Gilga

Browser Fingerprint

Even without login, even after clearing cookies, your browser can be identified by the combination of screen size, fonts, GPU, timezone and more. This page shows how unusual your setup is.

Nothing is measured until you press the button. Results are not uploaded, not stored.

We never send anything. Everything runs inside your browser.

Consent-based measurement

This page collects nothing until you press the button. The moment you press "Measure", it reads values from your browser and displays them. Nothing is uploaded, nothing is stored. The result disappears on reload.

How to defend

There is no way to drop your fingerprint to zero. The options below either make you look like everyone else, or disable specific APIs. Links do not connect to anything until you click them.

How it works

  1. Reads basic info from standard browser APIs: navigator, screen, Intl, and friends.
  2. Draws emoji, multi-language text and a gradient onto a hidden <canvas>, then hashes the toDataURL() with SHA-256. Tiny GPU / driver / OS rendering differences change the hash per device.
  3. Reads GPU vendor / renderer from WebGL, and small DSP differences from OfflineAudioContext.
  4. Detects installed fonts by comparing measureText widths against fallback fonts.
  5. Estimates how many bits of entropy your combination carries, and presents it as 1 in 2^N people. Real-world tracking accuracy depends on the size of the tracker's database.

Reference: EFF's Cover Your Tracks (formerly Panopticlick) has been demonstrating this technique since the 2010s. Most browsers turn out to be nearly unique.