
Browser Fingerprinting: What Websites Know About You (And How to Stop It)
You have probably heard that clearing your cookies prevents websites from tracking you. A decade ago, that was mostly true. Today, there is a far more sophisticated method of tracking that works even if you clear cookies, use incognito mode, or switch browsers. It is called browser fingerprinting, and chances are you are being fingerprinted right now.
Browser fingerprinting collects dozens of seemingly harmless data points from your browser and device โ your screen resolution, installed fonts, graphics card, timezone, language settings, and much more โ then combines them into a unique identifier. That identifier can follow you across websites without ever storing anything on your device.
In this guide, we will explain exactly how browser fingerprinting works, what types of fingerprinting exist, how websites use your fingerprint, and most importantly, what you can do to protect yourself.
What Is Browser Fingerprinting?
Browser fingerprinting is a tracking technique that identifies users by collecting technical information about their browser and device configuration. Unlike cookies, which store a tracking file on your computer, fingerprinting requires no local storage at all. It works by reading attributes that your browser willingly shares with every website you visit.
When you load a webpage, your browser sends a surprising amount of information to the server:
- User-Agent string โ your browser name, version, and operating system (check yours with our User Agent tool)
- Screen resolution and color depth
- Timezone and language preferences
- Installed plugins and extensions
- Hardware concurrency (number of CPU cores)
- Device memory
- Platform and architecture
Individually, none of these data points uniquely identify you. But combined, they create a fingerprint that is unique to your specific device and configuration. Research by the Electronic Frontier Foundation found that 83.6% of browsers have a unique fingerprint, and that number rises to over 94% when JavaScript is enabled.
How Fingerprinting Differs from Cookies
Cookies and fingerprinting serve similar purposes โ identifying returning visitors โ but they work in fundamentally different ways.
| Feature | Cookies | Browser Fingerprinting |
|---|---|---|
| Storage | Stored on your device | Nothing stored locally |
| Consent | Requires consent under GDPR | Often collected without explicit consent |
| Clearing | Easily deleted by user | Cannot be "deleted" |
| Incognito mode | Blocked or isolated | Still works |
| Cross-browser | Only works in the same browser | Can sometimes track across browsers |
| Visibility | Visible in browser settings | Invisible to the user |
This is what makes fingerprinting so powerful โ and so controversial. You cannot see it, you cannot clear it, and most people do not even know it is happening.
Types of Browser Fingerprinting
Fingerprinting has evolved well beyond simply reading your User-Agent string. Modern techniques exploit browser APIs in creative ways to extract highly unique identifiers.
Canvas Fingerprinting
Canvas fingerprinting is the most common and well-documented technique. It works by instructing your browser to draw a hidden image using the HTML5 Canvas API. The exact way your browser renders that image depends on your graphics card, GPU driver, operating system, font rendering engine, and anti-aliasing settings.
Even though the image looks identical to the human eye across different computers, the underlying pixel data is slightly different. By hashing the raw pixel data, a website generates a unique canvas fingerprint. Studies have shown that canvas fingerprints alone can identify around 50% of users.
WebGL Fingerprinting
WebGL fingerprinting extends the canvas concept into 3D rendering. Websites can query your browser for:
- GPU vendor and model (e.g., "NVIDIA GeForce RTX 4070")
- WebGL renderer string
- Supported WebGL extensions
- Maximum texture sizes and viewport dimensions
Because GPU hardware varies widely and driver implementations differ, WebGL fingerprints are highly unique. Combined with canvas fingerprinting, they form a very strong identifier.
If you are concerned about WebGL or WebRTC leaks, use our VPN Leak Test tool to check whether your real information is being exposed while connected to a VPN.
Audio Fingerprinting
Audio fingerprinting uses the AudioContext API to process a sound signal and measure the result. Similar to canvas fingerprinting, the exact output depends on your hardware and software stack. The website plays an inaudible tone (or uses an oscillator node), captures the processed audio data, and hashes it.
This technique is particularly effective because it works even when other fingerprinting vectors are blocked. Audio processing is deeply tied to your OS audio stack, making it difficult to spoof without breaking audio functionality.
Font Fingerprinting
Your installed fonts create a surprisingly unique fingerprint. Websites can detect installed fonts by measuring how your browser renders text in different font families. If a specific font is installed, text rendered in that font will have different dimensions than the fallback font.
The average computer has between 150 and 300 fonts installed, and the exact combination varies based on your operating system, version, installed applications (Adobe products add dozens of fonts), and any custom fonts you have downloaded. This creates billions of possible combinations.
