Browser Fingerprinting: What It Is & How to Protect Your Privacy
What Is Browser Fingerprinting?
Browser fingerprinting is a tracking technique that identifies you based on the unique characteristics of your browser and device. Unlike cookies, which store a tracking ID on your computer, fingerprinting collects information about your system configuration — screen resolution, installed fonts, browser plugins, time zone, language settings, and more — to create a unique “fingerprint” that identifies you across websites.
The concerning part: browser fingerprinting works even if you clear your cookies, use private browsing mode, or block third-party cookies. Your device configuration is remarkably unique, and that uniqueness makes you trackable.
How Browser Fingerprinting Works
Information Collected
Every time you visit a website, your browser voluntarily shares a significant amount of information. Each piece alone is not identifying, but combined, they create a unique profile:
Browser and OS:
- User-Agent string (browser name, version, operating system)
- Platform (Win32, MacIntel, Linux x86_64)
- Browser language and language preferences
- Do Not Track setting
Screen and Display:
- Screen resolution (e.g., 2560x1440)
- Color depth (24-bit, 32-bit)
- Device pixel ratio (1x, 2x for Retina)
- Available screen size (excluding taskbar)
Hardware:
- Number of CPU cores
- Available device memory
- GPU renderer (via WebGL)
- Touch support
- Maximum touch points
Fonts:
- List of installed system fonts (detected through rendering differences)
Audio:
- AudioContext fingerprint (how your device processes audio signals)
Canvas:
- Canvas fingerprint (your GPU renders a hidden image; subtle hardware and driver differences produce a unique result)
WebGL:
- GPU vendor and renderer
- Supported WebGL extensions
- Rendering characteristics
Time and Location:
- Time zone
- System clock offset
- Locale settings
The Uniqueness Problem
Research by the Electronic Frontier Foundation (EFF) found that 83.6% of browsers have a unique fingerprint. Among browsers with Flash or Java enabled (less relevant today but illustrative), 94.2% were unique.
Even without those plugins, modern fingerprinting techniques using Canvas, WebGL, and AudioContext can distinguish between most devices. A 2020 study found that canvas fingerprinting alone could identify 98% of desktop browsers.
Types of Fingerprinting
Canvas Fingerprinting
The most common technique. A hidden <canvas> element renders text and shapes. Due to differences in GPU hardware, drivers, font rendering, and anti-aliasing, the rendered image differs slightly between devices. The script converts the canvas to a data URL and hashes it.
// Simplified canvas fingerprint
const canvas = document.createElement('canvas');
const ctx = canvas.getContext('2d');
ctx.fillText('Browser fingerprint test', 10, 50);
const fingerprint = canvas.toDataURL();
WebGL Fingerprinting
Similar to canvas but uses 3D rendering. WebGL exposes detailed GPU information and rendering characteristics that are highly device-specific.
Audio Fingerprinting
The AudioContext API processes audio signals slightly differently on each device due to hardware and software differences. By generating and analyzing a simple audio signal, a script can create a device-specific fingerprint.
Font Fingerprinting
Different operating systems and users have different fonts installed. By measuring the rendered width of text in various fonts, a script can determine which fonts are available — creating another dimension of uniqueness.
TLS Fingerprinting
The TLS handshake between your browser and a server includes information about supported cipher suites, extensions, and protocol versions. This handshake is unique enough to identify browser type and sometimes specific configurations. This happens at the network level, below what browser extensions can control.
Who Uses Browser Fingerprinting?
Advertising and Analytics
Ad networks use fingerprinting to track users across websites for targeted advertising, especially as cookie-based tracking faces increasing restrictions from browser vendors and privacy regulations.
Fraud Detection
Banks and payment processors use fingerprinting to detect suspicious logins. If your account is suddenly accessed from a device with a completely different fingerprint, it may trigger additional verification.
Bot Detection
Websites use fingerprinting to distinguish real users from automated bots. Bots often have inconsistent or artificial fingerprints (e.g., claiming to be Chrome on Windows but running on a headless Linux server).
