User Rating 0.0
Total Usage 0 times
Category Security

Analyze your browser's fingerprint exposure and privacy vulnerabilities

Is this tool helpful?

Your feedback helps us improve.

About

Every browser transmits a composite signal - a fingerprint assembled from canvas rendering, WebGL renderer strings, AudioContext oscillator output, screen geometry, timezone offset, installed plugins, and language headers. Research from the EFF's Panopticlick project demonstrates that the combination of these factors uniquely identifies over 94% of browsers without any cookies. This tool quantifies that exposure. It probes 14 distinct fingerprint vectors, computes Shannon entropy H for each, and returns a weighted composite anonymity score from 0 (fully exposed) to 100 (effectively anonymous). No data leaves your machine. All analysis executes client-side.

Misconfigured privacy settings create a false sense of security. A user who blocks cookies but leaks a WebRTC local IP, runs a rare screen resolution, and permits canvas readout is more identifiable than one who accepts cookies on a common configuration. This tool surfaces those blind spots. Note: scores approximate real-world trackability. Actual fingerprint databases (e.g., FingerprintJS) may use additional signals not testable in a single-page context.

anonymity checker browser fingerprint privacy score webrtc leak tracking protection online privacy fingerprint test browser security

Formulas

The composite anonymity score combines per-factor scores using a weighted arithmetic mean. Each factor fi receives a score from 0 to 100 based on how common or protected the detected value is.

S = ni=1 wi fini=1 wi

Where S is the final anonymity score, wi is the weight for factor i, and fi is the individual factor score. Shannon entropy for a fingerprint vector is computed as:

H = ni=1 p(xi) log2 p(xi)

Where p(xi) represents the probability of a given value occurring in the general population. Higher entropy means the value is more common (better for anonymity). Lower entropy indicates a rare, identifying value. Per-factor scores map detected values against known population distributions - common values score near 100, rare values score near 0.

Reference Data

Privacy FactorDetection MethodRisk If ExposedMitigationWeight
User-Agent Stringnavigator.userAgent parsingOS, browser, version revealedUA spoofing extension8%
Canvas Fingerprint2D canvas text rendering hashGPU/font stack uniquely identifiedCanvasBlocker addon12%
WebGL RendererWEBGL_debug_renderer_infoExact GPU model exposedDisable WebGL or spoof10%
AudioContextOscillatorNode output hashAudio stack fingerprintTor Browser blocks this8%
Screen Resolutionscreen.width × screen.heightRare resolutions are uniqueResize browser window7%
Timezone OffsetDate.getTimezoneOffset()Narrows geolocationVPN + timezone spoof5%
Language Headersnavigator.languages arrayLocale combination is identifyingSet single common language5%
WebRTC LeakRTCPeerConnection ICE candidatesLocal/public IP exposedDisable WebRTC or use extension12%
Do Not Tracknavigator.doNotTrackParadoxically increases uniquenessMatch majority setting3%
Cookie Supportnavigator.cookieEnabledBlocking is minority behaviorAllow but auto-clear3%
Hardware Concurrencynavigator.hardwareConcurrencyCPU core count narrows deviceCannot easily spoof5%
Device Memorynavigator.deviceMemoryRAM class narrows deviceTor Browser masks this4%
Platformnavigator.platformOS family revealedUA spoofing5%
Installed Pluginsnavigator.plugins.lengthPlugin set is rareUse browser with no plugins4%
Touch SupportmaxTouchPoints + ontouchstartDistinguishes mobile from desktopCannot spoof easily3%
Color Depthscreen.colorDepthMost are 24-bit; outliers stand outStandard display2%
PDF Viewernavigator.pdfViewerEnabledMinority signal if disabledKeep default2%
Math ConstantsMath.tan/Math.log quirksEngine-specific float roundingTor Browser normalizes2%

Frequently Asked Questions

Only approximately 12-15% of browsers send the DNT header. By enabling it, you join a minority group, which paradoxically makes your browser more distinguishable. The anonymity-optimal choice is to match the majority - currently, leaving DNT unset.
The browser renders a specific string with emoji and complex glyphs onto a hidden canvas element. Due to differences in GPU hardware, driver versions, font rendering engines, and anti-aliasing algorithms, the resulting pixel data varies subtly between systems. Hashing the pixel output (via toDataURL) produces a near-unique identifier. This test does not require cookies or any stored data.
No. A VPN masks your IP address but does not affect browser fingerprinting vectors such as canvas rendering, WebGL renderer strings, screen resolution, timezone, or language headers. A VPN combined with the Tor Browser (which normalizes most fingerprint surfaces) approaches maximum anonymity. Using a VPN with a stock Chrome install still exposes 13+ identifying vectors.
As of 2024, 1920×1080 remains the most common desktop resolution at roughly 22% global share, followed by 1366×768 at approximately 14%. Using either of these maximizes your screen resolution anonymity factor. Resolutions like 2560×1600 or ultrawide 3440×1440 are used by under 1% of users and are highly identifying.
No. Every probe runs entirely in your browser using native JavaScript APIs. No network requests are made. No data is transmitted. The anonymity score and all intermediate results exist only in your browser's memory and optionally in localStorage for persistence across sessions. You can verify this by monitoring the Network tab in DevTools.
Modern browsers (Firefox 86+, Safari) have restricted WebRTC IP exposure by default behind permission prompts or mDNS obfuscation. Chrome still exposes local IPs through ICE candidates in most configurations. If the test finds no candidates, your browser either blocks WebRTC enumeration natively or an extension is intervening. The score reflects what was actually detectable.
This tool tests 14-18 common vectors. Commercial services like FingerprintJS Pro use 70+ signals including font enumeration, WebGL parameter dumps, CSS feature queries, and behavioral biometrics. This tool provides a strong approximation of your exposure surface. A score of 80+ here correlates well with low identifiability, but a truly determined tracker with server-side enrichment may still narrow identification further.