Roadmap

Series

Trusting the Client

Kasada, Akamai, DataDome — every client-side bot defense layer fails for the same structural reason: the browser is attacker-controlled territory. Five parts dissecting TLS fingerprinting, environment probing, behavioral telemetry, token rotation, and the runtime trust problem.

  1. Environment Interrogation and the Spoofable Browser

    Defense SDKs probe WebGL renderers, canvas hashes, and hundreds of browser APIs to fingerprint your environment. A content script that runs before the SDK loads can patch every one of them.

  2. Behavioral Telemetry and the Real User Problem

    Akamai's sensor scripts collect mouse movements, keystrokes, and scroll behavior to score sessions as human or bot. A Chrome extension operating inside a real browser session inherits all that legitimacy for free.

  3. Token Rotation and the Inherited Session

    Kasada's per-request token rotation prevents external replay. But chrome.scripting.executeScript in MAIN world calls the page's own patched fetch — the SDK injects the token automatically and the extension never touches it.

  4. The Runtime Trust Problem

    All four defense layers — TLS fingerprinting, environment probing, behavioral telemetry, token rotation — fail for the same reason: the browser is not a trusted execution environment. The economics and architecture of what actually works.

Keyboard Shortcuts

Key Action
j Next section
k Previous section
n Next post
p Previous post
/ Open search
Cmd + K Command palette
Esc Close dialog / popover
? Show this help