Mobile Proxy AIRSOCKS: how to properly configure WebRTC / MTU change in order to arbitrate traffic on social networks

Reading time: up to five minutes. Read till the end - get a bonus!

Many people know that for the simultaneous management of multiple accounts in the social networks or marketplaces there should be used specially created for these purposes browsers like Multiloginapp or linkensphere. But today this is not enough. So that the anti-spam system does not find your actions suspicious at the network / proxy level, a number of measures are needed. This is an emulation of the connection type (MTU), the “passive fingerprint of the OS”, as well as competent change of WebRTC data. Find out more about these actions below.

The emulation of passive fingerprint OS / MTU. It depends on the proxy server settings. AIRSOCKS mobile proxies allow you to change these values in a private channel. To do this, you need to contact AIRSOCKS support and request a change to this data. Read this article to learn on which data you need to change the default values in order not to get a ban.

 

Mobile proxies use two emulation methods:

  • Using proxy on the phone
  • Using a computer connected to Wi-Fi

 

We recommend two sites where you can check your settings after you have enabled mobile proxies.

  

Mobile proxies: samples of settings

First example:

You have a desktop computer running Windows7, Firefox browser. Now you need to “disguise” yourself and your device will work as Wi-Fi distributor (through a Megaphone proxy). Enter this:

User-Agent: Mozilla / 5.0 (Windows NT 10.0; WOW64; rv: 56.0) Gecko / 20100101 Firefox / 56.0

Next, you need to specify the settings of the operator from which you use a proxy on the phone. This is an example for Megafon proxy. Do you work with a proxy of another operator? Contact the AIRSOCKS support.

Passive OS Fingerprint: Windows

Browser User-Agent: Windows

MTU: 1340

Connection Type: OpenVPN TCP bs128 SHA1 lzo

WebRTC: Local IPs 192.168.43.148 Public IPs 31.173.86.208

 

The second example:

Direct work from a mobile device through a proxy.

(HERE INSERT PICTURES FROM THE 2nd EXAMPLE FROM THE SITE)

IMPORTANT: Entering passive OS fingerprint data, remember that regular, non-mobile proxies use fingerprints that are different from the AIRSOCKS proxy on the phone. The fingerprint of real Android - Linux2.2.x-2.3.x.

 

About WebRTC:

The internal address with such configuration is the address provided by the operator. Therefore, we need to use the same network to avoid being banned.

In general, manual setting up a proxy for a phone is a matter in which there are no “little things”. To avoid a ban, your proxy on the phone must completely simulate the configuration with which an ordinary person (who has no idea about everything in this article) uses social networks or marketplaces.

AIRSOCKS phone proxies on its part uses all its experience and its own software to protect you from banning (if you decide to buy our mobile proxies). AIRSOCKS Mobile Proxy is the best solution for automated promotion of your products and services.

Good luck in your job!

Last articles: