If you work with multi-accounting on Facebook Ads, Instagram, or TikTok, you have surely heard about canvas fingerprinting and WebRTC. But there is another tracking method used by advertising platforms β audio context fingerprinting. This method analyzes the audio subsystem of your device and creates a unique digital fingerprint that can track you even when you change your IP address.
In this article, we will discuss how audio fingerprinting works, why proxies alone are not enough for protection, and how to properly configure anti-detect browsers Dolphin Anty, AdsPower, and Multilogin to work with multiple accounts without the risk of chain bans.
What is audio context fingerprinting and how does it work
Audio context fingerprinting is a method of identifying devices by analyzing the operation of the Web Audio API. When a browser processes sound, it uses your device's audio processor (sound card, drivers, software mixer). Different devices process the same audio signal slightly differently due to differences in hardware and software.
The technology works as follows: a website generates a test audio signal (for example, a sine wave of a certain frequency), runs it through the browser's audio context, and analyzes the resulting output. Even microscopic differences in sound processing create a unique "signature" for the device.
It is important to understand: The audio fingerprint remains the same when changing the IP address, clearing cookies, and even when using a VPN or proxy. It is tied to your hardware, not your network settings.
What exactly is analyzed when creating an audio fingerprint:
- Sound card characteristics: processor model, drivers, sampling rate
- Software stack: browser version, operating system, audio codecs
- Processing features: microscopic distortions during sound generation and processing
- Timing: speed of audio data processing, latencies
The result of the analysis is converted into a hash β a unique string of characters that becomes the identifier for your device. The probability that two different computers will produce an identical audio fingerprint is extremely low β about 1 in several million.
How Facebook, TikTok, and Instagram use audio fingerprints
Advertising platforms and social networks actively use audio fingerprinting as one of the elements of their multi-account detection system. This method is particularly effective because most users are aware of the need to change their IP through proxies, but are unaware of the existence of audio fingerprints.
Hereβs how the detection system works in practice:
- First login: You log into Facebook Ads with a new account through a proxy. The platform collects your audio fingerprint along with other parameters (canvas, WebGL, fonts).
- Profile creation: All collected data is linked to your account and stored on Facebook's servers.
- Second account: You create a new account, change the IP through another proxy, but work from the same computer. The audio fingerprint remains identical.
- Connection detection: The system sees a match in audio fingerprints and understands that both accounts are managed from the same device.
For arbitrageurs, this is a critical issue. Even if you use high-quality residential proxies and different browser profiles, a match in audio fingerprints can lead to a chain ban β blocking all related accounts.
| Platform | Uses audio fingerprinting | Strictness of checks |
|---|---|---|
| Facebook Ads | Yes | Very high |
| TikTok Ads | Yes | High |
| Yes | High | |
| Google Ads | Yes | Medium |
| Yes | Medium | |
| Twitter/X | Yes | Medium |
Audio fingerprinting is used particularly aggressively on Facebook and TikTok. These platforms lose millions of dollars due to fraudulent advertising schemes, so they invest huge resources into multi-account detection systems. According to specialists in arbitrage, a match in audio fingerprints between accounts increases the likelihood of a ban by 60-80%.
Why proxies alone are not enough for protection
Many newcomers to arbitrage and SMM think: "I will buy quality proxies, change the IP for each account β and everything will be safe." This is a dangerous misconception that leads to the loss of accounts and advertising budgets.
Proxies solve only one task β they change your IP address and geolocation. But modern anti-fraud systems analyze dozens of other parameters:
- Canvas fingerprint: a unique fingerprint based on graphics rendering
- WebGL fingerprint: characteristics of the graphics card and drivers
- Audio fingerprint: fingerprint of the audio subsystem (the topic of this article)
- Fonts fingerprint: a list of installed fonts in the system
- WebRTC: leakage of the real IP even when using a proxy
- Screen resolution: screen resolution and browser window size
- Timezone: timezone and its correspondence to the declared geolocation
- User-Agent: information about the browser and operating system
Imagine a situation: you are working with 10 Facebook Ads accounts. For each, you use a separate residential proxy with IPs from different cities. But you launch all accounts from the same computer in regular Chrome. What does Facebook see?
Detection example: 10 different IP addresses, but absolutely identical canvas, WebGL, and audio fingerprints. The same screen resolution, one set of fonts, one browser version. For the anti-fraud system, this is an obvious sign of multi-accounting from one device.
Audio fingerprinting is particularly insidious because it is difficult to change manually. You cannot simply "change the sound card" programmatically β special tools are needed to emulate different audio subsystems. This is exactly what anti-detect browsers are for.
