Skip to main content
All CollectionsPlatform DocumentationSettings
Passive OS Spoofing/Fingerprinting
Passive OS Spoofing/Fingerprinting

Learn how to use passive OS spoofing to mimic different operating systems for your proxy requests.

Sofia Al-Silawi avatar
Written by Sofia Al-Silawi
Updated over a week ago

What is Passive OS Fingerprinting?

Passive OS spoofing/fingerprinting is a technique used to determine a remote system's operating system (OS) without actively probing it. Instead of actively sending packets to the target system, passive OS fingerprinting relies on analyzing the characteristics of network traffic generated by the target system, such as TCP/IP stack behavior, packet size, and how packets are fragmented and reassembled.

In simple terms, this technique will allow you to spoof the OS used for all your requests when using the proxies if a different OS is selected rather than the original OS running on the machine.

By default, Linux is the OS used when running the proxies. It can be changed to Windows with a few clicks to spoof the OS.

Starting Proxidize version 0.6.6.8, this mechanism is introduced to match Windows OS characteristics.

This feature can be enabled from the Proxidize dashboard > Settings tab > Advanced Network Settings

A screenshot of the Proxidize Dashboard.


To change it to Windows, you must choose "Windows" from the drop-down list once you click the "Change" button.

A screenshot of the Proxidize Dashboard.


Once OS spoofing is enabled, the OS is spoofed to the selected OS for all requests and all proxies. If you have any issues with this feature, you will need to contact the support team via the live chat on the website https://proxidize.com and give them the details of how you're testing this feature.

Did this answer your question?