Skip to content

Browser Privacy Check

Browser-side · queries to public APIs
Last verified May 2026 — runs in your browser

About this tool

Browser fingerprinting builds a unique identifier from configuration details that websites can read without explicit consent: User-Agent string, screen resolution, installed fonts, WebGL renderer, Canvas rendering, AudioContext sampling, and hardware signals like CPU cores. Eckersley's 2010 Panopticlick study (How Unique is Your Web Browser?, PETS 2010) measured 18.1 bits of identifying entropy across about half a million users — 84% of browsers had unique configurations, distinguishable from one in 286,777 others. This tool inspects what your current browser exposes: WebRTC IP leaks (which can bypass a VPN), DNS resolver path, Canvas+Audio fingerprint signature, WebGL renderer, font enumeration, and hardware specs. All inspection runs locally — no fingerprint data leaves your browser. Results highlight the riskier surfaces so you can apply mitigations: Firefox's privacy.resistFingerprinting (v67+, May 2019, from the Tor Uplift project), Safari's Intelligent Tracking Prevention (since Safari 11/iOS 11, September 2017), Chrome's Privacy Sandbox (Topics API retired October 2025; FedCM retained), or browser extensions that spoof signals. Cookies fall under ePrivacy Directive Art. 5(3) consent, but fingerprints run passively — knowing yours is the first step to reducing it.

How to run a privacy check

  1. Open the page — the tool inspects your current browser session automatically (no input needed).
  2. Review your fingerprint surface report: Canvas / AudioContext / WebGL / font / screen signals + WebRTC leak status + DNS resolver path.
  3. Compare against the Eckersley 2010 baseline (18.1 bits = 1-in-286,777 uniqueness) to gauge your relative anonymity.
  4. Apply mitigations per browser: Firefox privacy.resistFingerprinting, Safari ITP, Chrome UA-CH + Privacy Sandbox, or extension-based spoofing.

Common use cases

  • Auditing a hardened browser profile before privacy-sensitive work.
  • Confirming a VPN or Tor setup is actually masking the expected fingerprint surfaces.
  • Checking for WebRTC IP leaks that bypass a VPN tunnel via STUN.
  • Verifying that an extension (Brave Shields, Privacy Badger, NoScript) is delivering the expected mitigation.

Frequently asked questions

What is browser fingerprinting and how unique is mine?

Eckersley 2010 (Panopticlick, PETS) measured 18.1 bits entropy across 8 features — 84% of browsers were unique among ~470,000 surveyed. Modern libraries combine 30+ signals reaching higher uniqueness.

Which surfaces of my browser actually contribute to the fingerprint?

Canvas pixel rendering, AudioContext sampling, WebGL renderer string, enumerated fonts, screen + color depth, languages, timezone, CPU cores, and User-Agent. The combination is what is unique — not any single value.

How can I reduce my browser fingerprint exposure?

Firefox privacy.resistFingerprinting (v67+, May 2019, Tor Uplift project), Safari ITP (since Safari 11, September 2017), Chrome Privacy Sandbox + UA-Client Hints (Chrome 89, March 2021).

What is UA-Client Hints?

A W3C draft replacing the legacy User-Agent header. Chrome 89 (3 March 2021) sends Sec-CH-UA and Sec-CH-UA-Mobile by default; sites must request browser version/platform via Accept-CH opt-in.

Cookies vs fingerprints — what consent applies?

Cookies fall under EU ePrivacy Directive Art. 5(3) requiring informed consent + GDPR Art. 6 lawful basis. Fingerprints are passive but the 2009 ePrivacy amendment extended Art. 5(3) to cover 'access of information' too.

Why fingerprinting works — and what each browser-native mitigation actually does

Each browser configuration is a vector of dozens of values: User-Agent (header sent by every request), screen resolution and color depth (window.screen), system fonts (rendered via Canvas measureText), WebGL renderer string (gl.getParameter), CPU cores (navigator.hardwareConcurrency), preferred languages (navigator.languages), timezone (Date.getTimezoneOffset), Canvas pixel rendering (reflects GPU + driver + font version), and AudioContext sampling output (DSP characteristics). Eckersley 2010 reported 18.1 bits combined entropy across 8 features alone; modern libraries combine 30+ signals reaching higher uniqueness. Mitigation strategies layer differently. Firefox's privacy.resistFingerprinting preference dates from Firefox 41 (2015) under the Tor Uplift project; letterboxing — which snaps window dimensions to multiples of 200×100 px — shipped in Firefox 67 (21 May 2019). The pref also rounds high-resolution timers (performance.now()) to 16.67 ms, forces the timezone to UTC, and spoofs the User-Agent to a Tor-Browser-like value. Safari's Intelligent Tracking Prevention (announced WWDC June 2017, shipped Safari 11 September 2017) takes the cookie-side approach: third-party cookies are accessible for 24 hours after the user's last first-party interaction, partitioned between 24 hours and 30 days, and purged after 30 days of inactivity. Chrome's Privacy Sandbox initially proposed Topics API for interest-based ad targeting and FedCM for federated identity; Google retired Topics and Protected Audience in October 2025, leaving FedCM and CHIPS as the surviving components. UA-Client Hints (Chrome 89, 3 March 2021) reduce the User-Agent surface by freezing the UA string and exposing Sec-CH-UA / Sec-CH-UA-Mobile / Sec-CH-UA-Platform on opt-in basis.

  • Browser fingerprint surface inspection (Canvas, WebGL, AudioContext, fonts, UA, screen, hardware)
  • WebRTC IP leak detection (STUN-based real-IP exposure)
  • DNS resolver path inspection (clear-text vs encrypted DoH/DoT)
  • Eckersley 2010 entropy reference baseline (18.1 bits / 8 features / n≈470,000)
  • Mitigation guidance per browser (Firefox/Safari/Chrome native flags)
  • Client-side analysis only (no fingerprint data leaves your browser)

Free. No signup. Browser tools (subnet, JWT, password strength) run locally; lookup tools query public APIs (Cloudflare DoH, RDAP, certificate logs). Full per-tool breakdown at /methodology/.

Sources (6)
  • Eckersley, P. (2010). How Unique Is Your Web Browser?. Privacy Enhancing Technologies Symposium (PETS) 2010, LNCS 6205, Springer Berlin Heidelberg, pp. 1–18.
  • Mozilla (2019). Resist Fingerprinting (privacy.resistFingerprinting preference, Firefox 67+ from Tor Uplift project). support.mozilla.org/kb/resist-fingerprinting + Bugzilla 1333933.
  • Apple Inc. (2017). Intelligent Tracking Prevention. webkit.org/blog (announced WWDC June 2017, shipped Safari 11 / iOS 11 September 2017).
  • W3C / WICG (2021). User-Agent Client Hints. wicg.github.io/ua-client-hints (shipped Chrome 89, March 2021).
  • European Parliament & Council (2016). Regulation (EU) 2016/679 (General Data Protection Regulation). Article 6 lawful basis for processing, eur-lex.europa.eu.
  • European Parliament & Council (2002). Directive 2002/58/EC (ePrivacy Directive), amended by Directive 2009/136/EC. Article 5(3) terminal device data consent, eur-lex.europa.eu.

These are the IETF RFCs, NIST publications, and W3C standards the tool implements or queries. Locate them on the IETF Datatracker (datatracker.ietf.org) or the official standards body.