fingerprintToken

Tokens designed for flexible identification and validation use cases. These tokens can be issued and consumed in a variety of ways depending on your application’s use-case.

Example usages of tokens include, but not limited to:

  • Store locally (such as in a user's registry or filesystem) to act as a persistent fingerprint for device or user identification, persisting itself across HWID spoofers.

  • Embed into unique client builds distributed to individual users, allowing you to distinguish, track, or validate specific builds at runtime.

The structure, storage location, and security model of tokens are entirely defined by the developer, enabling them to be adapted to different platforms and distribution strategies.

Encryption ensures that the token payload remains confidential, allowing tokens to be safely stored or distributed.

Payload Reading

Creating tokens is a developer API only feature, however, our bot does include a command which will allow you to read a provided tokens payload.

Last updated