VPNs, proxies, and other privacy tools don't offer true privacy. Some tools protect you from malicious third-parties but completely ignore the data you're leaking at the endpoint (server). 404 aims to protect you when the server is the adversary. Google, Apple, Cloudflare, Akamai, and similar companies should not be given unfettered access to your behavioral profile. It's time we take privacy back.
We do not operate with the intention to replace your VPN. Not right now at least. 404 does not change your IP address, spoof location, or use Onion routing (Tor).

Provides a proxy with functionality to modify HTTPS headers, TLS Cipher Suite (JA4 Fingerprint), and intelligently inject JavaScript to mitigate JS fingerprinting techniques like canvas, audio context, and webGL.Currently, 404 operates using mitmproxy. There are instructions for installing their CA cert on their website, mitm.it. You must be routing traffic through mitmproxy to view this page.
Fingerprinting is not just happening at the application level, layers 3 & 4 of the OSI model leak exorbitant amounts of fingerprinting information. A Linux eBPF program inserted at the traffic control hook allows 404 to change network packet headers to match the profiles negotiated in the on-device proxy (localhost).