Screen and Display Fingerprinting
This category captures your display configuration:
- Screen resolution (e.g., 2560x1440)
- Available screen size (excludes taskbar)
- Color depth (typically 24 or 30 bits)
- Device pixel ratio (1x, 2x for Retina, 3x for some phones)
- Number of connected displays
With the proliferation of different screen sizes, refresh rates, and DPI settings, display attributes add meaningful entropy to a fingerprint.
Additional Fingerprinting Vectors
Beyond the major categories, websites can also fingerprint through:
- WebRTC โ can leak your local and public IP addresses, even behind a VPN. Check yours at VPN Leak Test.
- CSS media queries โ detect color scheme preferences, reduced motion settings, and pointer type
- Battery API โ now deprecated in most browsers, but previously leaked battery level and charging status
- Keyboard layout and language โ detected through input event handling
- Math precision โ different JavaScript engines return slightly different results for certain math operations
How Websites Use Your Fingerprint
Browser fingerprinting is not inherently malicious. It serves several legitimate purposes alongside more controversial ones.
Fraud Detection and Security
Banks and e-commerce sites use fingerprinting to detect suspicious activity. If someone logs into your account from a device with a completely different fingerprint, the system can flag it as potentially fraudulent and require additional verification. This is actually one of the most beneficial uses of fingerprinting.
Advertising and Cross-Site Tracking
Ad networks use fingerprinting to track users across websites without relying on third-party cookies. As browsers have cracked down on third-party cookies โ Safari blocks them by default, Chrome plans to deprecate them โ fingerprinting has become more attractive to advertisers. Your fingerprint allows ad networks to build a profile of your browsing habits and serve targeted ads.
Analytics and Bot Detection
Websites use fingerprinting to distinguish real humans from bots. Automated browsers and scraping tools often have detectable fingerprint anomalies โ unusual combinations of User-Agent strings, screen sizes, and plugin lists that real browsers would never have.
Content Personalization
Some sites use fingerprinting for A/B testing and personalization without requiring user accounts. Your fingerprint ensures you consistently see the same version of a page during an experiment.
How to Check Your Browser Fingerprint
Before you can protect yourself, you need to understand how unique your current fingerprint is. Use our Browser Fingerprint tool to see exactly what information your browser is exposing. It shows you:
- Your canvas and WebGL fingerprints
- Detected fonts and plugins
- Screen and hardware information
- WebRTC leak status
- An overall uniqueness score
Seeing the results for the first time is often a wake-up call. Most people are shocked by how much data their browser reveals without any interaction at all.
You should also check your IP address to understand what location data is being exposed alongside your fingerprint.
How to Reduce Your Browser Fingerprint
Completely eliminating your fingerprint is extremely difficult โ and ironically, aggressive anti-fingerprinting measures can sometimes make you more unique. The goal is not to be invisible but to blend in with as many other users as possible.
1. Use a Privacy-Focused Browser
Firefox with Enhanced Tracking Protection set to "Strict" includes built-in fingerprinting resistance. When enabled (about:config > privacy.resistFingerprinting), Firefox standardizes many fingerprinting vectors โ it reports a generic screen size, blocks canvas readout, and limits font enumeration.
Brave Browser includes aggressive fingerprinting protection by default. It randomizes canvas and WebGL output on every page load, making it impossible to build a consistent fingerprint.
Tor Browser is the gold standard for fingerprint resistance. Every Tor user has an identical fingerprint, making it impossible to distinguish one user from another based on browser attributes alone.
2. Install Strategic Extensions
- uBlock Origin โ blocks fingerprinting scripts before they run, in addition to ads and trackers
- Canvas Blocker (Firefox) โ randomizes canvas and WebGL output
- Privacy Badger (EFF) โ learns and blocks trackers over time
Be selective with extensions. Each additional extension slightly alters your fingerprint. Install only what you need and stick to popular, well-maintained options.
3. Use a VPN
A VPN does not directly prevent fingerprinting, but it addresses a critical component โ your IP address. Without a VPN, your real IP is part of your tracking profile and reveals your approximate location and ISP.
A quality VPN masks your IP address, encrypts your traffic, and prevents your ISP from monitoring your browsing activity. For comprehensive protection, we recommend NordVPN, which offers:
- Threat Protection that blocks trackers and malicious scripts
- Strict no-logs policy, verified by independent audits
- 6,400+ servers across 111 countries for reliable connections
- WireGuard-based NordLynx protocol for minimal speed impact
After connecting to a VPN, use our VPN Leak Test to verify that your real IP, DNS servers, and WebRTC data are properly hidden.
