User agent
Not measured yet — run the test.
The user agent string shows your browser, operating system, and sometimes device details. Trackers can use it to separate mobile from desktop users and spot rare setups.
• For sensitive browsing, consider privacy browsers that standardize or hide the user agent.
Screen size & pixel ratio
Not measured yet — run the test.
Your screen resolution and pixel density help describe your device. Uncommon screen sizes can make you stand out.
• When privacy is critical, avoid unusual resolutions and don’t always browse full-screen on very large monitors.
Timezone
Not measured yet — run the test.
Your timezone and offset reveal your rough geographic region and can link sessions even when you use a VPN.
• Use tools like Tor or privacy browsers that can standardize timezone when you need extra protection.
Language(s)
Not measured yet — run the test.
Your preferred languages show where you might live or work. Unique language combinations can be strong identifiers.
• For privacy-sensitive sessions, stick to common language settings instead of very rare combinations.
Platform / OS
Not measured yet — run the test.
The platform string shows which operating system and sometimes which hardware you use.
• If you need strong anonymity, consider using a virtual machine or privacy-focused operating system that looks similar to many other users.
Canvas fingerprint
Not measured yet — run the test.
By drawing hidden shapes and text, sites can measure tiny rendering differences between devices and create a high-entropy ID.
• Use browsers that block, ask, or randomize canvas fingerprinting for sensitive browsing.
WebGL vendor / renderer
Not measured yet — run the test.
WebGL can reveal your graphics card and driver stack. Combined with other data, this can make your device more unique.
• Privacy tools like Tor or hardened browsers can limit or spoof this information; you can also disable WebGL in strict setups.
Do Not Track
Not measured yet — run the test.
Do Not Track is a browser signal asking sites not to track you. Some sites respect it, but many do not.
• Treat DNT as a polite request only. Rely on real privacy protections like content blockers and privacy-focused browsers.
Plugins / extensions (summary)
Not measured yet — run the test.
The number and type of plugins can be highly identifying, especially if you use unusual tools.
• Keep plugins and extensions lean, and consider separate browser profiles for work, personal use, and high-privacy tasks.