Browser Fingerprint
Even without login, even after clearing cookies, your browser can be identified by the combination of screen size, fonts, GPU, timezone and more. This page shows how unusual your setup is.
Nothing is measured until you press the button. Results are not uploaded, not stored.
We never send anything. Everything runs inside your browser.
Consent-based measurement
This page collects nothing until you press the button. The moment you press "Measure", it reads values from your browser and displays them. Nothing is uploaded, nothing is stored. The result disappears on reload.
Your fingerprint uniqueness
Note: the bits shown here are estimates. Real-world tracking accuracy depends on the size of the tracker's database. Treat the number as a rough sense of how unusual your combination is. Also, browsers that randomize Canvas / AudioContext (Brave, Tor, Firefox with resistFingerprinting, etc.) will produce different values on every measurement. Even when "always unique = defense is working", this tool will read that as "super rare" — a known limitation.
How to defend
There is no way to drop your fingerprint to zero. The options below either make you look like everyone else, or disable specific APIs. Links do not connect to anything until you click them.
-
Tor Browser
Designed so every Tor user looks identical. The strongest anti-fingerprint browser.
-
Brave Browser
Randomizes Canvas / WebGL / Audio APIs by default.
-
Firefox + resistFingerprinting
Set privacy.resistFingerprinting in about:config to behave like Tor.
-
LibreWolf
Firefox fork with resistFingerprinting enabled by default.
-
uBlock Origin
Blocks the fingerprinting scripts before they even load.
-
CanvasBlocker (Firefox)
Granular control of Canvas / WebGL / Audio APIs, including fake responses.
How it works
-
Reads basic info from standard browser APIs:
navigator,screen,Intl, and friends. -
Draws emoji, multi-language text and a gradient onto a hidden
<canvas>, then hashes thetoDataURL()with SHA-256. Tiny GPU / driver / OS rendering differences change the hash per device. -
Reads GPU vendor / renderer from
WebGL, and small DSP differences fromOfflineAudioContext. -
Detects installed fonts by comparing
measureTextwidths against fallback fonts. -
Estimates how many bits of entropy your combination carries, and
presents it as
1 in 2^Npeople. Real-world tracking accuracy depends on the size of the tracker's database.
Reference: EFF's Cover Your Tracks (formerly Panopticlick) has been demonstrating this technique since the 2010s. Most browsers turn out to be nearly unique.