Skip to main content

Browser Fingerprint Test

How trackable is your browser — without cookies? This tool collects the same signals advertisers and trackers use to identify you.

🔬

Starting fingerprint analysis…

Quick Answer

Browser fingerprinting combines 15+ browser signals — screen resolution, GPU, fonts, audio stack — into a unique identifier that tracks you across sessions without cookies, even in private/incognito mode. Unlike cookies, fingerprints cannot be deleted.

  • • Canvas + WebGL + audio fingerprinting work without cookies
  • • 80%+ of browsers have a unique enough fingerprint to track (EFF Panopticlick)
  • • A VPN hides your IP but does NOT stop fingerprinting
  • • Brave browser randomises fingerprint signals per site — most effective protection

What Is Browser Fingerprinting?

When you visit a website, your browser reveals dozens of technical details: your screen resolution, installed fonts, GPU renderer, audio stack behaviour, timezone, language, and more. Individually these seem harmless. Collectively, they create a fingerprint unique enough to identify your browser across sessions — even in private/incognito mode, and even if you delete all cookies.

Advertisers, analytics platforms, and fraud-detection systems all use fingerprinting. A study by EFF's Panopticlick found that over 80% of browsers have a fingerprint unique enough to track without cookies.

What Signals This Test Collects

🎨

Canvas Fingerprint

Your browser draws text and shapes onto an invisible canvas element. Because fonts, GPU rendering, and anti-aliasing differ between devices, the resulting image is slightly different for everyone — producing a unique hash without sending data to a server.

🖥️

WebGL Renderer

The WebGL API exposes your GPU model and driver via the WEBGL_debug_renderer_info extension. This is highly device-specific — "Apple M3 / Apple GPU" vs "NVIDIA GeForce RTX 4090" are immediately distinguishing.

🔊

Audio Fingerprint

Using the Web Audio API's OfflineAudioContext, we process a sine wave through a dynamics compressor. The floating-point output differs microscopically based on your OS audio stack and CPU, creating a stable, cookie-free identifier.

🔤

Font Detection

By measuring whether specific fonts change the width of a test string in a canvas element, we detect which fonts are installed without accessing your file system. A professional designer with 200 fonts installed looks very different from a default Windows installation.

How to Reduce Your Fingerprint

01

Brave Browser

Randomises canvas, WebGL, and audio fingerprint per site. Zero-config protection — the most effective mainstream option for fingerprint resistance without sacrificing usability.

02

Firefox + resistFingerprinting

Set privacy.resistFingerprinting=true in about:config. Blocks most fingerprint signals including canvas, WebGL, and audio. Some sites may behave differently with this enabled.

03

Tor Browser

Maximum fingerprint resistance — all Tor users present an identical fingerprint. Best for high-risk privacy needs, though browsing speed and site compatibility are impacted.

04

VPN

Hides your IP address — one of the strongest individual tracking signals. A VPN does not stop canvas or audio fingerprinting, but it removes the IP correlation layer. Pair with Brave or Firefox for layered protection.

Hide Your IP Alongside Your Fingerprint

LimeVPN masks your IP address and ISP from every site you visit. Pair it with Brave or Firefox for comprehensive tracking protection.

Get LimeVPN — From $5.99/mo

AES-256 Encryption · No-Logs Policy · 30+ Locations · Kill Switch

Frequently Asked Questions

What is browser fingerprinting?
Browser fingerprinting is a tracking technique that collects attributes from your browser and device — such as screen resolution, installed fonts, GPU model, and audio stack — and combines them into a unique identifier. Unlike cookies, fingerprints persist across private browsing sessions and cannot be easily deleted.
Is browser fingerprinting legal?
In many jurisdictions it exists in a legal grey area. Under GDPR and CCPA, fingerprinting is generally considered personal data processing and requires consent or a legitimate interest. However, many sites deploy it anyway, especially for fraud prevention.
What does the exposure score mean?
The score (0–100) estimates how unique your browser fingerprint is. A score above 70 means your browser configuration is distinctive enough to track you across sessions without cookies. Lower scores indicate your browser looks more like many others, making fingerprint-based tracking less precise.
Does a VPN protect me from fingerprinting?
A VPN masks your IP address, which is one fingerprinting signal. However, it does not prevent canvas, WebGL, audio, or font fingerprinting. For stronger fingerprint resistance, use Firefox with resistFingerprinting enabled, the Brave browser, or the Tor Browser.
How can I reduce my fingerprint exposure?
Use a mainstream browser (Chrome or Firefox) with default settings — unusual configurations are more unique. Enable Firefox's resistFingerprinting (privacy.resistFingerprinting in about:config), use uBlock Origin, or switch to the Brave browser which randomises fingerprint attributes. A VPN hides your IP alongside these measures.
Is my data sent to LimeVPN?
No. All fingerprint calculations run entirely in your browser using JavaScript. No fingerprint data, browser attributes, or results are sent to any server. The only network request is loading the page itself.

More Privacy Tools