Hadiah Utama

HADIAH UTAMA DARI CYBERYOZH APP.

Menangkan Apple MacBook, $2000, iPad dan segudang hadiah lainnya!

Berpartisipasi












Proxy settings in DICloak

DICloak is a Chromium-based antidetect browser built for secure multi-account management. It spoofs key fingerprint elements, so each profile appears as a completely separate user to any platform. DICloak can be used by individuals and teams alike and allows up to 5 profiles for free.

BONUS: Get a 20% discount with promo code CYBERYOZHwhen placing your order. Valid for any DICloak subscription!

How to choose the best proxy for DICloak activities

Which proxy is the best for your specific purpose? Let's break it down.

Mobile proxies: All things with social media

Mobile proxiesare best for all social media activities, social data scraping, and other tasks that require high trust, so you can avoid bans and suspensions. Because they route traffic through real mobile carrier networks, platforms treat them as ordinary smartphone users.

They are the first choice for:

  • Social media multi-account management

  • Influencer campaign automation and scheduling

  • Social feed data extraction and audience research

  • Bypassing platform bot detection and CAPTCHAs

  • Mobile ad verification across multiple regions

DICloak assigns one proxy per profile, making mobile proxies the right fit whenever account health is the top priority. CyberYozh mobile proxies also include built-in digital fingerprint management for an extra layer of protection.

Residential static: Web service management

Residential static proxiesprovide a fixed, real home IP address that platforms see as an ordinary household user. They are affordable and fast, making them the best option for long-term activities. 

They are well-suited for:​

  • Long-term brand identity and account maintenance across platforms

  • Persistent authenticated sessions and stable login persistence

  • E-commerce account management on Amazon, eBay, Etsy, and Shopee

  • Stable SEO rank tracking from fixed geographic locations

  • B2B LinkedIn profile management and outreach automation

Avoid high-volume bulk actions from a static IP, as unusual traffic patterns can hurt your IP's reputation.​

Residential rotating: Bulk online activities

Residential rotating proxiesdraw from a large pool of real home IPs that change with each request or at a set interval, being ideal for bulk workflow automation. They are ideal for:

  • Bulk keyword tracking and SERP monitoring

  • Large-scale product catalog and price scraping

  • Mass lead generation and contact collection

  • Ad verification across multiple geos

  • High-volume social media audience research

Since DICloak supports automation via RPA and its Local Open API, rotating proxies pair naturally with scripted workflows running across many profiles.

They're charged for the traffic volume, so optimizing your requests to avoid redundancy directly lowers costs.

Before using any proxy, verify its reputation with CyberYozh's IP Checker to ensure the address is clean and trustworthy.

Datacenter proxies: Non-critical applications

Datacenter proxiesoffer the largest IP ranges, the highest speeds, and the lowest price per IP of all proxy types, but they can be easily detected by anti-bot systems, so they're best suited for tasks that aren’t platform-restricted. 

Use them for:

  • Public database scraping and open directory collection

  • API endpoint testing and load simulation

  • Large-scale news and content aggregation

  • Retail price comparison across public storefronts

  • Development environment testing and QA automation

Therefore, they are best reserved for tasks where detection risk is low or non-critical.

Summary: How to start with proxies for DICloak

Different tasks call for different proxy types, so here is a quick guide before you proceed:

  • For social media account management and social data scraping, use mobile proxies

  • For stable, long-running profiles and e-commerce account management, use residential static proxies

  • For large-scale automation and bulk data collection with DICloak's RPA or Local API, use rotating residential proxies

  • For public scraping, price monitoring, and other low-scrutiny tasks, datacenter proxies are the most cost-effective option

Beyond the proxy, DICloak's profile fingerprint editor lets you customize:

  • Operating system

  • User agent

  • Browser version

  • Canvas and WebGL rendering

  • WebGPU

  • Timezone, language, and screen resolution

Each configuration creates a completely isolated digital identity, so pairing a unique CyberYozh proxy with a unique DICloak fingerprint delivers consistent, credible personas for every account.​

Add a proxy to DICloak and run an antidetect browser session

Once you've chosen the right proxy type, the full setup takes only a few minutes.

1. Sign up and install DICloak on desktop

Go to its website, click the Register button, and create your free account using your email or Google quick sign-in. 

After you register DICloak, download the desktop application, which is available for both Windows and macOS. Install the app, launch it, and log in with your credentials to reach the main dashboard.

2. Get a CyberYozh proxy of required type

Log in to your CyberYozh account, click Add Proxy, and select the proxy type that matches your use case: mobile, residential (static or rotating), or datacenter. Once provisioned, navigate to My Proxies to find your access credentials:

Field

Example value

Host (IP address)

51.79.24.25

Port (HTTP or SOCKS5)

5959

Username

your_cyberyozh_login

Password

your_proxy_password

Click Generate Credentials to export these in the format you need. Copy the credentials directly from the dashboard. Never type them manually to avoid entry errors.

3. Create a DICloak profile

In the DICloak app, click Profiles in the left-hand navigation bar, then click the green +Create Profile button. 

In the profile creation window, start by entering a Profile Name. Then configure the core fingerprint parameters in the General section:

  • Operating system and browser version

  • Timezone, language, and screen resolution

  • Canvas and WebGL randomization for enhanced uniqueness

  • WebRTC behavior and audio fingerprint settings

  • Hardware parameters: CPU cores, RAM, and GPU

DICloak auto-generates a consistent fingerprint set by default, so you don't need to fill every field manually.​ As you see, adding a proxy is also available here.

