Browser Fingerprinting Demo
Your browser is already
talking without your permission.
Every website you visit collects this data — no login, no cookies, no consent. This is your digital fingerprint, assembled in real time.
DOCUMENT TYPE: LIVE SCAN
CLASSIFICATION: PUBLIC DEMO
DATA COLLECTED: 0 BYTES
Identified
Unique fingerprint hash — SHA-256
computing...
Computed entirely from your browser's exposed properties — nothing stored, nothing transmitted. This hash is stable enough to re-identify ~95% of users across sessions and websites without any login.
01Identity & Network
Your timezone and language preferences are transmitted automatically with almost every web request via HTTP headers — before you interact with any page. Combined with your IP address, advertisers can pinpoint your city. Do Not Track is a voluntary signal that virtually no site honours.
02IP Address & Location
Your public IP is sent to every server you connect to — the internet's return address. From it, sites infer your city, ISP, and VPN usage. The WebRTC local IP is more dangerous: it bypasses VPNs entirely by probing your network interface directly through the browser.
03Device & Hardware
Your screen resolution, pixel ratio, and CPU core count narrow your hardware to a small set of machines. The GPU renderer string via WebGL often names your exact graphics card. These signals are stable across reboots — ideal for passive long-term tracking.
04Browser Capabilities
WebRTC is the largest hidden risk — leaks your real local IP even through a VPN. The Battery API has been used as a short-lived fingerprint: percentage and drain rate form a surprisingly unique identifier. Your media device count is accessible without any permission prompt.
05Canvas & Audio Fingerprint
A hidden <canvas> draws text off-screen. Every GPU, OS, and font stack renders pixels subtly differently — the hash is unique to your machine. Audio fingerprinting works identically: an oscillator run through your hardware produces a unique numeric value. Both work regardless of cookie settings.
How to reduce your exposure
Firefox + RFP
Set privacy.resistFingerprinting = true in about:config. Normalises most signals so all users look identical to trackers.
Tor Browser
Routes through onion relays and actively spoofs canvas, fonts, screen size, and timezone to present a generic fingerprint.
uBlock Origin
Blocks tracker scripts that harvest and transmit fingerprint data to ad networks. One of the highest-impact browser extensions.
Disable WebRTC
Firefox: set media.peerconnection.enabled = false in about:config. Prevents local IP leaks through your VPN entirely.
Canvas Blocker
Extensions like CanvasBlocker inject random noise into canvas and audio APIs, changing your fingerprint on every page load.
VPN ≠ anonymity
A VPN hides your public IP but does nothing about browser fingerprinting. The above steps are still required to prevent tracking.
06Made By
Claude Sonnet 4.6
AI — Built the whole thing
Bilal
Human — Had the idea