Disappear into the crowd.
Occlude reshapes the TCP, TLS and HTTP/2 fingerprints your machine emits, in flight, to match a chosen profile—the same shape that millions of other hosts already emit. Open source, no telemetry, signed releases.
emitting
rewrites / second
crowd size
Synopsis. As a man page would put it.
- Name
- occlude — network-fingerprint normaliser
- Synopsis
- occlude [-c config] [-p profile] start | stop | status | reload
- About
- A small daemon, roughly 3 MB on disk. No GUI; runs as a system service. Occlude intercepts outbound traffic before it leaves the host and rewrites the fields a passive observer would use to identify your stack, so that on the wire you look like any other machine running the same profile.
- See also
- live status · occlude-profile(5) · occlude.toml(5)
The surface it normalises. Three layers, real fields, no magic.
wscale=14 or a Linux-ish ttl=64 on a macOS box.
supported_groups, signature_algorithms, ALPN, key shares, GREASE. Rewrites the handshake so JA3 / JA4 hashes match a real released browser—not a heuristic that says "browser-ish".
SETTINGS frame values and order, WINDOW_UPDATE, header table size, pseudo-header order (:method :authority :scheme :path), priority frames. Akamai's HTTP/2 fingerprint matches the profile, not your client library.
How a session looks. From curl to the wire.
curl https://example.com # your application, untouched ↓ +-----------------------------------------+ | occlude · netfilter / pf hook | # intercept, no proxy | rewrite TCP options ........ p0f3 | | rewrite TLS ClientHello ..... ja4 | | rewrite H2 SETTINGS ......... akamai | +-----------------------------------------+ ↓ wire — observer sees a host indistinguishable from N=11.4M others currently emitting chrome-132/desktop-linux
Install. Three lines, three platforms.
/etc/occlude/profile.toml.%APPDATA%\occlude\profile.toml.minisign. Public key in the repo.What it isn't. Honest about the boundary.
Not a VPN.
Occlude doesn't move your traffic. Pair it with one—your exit IP is still your exit IP.
Not a browser.
Application-level identifiers—cookies, canvas, fonts, audio context—are out of scope. Use a hardened browser for that surface.
Not an anti-fraud bypass.
Occlude doesn't masquerade as a residential proxy or fake device telemetry. If that's your use case, this isn't the tool.
Not a panacea.
If the same IP emits one profile in the morning and another in the afternoon, correlation does the rest. Pick a profile and stay there.
Pricing. Free for TCP. Pro for the full stack.
- TCP/IP fingerprint normalisation
- p0f3-compatible profiles
- CLI + systemd integration
- Community profiles
- Open source (MIT)
- Everything in Free
- TLS ClientHello rewriting (JA4)
- HTTP/2 SETTINGS normalisation
- Browser profiles (Chrome, Firefox, Edge)
- Automatic profile updates
- Priority support
Why it exists.
A passive observer doesn't need to read your packets to know who you are. The shape of your handshakes, the rhythm of your ACKs, the order of fields you've never heard of—these identify you across resets, across networks, across years. Occlude doesn't hide you. It dilutes you into a population that's already there. — from the README, 2026