4. Specify CyberYozh proxy credentials

In the Proxy settings menu, you’ll see the proxy configuration section. 

By default, it’s set to No Proxy, but after selecting the Custom Proxy, you’ll see the fields for proxy addition. Then select your proxy type:

  • HTTP is sufficient for standard browsing and most account management tasks

  • SOCKS5 is preferred for automation workflows and when you need full traffic-type support​

You can also select IPv4 and IPv6 protocol types; in most cases, IPv4 is used. Read more about the difference in the CyberYozh comparison article.

In Host:Port fields, enter the corresponding proxy’s IP and port. Then, specify the Proxy Account (login) and Proxy Password from your CyberYozh dashboard. Alternatively, you can paste the standard string (IP:Port:Username:Password) in the Quick input field, so DICloak will parse it.

Once all credentials are entered, click the Checking Proxy button to verify connectivity. DICloak will return the detected IP address, location, and connection status.

Alternatively, if you plan to reuse this proxy across multiple profiles, first go to the Proxies section on the left navigation panel, just below Profiles.

Here, you can specify the proxy information using the same input menu, and then select the proxy from Saved Proxies when creating or editing any profile.​

5. Save and run a profile

Once the proxy check passes, click Confirm at the bottom of the screen to save the profile. Your new profile will appear in the Profiles list with its assigned proxy and fingerprint visible. 

Click Open next to the profile to launch an isolated Chromium session; all traffic will now route through the CyberYozh proxy you assigned.

To verify everything is working correctly, open an IP lookup tool in the new session and confirm that the displayed IP address matches your proxy address. A free version of DICloak allows you to create up to 5 profiles and run up to 15 separate session launches per day.​

Best proxy practices in DICloak browser

When CyberYozh proxies are paired with DICloak's isolated profiles, each session presents a distinct IP and fingerprint, making it effectively invisible to anti-fraud and multi-accounting detection systems. The following practices will help you maintain clean, long-running profiles:​

  • Assign one unique proxy per DICloak profile.Sharing a single IP across multiple profiles is the fastest way to trigger cross-account linking flags. DICloak's profile manager makes it easy to review proxy assignments before each launch.​

  • Match proxy type to the platform's trust requirements.Use mobile or residential static proxies for social media and e-commerce accounts. Reserve rotating residential proxies for scraping and bulk automation; use datacenter proxies only for public, non-restricted data tasks.​

  • Always run the Check Proxy test before starting a new session. If the check fails, confirm that the host, port, username, and password are copied exactly from your CyberYozh dashboard. Re-test outside the app using a browser if needed.​

  • Align the proxy geo with the profile's fingerprint.The proxy's country, city, and timezone should match the language and location parameters set in the DICloak profile. Inconsistencies across these signals are a common trigger for detection.​

  • Keep sessions warm and avoid mid-session proxy switches.On established accounts, rotate a proxy only at the start of a new session, not during an active one, especially on platforms that track session-level IP consistency.​

Check the CyberYozh proxy catalog to explore all available proxy types and find the right plan for your DICloak workflow.

FAQ about the DICloak antidetect browser

What is an antidetect browser and how does it work?

An antidetect browser replaces your real browser fingerprint — OS, fonts, canvas, WebGL, screen size — with a spoofed identity per profile, while keeping cookies, cache, and IPs fully isolated between sessions.

What is DICloak and what makes it distinctive?

DICloak is a Chromium-based antidetect browser for multi-account management, offering AI-assisted no-code RPA automation, team collaboration, cloud sync, and advanced fingerprint spoofing across Windows and macOS.

Is DICloak safe to use?

Yes. DICloak blocks packet-sniffing tools like Wireshark, disables developer tools inside profiles, and prevents unauthorized extension changes, protecting shared sessions from monitoring and backdoor attacks.

Does DICloak have a free plan?

Yes. DICloak's free plan supports 5 profiles, up to 15 daily session launches, 3 extensions, and 5 RPA tasks — with full access to fingerprinting and proxy features.

What is browser fingerprinting and why does it matter?

Fingerprinting collects dozens of device signals — GPU, fonts, screen resolution, timezone, plugins — creating a unique identifier that persists even after cookies are cleared, or a VPN is used.

Can websites still detect antidetect browsers?

Advanced anti-fraud systems may flag profiles if fingerprint presets are reused or proxies carry poor reputations. Verify IPs with CyberYozh's IP Checker and use fresh fingerprints per profile.​

 

Is using an antidetect browser legal?

Antidetect browsers are legal tools used for social media management, web scraping, ad verification, and cybersecurity research. Legality depends on your intended use and each platform's Terms of Service.

How do I add a proxy to DICloak?

In the profile creation window under the Proxy menu, switch from No Proxy to Custom Proxy, select HTTP or SOCKS5, and paste your CyberYozh host, port, login, and password.

What is the difference between mobile and residential proxies for antidetection?

Mobile proxies route through real carrier networks, offering the highest trust for social media accounts. Residential static proxies provide a fixed home IP — cheaper and ideal for long-term profile maintenance.

How many fingerprint parameters does DICloak manage?

DICloak spoofs canvas, WebGL, WebGPU, AudioContext, ClientRects, SpeechVoices, fonts, RAM, CPU cores, screen resolution, timezone, and geolocation — generating a unique, realistic device identity for every profile.

 

Obrolan