Anonymity Score Checker - Browser Privacy & Fingerprint Analysis
Analyze your browser's anonymity score. Detect fingerprint uniqueness, WebRTC leaks, tracking exposure, and privacy vulnerabilities in real-time.
Analyze your browser's fingerprint exposure and privacy vulnerabilities
About
Every browser transmits a composite signal - a fingerprint assembled from canvas rendering, WebGL renderer strings, AudioContext oscillator output, screen geometry, timezone offset, installed plugins, and language headers. Research from the EFF's Panopticlick project demonstrates that the combination of these factors uniquely identifies over 94% of browsers without any cookies. This tool quantifies that exposure. It probes 14 distinct fingerprint vectors, computes Shannon entropy H for each, and returns a weighted composite anonymity score from 0 (fully exposed) to 100 (effectively anonymous). No data leaves your machine. All analysis executes client-side.
Misconfigured privacy settings create a false sense of security. A user who blocks cookies but leaks a WebRTC local IP, runs a rare screen resolution, and permits canvas readout is more identifiable than one who accepts cookies on a common configuration. This tool surfaces those blind spots. Note: scores approximate real-world trackability. Actual fingerprint databases (e.g., FingerprintJS) may use additional signals not testable in a single-page context.
Formulas
The composite anonymity score combines per-factor scores using a weighted arithmetic mean. Each factor fi receives a score from 0 to 100 based on how common or protected the detected value is.
Where S is the final anonymity score, wi is the weight for factor i, and fi is the individual factor score. Shannon entropy for a fingerprint vector is computed as:
Where p(xi) represents the probability of a given value occurring in the general population. Higher entropy means the value is more common (better for anonymity). Lower entropy indicates a rare, identifying value. Per-factor scores map detected values against known population distributions - common values score near 100, rare values score near 0.
Reference Data
| Privacy Factor | Detection Method | Risk If Exposed | Mitigation | Weight |
|---|---|---|---|---|
| User-Agent String | navigator.userAgent parsing | OS, browser, version revealed | UA spoofing extension | 8% |
| Canvas Fingerprint | 2D canvas text rendering hash | GPU/font stack uniquely identified | CanvasBlocker addon | 12% |
| WebGL Renderer | WEBGL_debug_renderer_info | Exact GPU model exposed | Disable WebGL or spoof | 10% |
| AudioContext | OscillatorNode output hash | Audio stack fingerprint | Tor Browser blocks this | 8% |
| Screen Resolution | screen.width × screen.height | Rare resolutions are unique | Resize browser window | 7% |
| Timezone Offset | Date.getTimezoneOffset() | Narrows geolocation | VPN + timezone spoof | 5% |
| Language Headers | navigator.languages array | Locale combination is identifying | Set single common language | 5% |
| WebRTC Leak | RTCPeerConnection ICE candidates | Local/public IP exposed | Disable WebRTC or use extension | 12% |
| Do Not Track | navigator.doNotTrack | Paradoxically increases uniqueness | Match majority setting | 3% |
| Cookie Support | navigator.cookieEnabled | Blocking is minority behavior | Allow but auto-clear | 3% |
| Hardware Concurrency | navigator.hardwareConcurrency | CPU core count narrows device | Cannot easily spoof | 5% |
| Device Memory | navigator.deviceMemory | RAM class narrows device | Tor Browser masks this | 4% |
| Platform | navigator.platform | OS family revealed | UA spoofing | 5% |
| Installed Plugins | navigator.plugins.length | Plugin set is rare | Use browser with no plugins | 4% |
| Touch Support | maxTouchPoints + ontouchstart | Distinguishes mobile from desktop | Cannot spoof easily | 3% |
| Color Depth | screen.colorDepth | Most are 24-bit; outliers stand out | Standard display | 2% |
| PDF Viewer | navigator.pdfViewerEnabled | Minority signal if disabled | Keep default | 2% |
| Math Constants | Math.tan/Math.log quirks | Engine-specific float rounding | Tor Browser normalizes | 2% |