Disclaimer: This guide is for privacy research, hardware fingerprint testing, and education. It is not for violating any Terms of Service. What this guide is: A deep, technical hardware privacy guide about spoofing/changing hardware identifiers to make a machine as unidentifiable and untraceable as possible under advanced fingerprinting.
- Hardware Identification (HWID) Privacy Guide
- Complete Guide: Motherboard Spoofing Guide
- Key Points:
- Use DMIEdit (for AMI BIOS)
- Change only 2–5 digits of original serial
- Avoid odd patterns (e.g.,
SPOOFER-XXXX) - Reflash BIOS and clear CMOS after changes
- Intel: Disable USB ports used for RGB in BIOS (some boards provide per-port toggles).
- AMD (AM4/AM5): Unplug RGB headers or use boards with hardware toggles (e.g., ASUS ROG, MSI).
- Note: Some RGB controllers (e.g., MSI Mystic Light) expose distinct USB serials.
- Controller: Maxio MAP1202 needed
- How-To:
- Controller: YANSEN SSD needed
- How-To:
Modifying these drives can void warranties.
Software/BIOS-based RAID0 is generally virtual and unsafe for HWID evasion.
- Why: A proper hardware RAID controller prevents the OS (and fingerprinting agents) from querying individual drive serials.
- Examples:
- S322M225R (for M.2 drives).
- LSI/MegaRAID models for SATA/SAS drives.
- Note: True hardware RAID tends to cost more, but it helps mask original drive identifiers on a lower level.
- Internal NICs: Permanent changes possible for Intel, Realtek, and Mellanox:
- Intel NIC MAC Spoofing Guide
- Realtek NIC MAC Spoofing Guide
- Mellanox ConnectX-3 MAC Spoofing Guide - firmware-level, repeatable, 10 Gbps SFP+
- Note: Certain models might not support flashing or may revert.
- USB NICs: Both Realtek and ASIX adapters support MAC changes:
- Complete USB NIC Guide
- Recommended: USB‑C 2.5GbE Adapter • Amazon DE
- Purchasable HWID Spoofers: Some handle NIC spoofing, but certain NICs resist it, and they can produce questionable serial data in other areas.
- Best Practice: Keep the first 6 digits (vendor ID), change only the last 6.
- NVIDIA: UUID accessible via
nvidia-smi.- No stable public spoofing guide is widely known. Advanced driver-level hooking may exist, but it's risky and can be flagged.
- NVIDIA GPU UUIDs are not always globally unique, but they can still be used for correlation.
- AMD: No publicly documented UUID. Generally seen as safer for HWID privacy.
- Null Serials:
- Corsair DDR4/DDR5
- GEIL DDR4/DDR5
- Trident Z G.Skill DDR4/DDR5
- Keyboards/Mice:
- Roccat (now Turtleshell), Xtrfy models and "all" Razer products should not have USB serials.
- USB Sticks: Some “UDisk” drives default to
00000000- Verify with USBDeview.
- Avoid: Devices with hardcoded hardware serials you cannot edit.
- Don't trust software claiming to hide USB serials via registry edits; those methods are useless.
- Any advanced fingerprinting stack can pull serials directly from the USB protocol. Registry changes do not hide that data. You can validate this yourself: hide USB devices in the registry, then inspect traffic with a USB debugger; the serials still appear.
- Why It Matters: Monitors contain EDID data with a potentially unique serial.
- Tools:
- Fuser or Dr.HDMI (4K version).
- EDID can be dumped, edited in a hex tool, and re-flashed via these devices.
- Result: The monitor appears as a different device, reducing traceability.
- Using a Fuser on 🍊 is not recommended, even with EDID spoofing.
- Hardware: GL.iNet running OpenWrt firmware or a custom-flashed OpenWrt router.
- Process:
- Change the router's MAC and hostname.
- Change the MAC of the port you're using on the router.
- (This is different from the router's main MAC!)
- Plug only your target test machine into the router's LAN port.
- Connect the router's WAN port to your home router.
- Avoid connecting other devices, so the ARP table shows only your target test machine.
- And don't worry about those ARP addresses; these are normal and not unique. They're created by Windows:
224.0.0.22 01-00-5e-00-00-16 static224.0.0.236 01-00-5e-00-00-ec static224.0.0.251 01-00-5e-00-00-fb static224.0.0.252 01-00-5e-00-00-fc static192.168.8.255 ff-ff-ff-ff-ff-ff static239.255.255.250 01-00-5e-7f-ff-fa static255.255.255.255 ff-ff-ff-ff-ff-ff static
- Complete Guide: TPM Spoofing Guide
- Warning: dTPM is flagged by some strict telemetry stacks (e.g., 🍊).
- Current Recommendation: Use fTPM for 🍊/🍒.
- Since 2025-04-04, 🍒 enforces fTPM if you’re flagged; dTPM no longer works there.
- UNIVERSAL: HWIDChecker.exe
- Windows 10: HWID Checker Script
- Windows 11: HWID Checker Script
- Additional NIC spoofer models may be listed in the future.
- This guide evolves as new findings emerge.
Credits are a weird thing: not everything can be traced, and a lot of work/info in this guide came from many different places and people. I only list the people I know helped or are responsible for these sections in the first place.
- Storage guide/info: Priventive.de
- Network guide/info:
fA, and "the collective hive mind of the internet" - EDID guide/info:
fA(he did not invent the wheel, only gave me the info) - The broad base guide/structure was written by a "
French", Old Guide Link Fundryifor pasting/collecting this info and putting it out for everyone in one place (☭ ͜ʖ ☭)
meow
⠀⠀⠀⠀⠀⠀⣀⣀⣤⣤⣴⣦⣦⣀⣀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⣠⣾⡿⠛⠛⡉⣉⣉⡀⠀⢤⡉⢳⣄⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⣀⣤⣾⡿⢋⣴⣖⡟⠛⢻⣿⣿⣽⣆⠙⢦⡙⣧⡀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢀⣠⠖⠒⠻⠻⠶⣦⣄⠀ ⠉⣿⢸⠁⣸⣥⣹⠧⡠⣾⣿⣿⣿⣿⣧⡈⢷⣼⣧⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⣠⣿⣾⣿⣿⣶⣦⣈⠈⠻⣤ ⠀⢹⡇⢸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⠀⣿⣇⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢸⡟⣫⠀⠙⣿⣿⣿⣿⣷⡄⣽ ⠀⠀⠳⣾⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿⣟⣀⣿⣟⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣷⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠈⠙⠻⢿⣿⣿⣿⣿⣿⣿⣿⠭⠛⠉⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠸⣿⣿⣿⣿⣿⣿⣿⣿⣿⣿ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠉⠉⠉⠉⠁⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⡠⠒⡊⠙⠉⠉⠉⠓⠲⠤⡀⠀⠀⠙⠿⣿⣿⣿⣿⣿⣿⣿⠏ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠐⠿⣦⣴⣿⣶⣶⠀⠠⠀⣰⣤⣿⣦⠀⠀⠀⠀⠉⠙⠛⠻⠛⠁⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⢛⠃⢀⣄⠀⣿⡿⠟⠉⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠊⠟⠋⠈⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⢦⣄⡀⠀⠀⢀⣀⣠⣴⡿⣿⣦⣀⠀⠀⠀⠀⢀⣴⠏⠀⠀⠀⠀⠀⠀⠀ ⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠀⠙⠛⠻⠿⠉⠉⠉⠉⠉⠑⠋⠙⠻⡢⢖⡯⠉⠀⠀⠀⠀⠀