4. Adjust Browser Settings
Several browser settings reduce fingerprinting without requiring extensions:
- Disable WebRTC โ in Firefox, set
media.peerconnection.enabledto false in about:config. This prevents WebRTC IP leaks. - Limit font access โ remove unnecessary custom fonts from your system
- Use standard screen resolution โ common resolutions like 1920x1080 make you blend in with millions of other users
- Block third-party cookies โ while not directly related to fingerprinting, it reduces overall tracking
- Disable JavaScript (nuclear option) โ eliminates most fingerprinting vectors but breaks many websites
5. Regularly Rotate Your Environment
Some advanced users maintain multiple browser profiles for different activities โ one for work, one for social media, one for general browsing. Each profile has a different fingerprint, preventing a single profile from building across all your activity.
Using different browsers for different tasks achieves a similar effect. Your Firefox fingerprint and your Chrome fingerprint are completely separate identifiers.
The Arms Race: Fingerprinting vs Anti-Fingerprinting
Browser fingerprinting is an ongoing arms race between tracking companies and privacy advocates. As browsers implement protections, fingerprinters develop new techniques. As fingerprinters find new vectors, browsers close those APIs or add noise.
Google's Privacy Sandbox initiative aims to replace third-party cookies with less invasive alternatives, but critics argue it does not adequately address fingerprinting. Apple's Safari has been the most aggressive mainstream browser in blocking fingerprinting, stripping down many of the APIs that fingerprinters rely on.
The W3C's Privacy Interest Group (PING) now reviews every new browser API proposal for fingerprinting potential. New APIs like the Web Bluetooth API and Web Serial API include permission prompts specifically to prevent silent fingerprinting.
Despite these efforts, fingerprinting remains effective because there are always new signals to collect. As long as browsers need to render content, process audio, and display graphics, there will be some degree of detectable variation between devices.
The Bottom Line
Browser fingerprinting is one of the most effective and least understood forms of online tracking. It works silently, leaves no trace on your device, and survives cookie clearing, incognito mode, and even browser reinstallation.
The good news is that awareness is growing, and both browser vendors and privacy advocates are actively working to reduce fingerprinting effectiveness. You do not have to be a cybersecurity expert to take meaningful steps toward protecting your privacy.
Start with these actions today:
- Check your current fingerprint using our Browser Fingerprint tool
- Switch to Firefox or Brave with built-in fingerprinting protection
- Install uBlock Origin to block tracking scripts
- Use a VPN to mask your IP address and encrypt your traffic
- Verify your protection with our VPN Leak Test and User Agent tools
---
Frequently Asked Questions
Can browser fingerprinting track me in incognito mode?
Yes. Incognito mode prevents your browser from saving history and cookies locally, but it does not change your browser fingerprint. Your canvas, WebGL, font, and screen fingerprints are identical in incognito mode and normal mode. This is one of the most common misconceptions about private browsing.
Is browser fingerprinting legal?
The legality depends on your jurisdiction. Under GDPR in the European Union, browser fingerprinting is considered personal data processing and requires user consent. However, enforcement is inconsistent, and many websites collect fingerprints without explicit consent. In the United States, there is no comprehensive federal law specifically addressing fingerprinting.
Can a VPN prevent browser fingerprinting?
A VPN alone does not prevent fingerprinting because most fingerprinting techniques rely on browser and hardware attributes, not your IP address. However, a VPN is an important layer of protection because it hides your IP address and location, which are often combined with your fingerprint for tracking. For best results, use a VPN alongside a privacy-focused browser and anti-fingerprinting extensions.
How unique is my browser fingerprint?
Most browser fingerprints are highly unique. Research shows that over 83% of browsers have a fingerprint that is unique among hundreds of thousands of samples. If you use uncommon fonts, a non-standard screen resolution, or multiple browser extensions, your fingerprint is likely even more unique. Check your uniqueness score using our Browser Fingerprint tool.
What is the difference between canvas fingerprinting and cookie tracking?
Canvas fingerprinting generates a unique identifier by having your browser draw a hidden image and hashing the pixel data โ this identifier is derived from your hardware and software, not stored on your device. Cookies are small text files stored in your browser that websites use to remember you. You can delete cookies, but you cannot delete a canvas fingerprint because it is recalculated every time from your system's rendering characteristics.
---
Related Articles:
Want the full interactive guide?
Test Your Browser Fingerprint โWhatIsMyLocation Team
Our team of network engineers and web developers builds and maintains 25+ free networking and location tools used by thousands of users every month. Every article is reviewed for technical accuracy using real-world testing with our own tools.
Related Articles
Try Our Location Tools
Find your IP address, GPS coordinates, and more with our free tools.