Bot Protection
Fanfare includes comprehensive protection against bots, automated scripts, and fraudulent access attempts to ensure fair distribution to legitimate consumers.This documentation describes bot protection features at a high level. Specific detection methods and thresholds are
not disclosed to maintain their effectiveness.
Why Bot Protection Matters
High-demand product launches attract automated abuse:- Reseller bots attempting to purchase inventory for resale
- Credential stuffing using stolen account lists
- Scalping scripts that bypass queue mechanisms
- DDoS attacks attempting to disrupt launches
Protection Layers
Device Fingerprinting
Every consumer interaction includes a device fingerprint that helps identify unique devices:- Identifies unique devices across sessions
- Detects device spoofing attempts
- Links multiple accounts to single devices
- Prevents “ghost” accounts from bots
- Fingerprints are hashed, not raw device data
- Cannot reverse-engineer device specifications
- Compliant with privacy regulations
- Consumers can clear by clearing browser data
Rate Limiting
All endpoints are rate-limited to prevent automated abuse:| Action | Limit | Window |
|---|---|---|
| Experience entry | Per-device | Per event |
| Queue join | Per-device | Per event |
| Authentication | Per-IP | Rolling |
| API calls | Per-key | Rolling |
Behavioral Analysis
Fanfare analyzes interaction patterns to distinguish humans from bots:Timing Analysis
Evaluates request timing patterns
Interaction Patterns
Analyzes how users interact with the page
Navigation Flow
Tracks expected vs. anomalous paths
Session Behavior
Monitors session-level patterns
Challenge Systems
When suspicious activity is detected, consumers may be presented with challenges:- Invisible challenges: Resolved automatically for legitimate users
- Interactive challenges: Require human interaction
- Escalation: Progressive challenges based on risk level
Configuring Protection
Protection Levels
Configure protection strength for your organization:| Level | Description | Use Case |
|---|---|---|
| Standard | Balanced protection and UX | Most launches |
| Enhanced | Stricter checks, may affect some users | High-demand |
| Maximum | Strictest protection | Extreme demand |
Per-Experience Settings
Different experiences may need different protection:Purchase Limits
Combine bot protection with purchase limits:Handling Bot Challenges
Consumer Experience
When a consumer is challenged:- Seamless path: Most legitimate users proceed without interruption
- Challenge path: Some users see a brief verification step
- Blocked path: Clear bots are denied access
SDK Events
Listen for protection events in your integration:Error Handling
Handle protection-related errors gracefully:Best Practices
For High-Demand Launches
Enable enhanced protection
Enable enhanced protection
Increase protection level before high-profile launches.
Require authentication
Require authentication
Authenticated consumers are harder for bots to impersonate.
Set purchase limits
Set purchase limits
Limit quantities per consumer and per device.
Use draws for fairness
Use draws for fairness
Random selection eliminates speed-based bot advantages.
Monitor in real-time
Monitor in real-time
Watch your dashboard during launches for anomalies.
Integration Recommendations
- Keep SDK updated: Latest SDK has latest protections
- Don’t bypass fingerprinting: Required for protection
- Implement server-side validation: Always validate handoffs
- Monitor error rates: Spikes may indicate attack attempts
Monitoring & Alerts
Dashboard Metrics
Monitor bot protection effectiveness:- Challenge rate: Percentage of users challenged
- Block rate: Percentage of users blocked
- False positive rate: Legitimate users incorrectly blocked
Alert Configuration
Set up alerts for unusual activity:Support for Blocked Users
Legitimate User Appeals
If a legitimate consumer is blocked:- Retry: Clear browser data and try again
- Different device: Try from a different device
- Contact support: Provide error code for investigation
Error Codes
When consumers are blocked, provide the error code:| Code | Meaning | User Action |
|---|---|---|
| BP001 | Device verification failed | Clear browser, retry |
| BP002 | Unusual activity detected | Wait, retry |
| BP003 | Access limit reached | Contact support |
Support Requests
When consumers contact you about being blocked:- Collect the error code
- Note the approximate time
- Forward to Fanfare support with organization ID
- We’ll investigate and adjust if needed
Limitations
What Protection Cannot Prevent
- Dedicated human resellers: Real people acting quickly
- Shared household devices: Legitimate multi-user scenarios
- Corporate networks: Many users behind one IP
Balancing Security and Experience
More aggressive protection may impact some legitimate users. We recommend:- Standard for most launches
- Enhanced for known high-demand events
- Maximum only for extreme situations
Related Resources
- Fairness Guide - Fair distribution strategies
- Security Overview - Security architecture
- Contact Support - Report issues