Browser Fingerprint Test

Discover your browser's unique fingerprint. Your browser reveals hundreds of data points that can track you across the web—even without cookies.

All fingerprints are stored in window.fingerprint
What is Browser Fingerprinting?

Browser fingerprinting collects information about your browser, operating system, hardware, and settings to create a unique identifier. This "fingerprint" can track you across websites without cookies or login—making it nearly impossible to avoid.

Your Uniqueness Score

How unique is your browser among millions of users?
Calculating...
Uniqueness: 0% Entropy: 0 bits
Calculated using entropy from Canvas, WebGL, Audio, Fonts, Screen, Hardware, and other signals. 33+ bits = unique among millions.
Computing fingerprint...

All Fingerprinting Signals

Comprehensive overview of all tracking vectors - click to test each signal

Each signal contributes to your unique browser fingerprint. Click any link above to dive deep into specific tracking methods.

Complete Browser Fingerprint

Calculating...

This hash uniquely identifies your complete browser configuration (click to copy)

Navigator Properties computing...

Browser and system information exposed by navigator object

Screen & Display computing...

Your screen resolution and display characteristics
Collecting screen properties...

Screen resolution, color depth, and pixel ratio create a unique signature. High-res displays (4K, 5K) or unusual aspect ratios make you stand out. The devicePixelRatio reveals if you're on a Retina display or standard monitor.

Timezone & Locale computing...

Your location revealed through time and language settings
Collecting timezone data...

Major Privacy Leak: Your timezone (Intl.DateTimeFormat().resolvedOptions().timeZone) reveals your precise location. For example, "America/Los_Angeles" narrows you down to the Pacific coast. Combined with other data, this can pinpoint your city.

Memory & Performance computing...

JavaScript heap size and memory limits (Chrome only)
Collecting memory info...

Chrome exposes performance.memory which reveals your device's RAM allocation for JavaScript. This is unique to Chrome/Chromium browsers. Higher heap limits suggest more powerful devices.

Storage Quota computing...

Available storage space for web applications
Collecting storage quota...

The navigator.storage.estimate() API reveals how much disk space browsers allocate for IndexedDB, Cache API, and other storage. Large quotas suggest ample disk space—another fingerprinting vector.

MIME Types & Media Support computing...

Supported media formats and MIME types for video/audio playback
Detecting media format support...

Browsers support different media codecs based on platform, licensing, and hardware capabilities. Codec support reveals OS type (e.g., H.265 on modern systems), hardware features (VP9 hardware decoding), and even browser vendor decisions. This creates 3-5 bits of entropy in your fingerprint.

System Styles computing...

Default computed CSS styles in a fresh iframe 0 properties, 0 unique values, 0 fonts
Computing default styles...

Every browser applies default CSS styles to HTML elements. These "user agent stylesheets" vary by browser vendor, version, and platform. By creating a fresh iframe and reading computed styles, we can detect subtle differences in default font families, sizes, margins, and other properties. This provides 2-4 bits of entropy and can distinguish between browsers even with identical user agents.

User-Agent Client Hints computing...

Modern replacement for User-Agent string (Chromium 90+)
Collecting UA Client Hints...

User-Agent Client Hints (navigator.userAgentData) is Google's replacement for the traditional User-Agent string. It provides detailed OS, architecture, and version information through high-entropy values. This is the future of User-Agent fingerprinting.

Media Devices computing...

Connected cameras, microphones, and speakers
Enumerating media devices...

The navigator.mediaDevices.enumerateDevices() API reveals all connected audio/video devices. Device counts are highly identifying—desktop users typically have 1-2 cameras and 2-4 microphones (built-in + USB), while mobile users show predictable patterns (1 front camera, 1 back camera, 1 mic).

Privacy Note: Without camera/microphone permissions, browsers only show generic labels like "audioinput 1" to protect privacy. However, device counts are still exposed, providing 3-5 bits of entropy. This reveals hardware setup: gaming rigs (multiple audio devices), professionals (external webcams + studio mics), or mobile users (minimal devices).

Browser APIs computing...

Modern browser API availability
Detecting browser APIs...

Modern browser APIs like Bluetooth, Barcode Detection, and Web Serial reveal browser capabilities and experimental feature flags. The Barcode Detection API is especially rare—it requires Chromium 88+ with experimental features enabled, contributing 4 bits of entropy. The Bluetooth API clearly distinguishes Chrome/Edge from Firefox/Safari (2-3 bits).

Hardware-related APIs like Web USB, Web Serial, and Web NFC are typically only available in Chromium-based browsers and often require HTTPS contexts or origin trials. The Contact Picker API is mobile-only (Android Chrome), instantly revealing device type.

The combination of which APIs are available creates a unique signature, especially for experimental or origin trial features. This reveals not only browser type and version but also whether advanced web platform features have been enabled through flags or enterprise policies.

How to Protect Against Browser Fingerprinting
  • Tor Browser: The gold standard—randomizes fingerprints and routes traffic through Tor network
  • Brave Browser: "Farbling" technology adds randomness to fingerprinting APIs
  • Firefox: Enable privacy.resistFingerprinting in about:config to standardize fingerprints
  • Browser Extensions: Canvas Blocker, Privacy Badger, uBlock Origin (advanced mode)
  • Anti-detect Browsers: For web scraping, use tools like Scrapfly that rotate fingerprints automatically
  • Disable JavaScript: Nuclear option—breaks most sites but prevents fingerprinting

How to bypass web scraping bot detection