This is a somewhat deep internal architectural decision that is difficult to change, but we are planning on fixing it along with a host of other related issues caused by the architectural decision tracked in the feature/tor/guest-semantics label: -browser/labels/feature%2Ftor%2Fguest-semantics
I installed TunnelBear VPN and I allowed GhostBear and VigilantBear options. I installed Brave browser and logged in a website, but my real location was recognized.
When I checked my location through iplocation, I got VPN's location.
I installed Tor browser and based on this tutorial I set only specific countries to fake my location. When I logged in the website it says that my current timezone is utc +00:00 - undefined, so I am able to hide my location, but I am not able to fake it.
When I checked my location through iplocation, I got tor's node location.
To manually change the location, in about:config look for the settinggeo.wifi.uri and enter a specific longitude and latitude value.An example value is:data:application/json,"location": "lat": 40.7590, "lng": -73.9845, "accuracy": 27000.0.For more information on this format see link.
You can, as you discovered, shift your apparent location by changing the IP address you appear to come from. Keep in mind that your browser may still be sending headers to indicate your preferred language and other characteristics that could be interpreted as inconsistent with your IP address.
To spoof your location would be very difficult. You would probably need to combine several techniques, including a custom browser that fakes Geolocation API responses (and your IP address must be consistent with that faked location).
But given a sufficiently sophisticated server, any privacy hygiene issues with your browser stored state (e.g., cookies) or browser fingerprint could easily betray your attempts to shift or spoof your location.
If are serious about spoofing and not just privacy, I believe the next step after looking at custom browsers is to look at hacker's tools. Packet manipulation tools like burpsuite may be your friend. Not only can you see where your data leak is coming from, you can draw up rules to automatically fudge the location fields in outgoing packets.
The Chrome browser is evergreen - meaning it will automatically update itself,sometimes causing a breaking change in your automated tests. We hostchromium.cypress.io with links to download aspecific released version of Chrome (dev, Canary and stable) for every platform.
You can change where DevTools is docked in the browser. By default, Microsoft Edge DevTools is docked to the right of the browser window. You can also dock DevTools to the bottom or left of the window, or undock DevTools to a separate window.
When you use Tor to browse the web, your connection to the site is passed through random IP addresses based in any number of countries. This is great for keeping your real location private, but unhelpful if you want to visit a website that only allows connections from a particular country. If you want the sites you browse to think you're connecting from a certain location, you can add custom entry and exit nodes to your configuration file. It's a better idea to use a VPN to fake your location, but Tor will work if you don't have one. This wikiHow teaches you how to set custom exit and entry nodes in the Tor web browser using Windows, macOS, and Linux.
df19127ead