DRM (Digital Rights Management)
Streaming services use fingerprinting to limit the number of devices accessing a single account.
How to Reduce Your Fingerprint
Complete protection against browser fingerprinting is difficult, but you can significantly reduce your trackability.
Use a Privacy-Focused Browser
Tor Browser is the strongest option. It is designed to make all users look identical by standardizing window size, fonts, and other fingerprinting vectors. However, it is significantly slower than standard browsers.
Firefox with Enhanced Tracking Protection blocks known fingerprinting scripts. In about:config, set privacy.resistFingerprinting to true for additional protection (this spoofs several fingerprinting vectors but may break some websites).
Brave Browser includes built-in fingerprinting protection that randomizes canvas, WebGL, and audio fingerprints on each session.
Browser Extensions
- uBlock Origin: Blocks known fingerprinting scripts along with ads
- Canvas Blocker (Firefox): Randomizes canvas fingerprint data
- Privacy Badger (EFF): Learns and blocks trackers including fingerprinters
Reduce Unique Signals
- Use common screen resolutions: 1920x1080 is the most common. Unusual resolutions make you more unique.
- Limit installed fonts: Custom fonts add uniqueness. Stick with system defaults.
- Use default browser settings: Custom configurations increase uniqueness.
- Disable JavaScript (extreme): Most fingerprinting requires JavaScript. Disabling it breaks many websites but eliminates most fingerprinting vectors.
What Does NOT Help
- Private/Incognito mode: Does not change your fingerprint. It only prevents local storage of history and cookies.
- VPN: Changes your IP address but not your browser fingerprint. Useful for location privacy but not fingerprint protection.
- Clearing cookies: Fingerprinting does not use cookies. Clearing them has no effect on your fingerprint.
- Do Not Track header: Most websites ignore it. Ironically, having it enabled adds another data point to your fingerprint.
Testing Your Browser Fingerprint
Several tools let you see how unique your browser is:
EFF’s Cover Your Tracks
The EFF’s tool (formerly Panopticlick) tests your browser against their database and tells you how unique your fingerprint is. It checks for known tracking techniques and rates your protection level.
AmIUnique
An academic research project that collects and analyzes browser fingerprints. It shows you every attribute collected and how common each one is in their database.
CreepJS
A more comprehensive fingerprinting test that uses modern techniques including canvas, WebGL, audio, and font fingerprinting. It demonstrates just how much information your browser exposes.
For testing what data your own tools and sites expose, the EXIF Remover checks another privacy vector — metadata embedded in images you upload online.
The Future of Fingerprinting
Browser vendors are actively fighting fingerprinting:
- Chrome’s Privacy Sandbox: Aims to reduce fingerprinting surface while preserving some advertising use cases
- Firefox’s fingerprinting resistance: Continues to add protections with each release
- Safari’s Intelligent Tracking Prevention: Limits fingerprinting vectors and blocks known fingerprinting domains
However, fingerprinting techniques evolve alongside defenses. As browsers restrict one method, researchers find new vectors. It is an ongoing arms race.
The Privacy Trade-Off
Perfect anti-fingerprinting protection often degrades your browsing experience. Tor Browser’s standardized window size, disabled features, and slower performance are the price of uniformity. For most people, a balance is needed:
- Use a browser with built-in fingerprinting protection (Firefox or Brave)
- Install uBlock Origin
- Accept that some fingerprinting will still occur
- Focus your strongest privacy measures on the activities that matter most
Conclusion
Browser fingerprinting is a sophisticated tracking technique that works without cookies, across private browsing sessions, and despite most common privacy measures. While perfect protection is impractical for everyday browsing, using a privacy-focused browser with fingerprinting resistance and script blockers significantly reduces your trackability.
Check what other digital traces you leave behind. Use the EXIF Remover to strip location and device data from photos before uploading them, and the Password Generator to ensure your accounts are protected with strong, unique credentials that cannot be linked across services.