Is it possible that they are detecting the EOBrowser using the eoapi variable?
I know there is a way to randomize the variable, but it is still not hard to figure out because the randomized variable still has _VerifyThis and _extInvoke versions. So, if I were going to detect it, I would use the following JavaScript
Code: JavaScript
var c;for (var b in window) {if (window.hasOwnProperty(b) && b.includes('_extInvoke')) {c = b}};c.substring(0, c.indexOf('_extInvoke'))
That JavaScript will return the randomized name of the eoapi variable. You can then make a call to that object's getVersion() function if you want to help remove possible false positives.
Would it be possible to remove this method from working by also randomizing the _extInvoke and _VerifyThis variable name portions?