understand what it’s like to live in Russia, Belarus, Azerbaijan, Iran, Turkmenistan, Pakistan, China and other similar countries. Here, disguising Qubes and Linux is vital. And all those funny suggestions like “just use Tails” don’t work in these countries

My point is it should be as a first line in first post because not everybody who would use it knows what it is.

1 Like

Okay

1 Like

Hi @linuxuser1, I’m the creator of Donut Browser. Excited to see it getting into Qubes community as I’ve used Qubes as my primary os for many years, although I’m currently on a Mac.

AppImages should run on any Linux system that has FUSE installed. There is currently a report from another user on GitHub that when they try to launch AppImage on their Debian 12 machine, they are getting “Segmentation fault” error. If you are getting a different error or manage to get any kind of log from launch to the error, that would be very helpful for me as I can’t reproduce the issue myself yet.

If you do, please create an issue on GitHub or send any information via email to contact at donutbrowser dot com. Thank you!

5 Likes

Hi! I’m getting the same error Segmentation fault (core dumped) in Debian 12, Kicksecure and Fedora 42 on Qubes Segmentation fault when launching AppImage on Debian 12 x64 · Issue #62 · zhom/donutbrowser · GitHub
I’d like you to fix it in appimage, so there’s no need to create a new template for the anti‑detect AppVM :slightly_smiling_face:. Thanks for your work! Wishing you success.

1 Like

Hi! Your browser is magnificent. Thanks for the work. Could you add this browser GitHub - adryfish/fingerprint-chromium: An open source fingerprint browser based on Ungoogled Chromium. 指纹浏览器 隐私浏览器 for creating an antidetect version in Chromium? Then it would be enough to download your browser and have a full set of opensource antidetect browsers

1 Like

Thank you for the feedback and the suggestion :slight_smile: I would love to add an anti-detect option for chromium, but speaking of the project you mentioned, I’m considering it, but the project doesn’t offer binaries for all systems and architectures that I support, and there is no easy way to fork it and start building on top of it in case the developer doesn’t have time to work on it any longer, so I need more time to evaluate what I can do with it. Maybe I will go with developing my own solution. Don’t expect any integrations like this for the next few months :sweat_smile:

3 Likes

the most advanced browser‑fingerprint scanners

Which are those please?

It might be a good idea to add the uBlock Origin and NoScript extensions to these browsers.

No need for NS with uBO. I can’t find the comment by gorhill but he explained that a long time ago. FWIW, extensions can contribute to the uniqueness of fingerprint, especially if used incorrectly.

1 Like

I checked many scanners, and it the most effective:
https://abrahamjuliot.github.io/creepjs/
https://arthuredelstein.github.io/tordemos/os-detection-font-css.html
If you bypass it on the “device” and OS, Facebook, Google, Telegram and Cloudflare will trust the device. Some other scanners are published in the GitHub repos of those browsers.

I agree for extensions. Some scanners detect both of these extensions.

1 Like

I have tried to follow this guide, but every time Donut asks me to download Camufox.

I have antidetect-vm, antidetect-dvm, and antidetect template. I have installed Camufox in all of them.

I probably have followed the instructions wrong but am not sure how. I also wish the guide gave example names for each template and didn’t refer back to the templates in a general way (ie, “create a launcher file into template” - which template?)

Is there a reason Camufox won’t stay downloaded for me?

Thanks!

You need to load Camoufox in the template, and then in appvm - that’s how it worked for me. Otherwise I also had to download Camoufox each time. An AppImage would solve this problem, but right now it doesn’t work because of an error.
Sorry, I forgot to write it in the guide. I will add it now:

Launch Donut Browser in template
http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 donutbrowser
and wait for components to download, then click + and select Download Camoufox . After downloading in template, run Donut Browser in appVM (without proxy) and donwload Camoufox too. After downloading in appVM, you will be able to create profiles with different fingerprints.

Important - if you downloaded Camofox in the appVM, created one profile, then deleted it (so there are no profiles left), Camofox may need to be downloaded again (this could be a bug in Donate Browser). Therefore, always keep at least one profile.

Great work. Thank you for taking your time creating this guide. This will be helpful to alot of people, especially in totalitorian countries and accessing locked down sites with captchas. But eventually it won’t be a surprise to me when sites require you to register an account with an email/phone number before entering their “property”. Anyways, getting back to your guide, the information provided in this guide will not help the regular user because the directions are not organised in a clear way. I had alot of trouble following directions about creating diferent templates and profiles. It’s confusing and frankly i gave up. Im just running on an appvm for now to test it. Unfortunately for me it’s not setup the way it was intended to be.

Thank you! This is my first guide, so please excuse me if I’m not very detailed. I figured out these browsers quickly and easily. I like that this lets you create many different browsers with different fingerprints - one for social networks with a phone number and another for anonymous internet surfing. Tell me about your problem, and I will let you know what you should do :slightly_smiling_face: