The main rule of Fb (that everyone at all times breaks) is that every particular person can have only one Fb account. Generally accounts are blocked not due to breaking the social community’s coverage or guidelines but due to creating fake accounts. Moreover, in such instances Fb provides no causes – it simply blocks your account and that’s it.

In accordance with Zuckerberg, the community’s antidetect is programmed to impose the maximum punishment for fake accounts. Generally Fb doesn’t block fake accounts which it has already found, to find other accounts (which break the principles) using the recognition system and large-information analysis. Truthful enough though – except information breaches, 99% of the community’s issues come up out of faux accounts. Zuck detects and blocks them on time, thus defending his platform in general.

And we’ve to admit, he’s doing quite well.

Fb relies extra on the evaluation of behavioral components rather than on fingerprinting and person identification. The limit of the profile high quality is determined by the various mixtures of three teams of things: Information – Connections – Actions. So, first things first.

Information are the data (associated to a Fb profile) including the following data:

Devices system configs (cell and desktop). All of the computer systems and cellphones that have been used to log in, visible linked devices (or visible within one wi-fi connection), devices within one IP range;
All cookies, IP-addresses, DNS used and other elements of the community;
Added funds devices;
The content material of ad accounts (businesses, domains, apps, artistic materials, etc.);
The content material of a profile (checklist of associates, a textual content of messages, teams, fanpages etc.). All the data from the security panel that you could download (My Fb Information tab).

Connections are the links Fb may establish that associated to a profile as effectively:

All instances of a match of info with other accounts;
All similar (or nearly similar) actions with other accounts.

Actions are the consistent exercise of devices, linked with a profile, during which info and connections are emerging.

Fb collects all three information-bases. They are linked to one another and regulate one another. Finally, the system assigns a high quality indicator (based on the evaluation of the data) to every community’s user. Fb calls it USER_TRUST while Google calls it Quality Score.

And there raise attention-grabbing questions:

Methods to organize actions in your account in such a way that they would act otherwise than other fake accounts?
Methods to achieve a enough degree of anonymity when the system couldn’t find any connection or undeniable fact that matches with other accounts?

Nevertheless, with regard to behavior, there are plenty of completely different guides (based on expertise and follow of other moneymakers) on how you can create an account before registration, after registration, and before the first ad campaigns. But, unfortunately, we can’t say the same factor about the second question. Speaking of anonymity and confrontation the Antidetect programs – it’s not that easy.

As we said before, 99% of Fb issues are made by fake accounts. Spam, credit card fraud, black-hat advertising and marketing, social engineering, indignant russian hackers – all of this is the work of faux accounts. And a man would be an fool to add a stolen credit card using his actual name.

Clearly, such a giant platform as Fb uses probably the most superior identification technologies. The community begins watching you before you create an account there. Up-to-date farming strategies take into account cookie evaluation and visiting websites with Fb Pixel. In any other case, a profitable launching will not be assured.

Modern identification programs are based on the fingerprintjs expertise developed by Valentin Vasilyev 5 years in the past:

Fb Antidetect includes the gathering of information on customers (using fingerprinting) and receiving information from other companies (which additionally use fingerprinting). All the data are collected on the precept of “Information – Connections – Actions” and then Fb AI takes the lead. It processes the information and ranks it on the “USER_TRUST” concept.

Probably the most environment friendly method to determine a person is the js-requests to Canvas, WebGL and WebRTC interfaces. The information obtained are reworked into hashes which make up the mixed print of a user. We’ll consider the best way of deceiving the interfaces extra carefully in our next article! Keep tuned 😉