Browser Fingerprint Test

Discover your browser's unique fingerprint. Your browser reveals hundreds of data points that can track you across the web, even without cookies.

All fingerprints are stored in window.fingerprint
What is Browser Fingerprinting?

Browser fingerprinting collects information about your browser, operating system, hardware, and settings to create a unique identifier. This "fingerprint" can track you across websites without cookies or login, making it nearly impossible to avoid.

Browser Identity

Your unique browser fingerprint based on hardware, software, and configuration

Complete Browser Fingerprint

Calculating...

This hash uniquely identifies your complete browser configuration (click to copy)

Navigator Properties computing...

Browser and system information exposed by navigator object

Screen & Display computing...

Your screen resolution and display characteristics
Collecting screen properties...
Technical Details

Screen resolution, color depth, and pixel ratio create a unique signature. High-res displays (4K, 5K) or unusual aspect ratios make you stand out. The devicePixelRatio reveals if you're on a Retina display or standard monitor.

Timezone & Locale computing...

Your location revealed through time and language settings
Collecting timezone data...
Technical Details

Major Privacy Leak: Your timezone (Intl.DateTimeFormat().resolvedOptions().timeZone) reveals your precise location. For example, "America/Los_Angeles" narrows you down to the Pacific coast. Combined with other data, this can pinpoint your city.

Memory & Performance computing...

JavaScript heap size and memory limits (Chrome only)
Collecting memory info...
Technical Details

Chrome exposes performance.memory which reveals your device's RAM allocation for JavaScript. This is unique to Chrome/Chromium browsers. Higher heap limits suggest more powerful devices.

Storage Quota computing...

Available storage space for web applications
Collecting storage quota...
Technical Details

The navigator.storage.estimate() API reveals how much disk space browsers allocate for IndexedDB, Cache API, and other storage. Large quotas suggest ample disk space, which is another fingerprinting vector.

MIME Types & Media Support computing...

Supported media formats and MIME types for video/audio playback
Detecting media format support...
Technical Details

Browsers support different media codecs based on platform, licensing, and hardware capabilities. Codec support reveals OS type (e.g., H.265 on modern systems), hardware features (VP9 hardware decoding), and even browser vendor decisions. This creates 3-5 bits of entropy in your fingerprint.

System Styles computing...

Default computed CSS styles in a fresh iframe 0 properties, 0 unique values, 0 fonts
Computing default styles...
Technical Details

Every browser applies default CSS styles to HTML elements. These "user agent stylesheets" vary by browser vendor, version, and platform. By creating a fresh iframe and reading computed styles, we can detect subtle differences in default font families, sizes, margins, and other properties. This provides 2-4 bits of entropy and can distinguish between browsers even with identical user agents.

User-Agent Client Hints computing...

Modern replacement for User-Agent string (Chromium 90+)
Collecting UA Client Hints...
Technical Details

User-Agent Client Hints (navigator.userAgentData) is Google's replacement for the traditional User-Agent string. It provides detailed OS, architecture, and version information through high-entropy values. This is the future of User-Agent fingerprinting.

Media Devices computing...

Connected cameras, microphones, and speakers
Enumerating media devices...
Technical Details

The navigator.mediaDevices.enumerateDevices() API reveals all connected audio/video devices. Device counts are highly identifying: desktop users typically have 1-2 cameras and 2-4 microphones (built-in + USB), while mobile users show predictable patterns (1 front camera, 1 back camera, 1 mic).

Privacy Note: Without camera/microphone permissions, browsers only show generic labels like "audioinput 1" to protect privacy. However, device counts are still exposed, providing 3-5 bits of entropy. This reveals hardware setup: gaming rigs (multiple audio devices), professionals (external webcams + studio mics), or mobile users (minimal devices).

Browser APIs computing...

Modern browser API availability
Detecting browser APIs...
Technical Details

Modern browser APIs like Bluetooth, Barcode Detection, and Web Serial reveal browser capabilities and experimental feature flags. The Barcode Detection API is especially rare since it requires Chromium 88+ with experimental features enabled, contributing 4 bits of entropy. The Bluetooth API clearly distinguishes Chrome/Edge from Firefox/Safari (2-3 bits).

Hardware-related APIs like Web USB, Web Serial, and Web NFC are typically only available in Chromium-based browsers and often require HTTPS contexts or origin trials. The Contact Picker API is mobile-only (Android Chrome), instantly revealing device type.

The combination of which APIs are available creates a unique signature, especially for experimental or origin trial features. This reveals not only browser type and version but also whether advanced web platform features have been enabled through flags or enterprise policies.

How to Protect Against Browser Fingerprinting
  • Tor Browser: The gold standard that randomizes fingerprints and routes traffic through Tor network
  • Brave Browser: "Farbling" technology adds randomness to fingerprinting APIs
  • Firefox: Enable privacy.resistFingerprinting in about:config to standardize fingerprints
  • Browser Extensions: Canvas Blocker, Privacy Badger, uBlock Origin (advanced mode)
  • Anti-detect Browsers: For web scraping, use tools like Scrapfly that rotate fingerprints automatically
  • Disable JavaScript: A nuclear option that breaks most sites but prevents fingerprinting

How to bypass web scraping bot detection