Browser fingerprinting tester

Browser Fingerprinting Tester

See how unique your browser looks to websites — in real time, without sending data anywhere.

Everything runs in your browser; we don’t store, send, or log your fingerprint. This page is for education only.

Best for most people. Shows the main fingerprint signals and clear, plain-language tips.

Your fingerprint uniqueness score

Score not calculated yet. Click “Run test” to analyze this browser.

The higher the percentage, the easier it may be for websites and trackers to recognize this browser across different sites and sessions.

0–30% – Low uniqueness (harder to track) 31–70% – Medium uniqueness 71–100% – High uniqueness (more trackable)

This score is a rough, educational estimate — not a scientific measurement.

Your browser info

We collect only what your browser already shares with every site you visit.

User agent

Not measured yet — run the test.

The user agent string shows your browser, operating system, and sometimes device details. Trackers can use it to separate mobile from desktop users and spot rare setups.

• For sensitive browsing, consider privacy browsers that standardize or hide the user agent.

Screen size & pixel ratio

Not measured yet — run the test.

Your screen resolution and pixel density help describe your device. Uncommon screen sizes can make you stand out.

• When privacy is critical, avoid unusual resolutions and don’t always browse full-screen on very large monitors.

Timezone

Not measured yet — run the test.

Your timezone and offset reveal your rough geographic region and can link sessions even when you use a VPN.

• Use tools like Tor or privacy browsers that can standardize timezone when you need extra protection.

Language(s)

Not measured yet — run the test.

Your preferred languages show where you might live or work. Unique language combinations can be strong identifiers.

• For privacy-sensitive sessions, stick to common language settings instead of very rare combinations.

Platform / OS

Not measured yet — run the test.

The platform string shows which operating system and sometimes which hardware you use.

• If you need strong anonymity, consider using a virtual machine or privacy-focused operating system that looks similar to many other users.

Canvas fingerprint

Not measured yet — run the test.

By drawing hidden shapes and text, sites can measure tiny rendering differences between devices and create a high-entropy ID.

• Use browsers that block, ask, or randomize canvas fingerprinting for sensitive browsing.

WebGL vendor / renderer

Not measured yet — run the test.

WebGL can reveal your graphics card and driver stack. Combined with other data, this can make your device more unique.

• Privacy tools like Tor or hardened browsers can limit or spoof this information; you can also disable WebGL in strict setups.

Do Not Track

Not measured yet — run the test.

Do Not Track is a browser signal asking sites not to track you. Some sites respect it, but many do not.

• Treat DNT as a polite request only. Rely on real privacy protections like content blockers and privacy-focused browsers.

Plugins / extensions (summary)

Not measured yet — run the test.

The number and type of plugins can be highly identifying, especially if you use unusual tools.

• Keep plugins and extensions lean, and consider separate browser profiles for work, personal use, and high-privacy tasks.

How to reduce your fingerprintability

Browser fingerprinting is a way to recognize your device using many small details: your software, screen, languages, timezone, and more. This tester gives a rough estimate to help you see how these signals add up — it is not a lab-grade or global comparison.

  • Use privacy-focused browsers with fingerprinting protections (for example, Tor Browser, Brave with fingerprinting protection, or Firefox with strict tracking protection).
  • Use a VPN or Tor to hide your IP address and, in some cases, to reduce location leaks.
  • Limit plugins and extensions; remove add-ons you rarely use.
  • Prefer common screen resolutions and avoid unusual display setups for sensitive browsing.
  • Use separate browser profiles or containers for different activities (work, personal, research, activism).
  • Combine this with tracker blocking, private search engines, and privacy-respecting apps.

Is browser fingerprinting 100% unique?

It’s usually not 100% unique, but it can be “unique enough” to be very trackable.

  • Goal is high uniqueness, not perfection. Fingerprinting combines lots of details (browser version, OS, screen size, fonts, languages, time zone, GPU, etc.). The combination is often rare in the population, but not guaranteed to be truly unique.
  • Uniqueness is statistical. When people say “your fingerprint is unique,” they really mean “among the users we’ve seen, almost nobody else has this exact combination.” In a big enough crowd, collisions (two people sharing a fingerprint) will always exist.
  • Stability matters as much as uniqueness. Trackers care that your fingerprint stays similar over days or weeks. Even if it’s not globally unique, if the same pattern keeps showing up, they can link your visits.
  • Defenses and noise reduce uniqueness. Tor, Brave’s fingerprinting protections, Safari’s anti-tracking, canvas/WebGL blocking, standardized user agents, common resolutions, and similar tools all aim to make many users look alike so you blend into a crowd.
  • It changes over time. Browser updates, new fonts, a different monitor, changing plugins, or traveling to a new time zone all shift your fingerprint, which can both help and hurt privacy depending on how consistent those changes are.

So: in practice your fingerprint might be very distinctive, but treating it as “100% unique and permanent” is an oversimplification. It’s a high-entropy identifier that works frighteningly well, but it’s still probabilistic and can be blurred with the right tools.

Share your result

If you want to show others how fingerprinting works, you can copy a short summary — nothing is sent automatically.

Learn more about tracking

Understanding how Incognito mode, VPNs, cookies, and browser fingerprinting fit together makes it easier to choose the right privacy tools.