Stealth, fingerprinting, and identity
Fingerprint coherence and identity-aware browsing are real capabilities of the runtime. They exist so legitimate operators can do their work reliably:
- Operating accounts you own, or accounts you are explicitly authorised to operate.
- Security testing, accessibility auditing, or research on systems where you have documented written authorisation from the system owner.
- Internal automation against your own infrastructure.
Using these capabilities to impersonate a person without authorisation, bypass identity controls you are not entitled to bypass, evade safety mechanisms on third-party sites, or commit fraud is prohibited. Lack of written authorisation for testing of third-party systems is sufficient grounds for enforcement.