Real case: loss of 15 accounts due to ignoring fingerprinting
One arbitrageur worked with Facebook Ads, used quality mobile proxies (costing $70-100 each), but launched all accounts through regular Chrome with a User-Agent switcher extension. For the first 2-3 weeks, everything was fine, but then Facebook began banning accounts in groups of 3-5. In a month, he lost 15 accounts and about $8000 in advertising budget.
The reason: all accounts had identical audio and canvas fingerprints. The system detected the connection and applied a chain ban. After switching to Dolphin Anty with the correct fingerprint substitution settings, the problem disappeared.
How anti-detect browsers protect against audio fingerprinting
Anti-detect browsers are specialized programs that create isolated browser profiles with unique digital fingerprints. Unlike regular browsers, they can substitute not only the User-Agent and cookies but also the hardware characteristics of the device, including the audio fingerprint.
The main anti-detect browsers on the market:
| Browser | Protection against audio fingerprint | Popularity | Price from |
|---|---|---|---|
| Dolphin Anty | Yes, automatic substitution | Very high | $89/month |
| AdsPower | Yes, customizable | High | $9/month |
| Multilogin | Yes, advanced | High | β¬99/month |
| GoLogin | Yes, basic | Medium | $24/month |
| Octo Browser | Yes, automatic | Medium | β¬29/month |
How protection against audio fingerprinting works in anti-detect browsers:
- Substitution of Audio Context API: The browser intercepts calls to the Web Audio API and returns modified data instead of the real characteristics of your device.
- Generation of a unique fingerprint: A unique audio fingerprint is created for each profile, which remains constant for that profile but differs from other profiles.
- Realism of data: The substituted data appears natural β the anti-detect does not just return random values but emulates a real sound card of a specific model.
- Consistency with other parameters: The audio fingerprint is consistent with other profile characteristics (OS, hardware, browser) to avoid raising suspicion.
An important point: the anti-detect browser does not change your IP address by itself. You still need proxies. But it solves the problem that proxies cannot β it creates unique digital fingerprints for each account.
Dolphin Anty vs AdsPower: which to choose for protection against audio fingerprinting
Dolphin Anty is the most popular choice among Russian-speaking arbitrageurs. Its main advantage is the automatic generation of realistic fingerprints without the need for deep technical knowledge. You simply create a profile, specify the operating system and geolocation, and Dolphin automatically selects consistent parameters, including the audio fingerprint.
AdsPower is cheaper and offers more manual settings. It is a good choice for experienced users who want to control every parameter. But for beginners, Dolphin will be easier and safer β there is less chance of making mistakes in settings and creating a suspicious profile.
Setting up protection in Dolphin Anty: step-by-step guide
Let's go through the steps to create a profile in Dolphin Anty with proper protection against audio fingerprinting. This guide is suitable for working with Facebook Ads, TikTok Ads, Instagram, and other platforms.
Step 1: Creating a new profile
- Open Dolphin Anty and click the "Create Profile" button at the top of the interface.
- In the "Name" field, enter a clear name β for example, "FB Ads USA #1" or "TikTok - Moscow".
- Select the operating system. For Facebook and TikTok, Windows 10 or macOS is recommended β they appear more natural for advertising accounts.
Step 2: Setting up proxies
- In the "Proxy" section, select the type of connection. For Facebook Ads, mobile proxies or residential proxies are best.
- Enter the proxy details: IP address, port, username, and password (if required).
- Click "Check Proxy" β Dolphin will show your geolocation and IP type. Make sure the geolocation matches your target country.
- Important: use a separate proxy for each profile. Do not run multiple accounts through one IP β this is a direct path to a ban.
Step 3: Setting up fingerprint parameters
This is the most important section for protection against audio fingerprinting:
- Go to the "Fingerprint" tab.
- In the "Generation Mode" field, select "Real Fingerprint". This mode creates a fingerprint based on real devices, making it as natural as possible.
- In the "Audio" section, ensure that the mode is set to "Substitute" or "Noise". Do not use the "Real" mode β it will show your actual audio fingerprint.
- Dolphin automatically generates a unique audio context for the profile. You do not need to manually adjust the parameters β the algorithm will create realistic values on its own.
Pro tip: After creating the profile, do not change the fingerprint settings unless absolutely necessary. Each change to the audio fingerprint carries the risk that the platform will notice a discrepancy with previous sessions.
Step 4: Additional settings for maximum protection
- WebRTC: Set the mode to "Alter" β this will prevent the leakage of your real IP address.
- Canvas: The "Noise" mode β adds microscopic distortions to the canvas fingerprint.
- WebGL: The "Noise" mode β substitutes the characteristics of the graphics card.
- Timezone: Select a timezone that corresponds to the geolocation of your proxy. If the proxy is from New York, set it to Eastern Time (UTC-5).
- Browser language: For the USA β English (United States), for Europe β the corresponding language of the country.
Step 5: Saving and launching the profile
- Click the "Create" button at the bottom of the settings window.
- The profile will appear in the list. Click the "Launch" button (play icon).
- A browser window will open with the applied settings. You can now log into Facebook Ads, TikTok, or other platforms.
Important: on the first launch of the profile, visit a fingerprint checking site (more on this in the next section) and ensure that the audio fingerprint differs from your real one. Take a screenshot β this will be your proof of the uniqueness of the fingerprint.
Setting up protection in AdsPower and Multilogin
AdsPower operates on a similar principle, but the interface is slightly different. Let's go through the key points of setting up audio fingerprinting in this browser.
Setting up AdsPower
- Create a new profile using the "New Profile" button on the main screen.
- In the "Basic Settings" section, specify the profile name and select the platform (Facebook, TikTok, Google, etc.).
- In the "Proxy Settings" section, enter your proxy details. AdsPower supports HTTP, HTTPS, and SOCKS5.
- Go to the "Fingerprint Settings" section β this is where all fingerprint substitution settings are located.
- Find the "Audio Context" parameter and set it to "Noise" or "Custom". The Noise mode adds random distortions to the real audio fingerprint, while Custom allows you to set parameters manually.
- In the "Canvas" section, set the mode to "Noise" β this is additional protection beyond the audio fingerprint.
- Check the WebRTC settings β it should be set to "Alter" or "Disable" to prevent the leakage of the real IP.
AdsPower gives more control over the parameters but requires a deeper understanding. If you are unsure about the settings, use the "Auto" mode β the browser will select optimal values based on the chosen operating system and geolocation.
Setting up Multilogin
Multilogin is the most expensive but also the most advanced anti-detect browser. It offers two engines: Mimic (based on Chromium) and Stealthfox (based on Firefox). For working with audio fingerprinting, Mimic is recommended.
- Create a new profile through "New browser profile".
- Select the Mimic engine and the operating system (Windows or macOS).
- In the "Network" section, set up the proxy β enter the details and check the connection.
- Go to the "Advanced fingerprint settings" section.
- Find the "Audio context fingerprinting" parameter and set it to "Mask" β this will substitute your real audio fingerprint with a unique value.
- Multilogin automatically aligns the audio fingerprint with other profile parameters (WebGL, Canvas, Fonts) to make the fingerprint appear natural.
The advantage of Multilogin is the quality of emulation. Its fingerprints are virtually indistinguishable from real devices, which is critically important for working with Facebook Ads and other platforms with strict anti-fraud systems.
How to check your audio fingerprint: testing tools
After setting up the anti-detect browser, be sure to check that the audio fingerprint has indeed changed and differs from your real fingerprint. There are special services for this.
Best services for checking audio fingerprint
- BrowserLeaks Audio: Open the site browserleaks.com/audio in your anti-detect browser. The service will analyze the audio context and show the unique hash of your fingerprint. Write down this hash.
- CreepJS: A more advanced tool at creepjs.com β shows not only the audio fingerprint but also its uniqueness among other users.
- Pixelscan: The pixelscan.net service from the developers of the anti-detect browser β comprehensive checking of all types of fingerprinting, including audio.
- AmIUnique: The site amiunique.org shows how unique your fingerprint is and which parameters give you away.
How to test properly
- Checking the real fingerprint: First, open BrowserLeaks in a regular browser (Chrome, Firefox) without a proxy and anti-detect. Write down your real audio fingerprint hash.
- Checking the first profile: Launch the first profile in Dolphin Anty or AdsPower, open BrowserLeaks and write down the hash. It should be completely different from the real one.
- Checking the second profile: Create a second profile with different settings, launch it, and check the audio fingerprint. The hash should differ from both the real one and the first profile.
- Checking stability: Close and reopen the same profile, check the fingerprint β it should remain identical. This is important: the fingerprint should be unique but stable for one profile.
What the results mean: If the audio fingerprint is the same across different profiles β the protection is not working, and you need to check the settings. If the fingerprint changes with each launch of the same profile β this is also a problem; platforms will notice the instability.
Interpreting results on BrowserLeaks
On the BrowserLeaks Audio page, you will see several parameters:
- Audio hash: The main identifier of your audio fingerprint. This is a string of 32 characters (MD5 hash).
- Sample rate: The audio sampling rate. Usually 44100 Hz or 48000 Hz.
- State: The state of the audio context (running, suspended, closed).
