Browser Fingerprinting Demo

Your browser is already
talking without your permission.

Every website you visit collects this data — no login, no cookies, no consent. This is your digital fingerprint, assembled in real time.

DOCUMENT TYPE: LIVE SCAN
CLASSIFICATION: PUBLIC DEMO
DATA COLLECTED: 0 BYTES
Scanning your browser0%
Identified

Unique fingerprint hash — SHA-256

computing...

~95%
Unique to you

Computed entirely from your browser's exposed properties — nothing stored, nothing transmitted. This hash is stable enough to re-identify ~95% of users across sessions and websites without any login.

01Identity & Network
Your timezone and language preferences are transmitted automatically with almost every web request via HTTP headers — before you interact with any page. Combined with your IP address, advertisers can pinpoint your city. Do Not Track is a voluntary signal that virtually no site honours.
02IP Address & Location
Your public IP is sent to every server you connect to — the internet's return address. From it, sites infer your city, ISP, and VPN usage. The WebRTC local IP is more dangerous: it bypasses VPNs entirely by probing your network interface directly through the browser.
03Device & Hardware
Your screen resolution, pixel ratio, and CPU core count narrow your hardware to a small set of machines. The GPU renderer string via WebGL often names your exact graphics card. These signals are stable across reboots — ideal for passive long-term tracking.
04Browser Capabilities
WebRTC is the largest hidden risk — leaks your real local IP even through a VPN. The Battery API has been used as a short-lived fingerprint: percentage and drain rate form a surprisingly unique identifier. Your media device count is accessible without any permission prompt.
05Canvas & Audio Fingerprint
A hidden <canvas> draws text off-screen. Every GPU, OS, and font stack renders pixels subtly differently — the hash is unique to your machine. Audio fingerprinting works identically: an oscillator run through your hardware produces a unique numeric value. Both work regardless of cookie settings.

How to reduce your exposure

Firefox + RFP

Set privacy.resistFingerprinting = true in about:config. Normalises most signals so all users look identical to trackers.

Tor Browser

Routes through onion relays and actively spoofs canvas, fonts, screen size, and timezone to present a generic fingerprint.

uBlock Origin

Blocks tracker scripts that harvest and transmit fingerprint data to ad networks. One of the highest-impact browser extensions.

Disable WebRTC

Firefox: set media.peerconnection.enabled = false in about:config. Prevents local IP leaks through your VPN entirely.

Canvas Blocker

Extensions like CanvasBlocker inject random noise into canvas and audio APIs, changing your fingerprint on every page load.

VPN ≠ anonymity

A VPN hides your public IP but does nothing about browser fingerprinting. The above steps are still required to prevent tracking.

06Made By
Claude AI

Claude Sonnet 4.6

AI — Built the whole thing

Bilal

Bilal

Human — Had the idea