Browser Fingerprint Test
Discover your browser's unique fingerprint. Your browser reveals hundreds of data points that can track you across the web—even without cookies.
window.fingerprint
What is Browser Fingerprinting?
Browser fingerprinting collects information about your browser, operating system, hardware, and settings to create a unique identifier. This "fingerprint" can track you across websites without cookies or login—making it nearly impossible to avoid.
Your Uniqueness Score
How unique is your browser among millions of users?All Fingerprinting Signals
Comprehensive overview of all tracking vectors - click to test each signalHardware
Software
Network & Behavior
Each signal contributes to your unique browser fingerprint. Click any link above to dive deep into specific tracking methods.
Complete Browser Fingerprint
This hash uniquely identifies your complete browser configuration (click to copy)
Navigator Properties
Browser and system information exposed by navigator objectScreen & Display computing...
Your screen resolution and display characteristics
Screen resolution, color depth, and pixel ratio create a unique signature. High-res displays (4K, 5K) or unusual aspect ratios make you stand out. The devicePixelRatio reveals if you're on a Retina display or standard monitor.
Timezone & Locale computing...
Your location revealed through time and language settings
Major Privacy Leak: Your timezone (Intl.DateTimeFormat().resolvedOptions().timeZone) reveals your precise location. For example, "America/Los_Angeles" narrows you down to the Pacific coast. Combined with other data, this can pinpoint your city.
Memory & Performance computing...
JavaScript heap size and memory limits (Chrome only)
Chrome exposes performance.memory which reveals your device's RAM allocation for JavaScript. This is unique to Chrome/Chromium browsers. Higher heap limits suggest more powerful devices.
Storage Quota computing...
Available storage space for web applications
The navigator.storage.estimate() API reveals how much disk space browsers allocate for IndexedDB, Cache API, and other storage. Large quotas suggest ample disk space—another fingerprinting vector.
MIME Types & Media Support computing...
Supported media formats and MIME types for video/audio playbackBrowsers support different media codecs based on platform, licensing, and hardware capabilities. Codec support reveals OS type (e.g., H.265 on modern systems), hardware features (VP9 hardware decoding), and even browser vendor decisions. This creates 3-5 bits of entropy in your fingerprint.
System Styles computing...
Default computed CSS styles in a fresh iframe • 0 properties, 0 unique values, 0 fontsEvery browser applies default CSS styles to HTML elements. These "user agent stylesheets" vary by browser vendor, version, and platform. By creating a fresh iframe and reading computed styles, we can detect subtle differences in default font families, sizes, margins, and other properties. This provides 2-4 bits of entropy and can distinguish between browsers even with identical user agents.
User-Agent Client Hints computing...
Modern replacement for User-Agent string (Chromium 90+)
User-Agent Client Hints (navigator.userAgentData) is Google's replacement for the traditional User-Agent string. It provides detailed OS, architecture, and version information through high-entropy values. This is the future of User-Agent fingerprinting.
Media Devices computing...
Connected cameras, microphones, and speakers
The navigator.mediaDevices.enumerateDevices() API reveals all connected audio/video devices. Device counts are highly identifying—desktop users typically have 1-2 cameras and 2-4 microphones (built-in + USB), while mobile users show predictable patterns (1 front camera, 1 back camera, 1 mic).
Privacy Note: Without camera/microphone permissions, browsers only show generic labels like "audioinput 1" to protect privacy. However, device counts are still exposed, providing 3-5 bits of entropy. This reveals hardware setup: gaming rigs (multiple audio devices), professionals (external webcams + studio mics), or mobile users (minimal devices).
Browser APIs computing...
Modern browser API availability
Modern browser APIs like Bluetooth, Barcode Detection, and Web Serial reveal browser capabilities and experimental feature flags. The Barcode Detection API is especially rare—it requires Chromium 88+ with experimental features enabled, contributing 4 bits of entropy. The Bluetooth API clearly distinguishes Chrome/Edge from Firefox/Safari (2-3 bits).
Hardware-related APIs like Web USB, Web Serial, and Web NFC are typically only available in Chromium-based browsers and often require HTTPS contexts or origin trials. The Contact Picker API is mobile-only (Android Chrome), instantly revealing device type.
The combination of which APIs are available creates a unique signature, especially for experimental or origin trial features. This reveals not only browser type and version but also whether advanced web platform features have been enabled through flags or enterprise policies.
How to Protect Against Browser Fingerprinting
- Tor Browser: The gold standard—randomizes fingerprints and routes traffic through Tor network
- Brave Browser: "Farbling" technology adds randomness to fingerprinting APIs
- Firefox: Enable
privacy.resistFingerprintingin about:config to standardize fingerprints - Browser Extensions: Canvas Blocker, Privacy Badger, uBlock Origin (advanced mode)
- Anti-detect Browsers: For web scraping, use tools like Scrapfly that rotate fingerprints automatically
- Disable JavaScript: Nuclear option—breaks most sites but prevents fingerprinting