- Max channels: The maximum number of audio channels.
- Channel interpretation: The mode of channel interpretation.
All these parameters form the final hash. If at least one parameter differs, the hash will be different. Anti-detect browsers substitute several parameters simultaneously to create a unique but realistic fingerprint.
Comprehensive protection: proxies + anti-detect + security rules
Audio fingerprinting is just one element of the multi-account detection system. Reliable protection requires a comprehensive approach that includes technical tools and safe working rules.
Technical protection
- Quality proxies: Use residential or mobile proxies for each account. Data center proxies are easily detected by Facebook and TikTok.
- One proxy = one account: Never use one IP for multiple accounts, even if they are in different anti-detect profiles.
- IP stability: Try to use the same proxy for a specific account. Frequent IP changes raise suspicion.
- Anti-detect browser: Dolphin Anty, AdsPower, or Multilogin with the correct settings for substituting audio, canvas, and WebGL fingerprints.
- Unique profiles: Each account should have its own profile with unique fingerprints. Do not clone profiles β create new ones.
Behavioral protection
Even perfect technical settings won't help if your behavior reveals multi-accounting:
- Warming up accounts: New Facebook Ads accounts cannot be immediately loaded with $500/day. Start with $20-50 and gradually increase the budget.
- Different working times: Do not log into all accounts simultaneously at 9:00 and log out at 18:00. Vary the session times.
- Different creatives: Do not use the same advertising creatives across different accounts β this is a direct signal of connection.
- Different payment methods: One bank card for all accounts = instant chain ban. Use different cards or virtual cards.
- Natural activity: Do not work in the account 24/7 through automation. Take breaks, imitate human behavior.
Safety checklist for arbitrageurs
Before launching a new account, check all items:
- β A new profile has been created in the anti-detect browser
- β A unique proxy has been set up (residential or mobile)
- β The audio fingerprint has been checked β it differs from other profiles
- β The canvas and WebGL fingerprints have been checked
- β WebRTC is disabled or substituted
- β The timezone matches the geolocation of the proxy
- β The browser language matches the country
- β Screen resolution and User-Agent are realistic
- β A unique bank card has been prepared for the account
- β Creatives differ from other accounts
Common mistakes that lead to bans
| Mistake | Why it's dangerous | How to fix it |
|---|---|---|
| One proxy for multiple accounts | The platform sees one IP for different accounts | Buy a separate proxy for each account |
| Identical audio fingerprint | The system understands that all accounts are from one device | Enable audio substitution in the anti-detect |
| Cloning profiles | All clones have identical fingerprints | Create new profiles instead of copying |
| One payment card | Direct connection between accounts through billing | Use different cards or virtual cards |
| Identical creatives | The system sees identical ads from "different" people | Create unique variations of creatives |
| Mismatch between timezone and IP | Proxy from the USA, but timezone is Moscow β suspicious | Set the timezone according to the geolocation of the proxy |
How much a secure infrastructure costs
Let's break down the real costs of safely working with 10 Facebook Ads accounts:
- Anti-detect browser: Dolphin Anty β $89/month (150 profiles)
- Proxies: 10 mobile proxies at $70 = $700/month
- Virtual cards: $5-10 per card, 10 cards = $100 one-time
- Total: $889/month + $100 at startup
Seems expensive? But one chain ban can cost you $5000-10000 in lost advertising budget and months of work to recover accounts. Investments in protection pay off after preventing just one ban.
Conclusion
Audio context fingerprinting is a serious threat for anyone working with multi-accounting on Facebook Ads, TikTok, Instagram, and other platforms. This tracking method cannot be bypassed simply by changing the IP address through a proxy β specialized tools are needed to substitute the characteristics of your device's audio subsystem.
Key takeaways from this article:
- The audio fingerprint remains the same when changing the IP, cookies, and even the operating system β it is tied to the hardware
- Facebook, TikTok, and other platforms actively use audio fingerprinting to detect linked accounts
- Proxies alone are not enough β anti-detect browsers with audio context substitution are needed
- Dolphin Anty, AdsPower, and Multilogin can create unique audio fingerprints for each profile
- It is important not only to set up technical tools but also to follow safe behavior rules
Protection against audio fingerprinting is not a one-time setup but a continuous practice. Regularly check your fingerprints through BrowserLeaks, keep an eye on updates for anti-detect browsers, use quality proxies, and do not violate basic safety rules.
If you plan to work with advertising accounts or manage multiple profiles on social networks, we recommend using mobile proxies β they provide the highest level of trust from platforms and the lowest risk of bans. Combined with a properly configured anti-detect browser, this offers reliable protection against all modern fingerprinting methods, including audio context.