What Is Browser Fingerprinting?
Every time you visit a website, your browser silently shares dozens of data points about your device and configuration: your screen resolution, installed fonts, time zone, language settings, graphics card details, browser version, and much more. When combined, these attributes form a fingerprint that is often unique enough to identify you across different websites — even if you clear your cookies, use incognito mode, or change your IP address.
Unlike cookies, fingerprinting requires no storage on your device. It is entirely passive from your perspective, making it significantly harder to detect or block.
What Data Points Are Collected?
Fingerprinting scripts typically gather information in several categories:
Hardware & System
- Screen resolution and color depth
- Number of CPU cores (via
navigator.hardwareConcurrency) - Available device memory
- GPU vendor and renderer (via WebGL)
- Battery level and charging status (on mobile)
Browser & Software
- User agent string (browser name, version, OS)
- Installed browser plugins and MIME types
- Do Not Track setting
- Time zone and locale
- Language preferences
Rendering Characteristics
- Canvas fingerprinting: A hidden canvas element is drawn; subtle differences in how your GPU renders it create a near-unique hash.
- WebGL fingerprinting: Similar approach using 3D rendering.
- AudioContext fingerprinting: Differences in how your audio stack processes a signal.
- Font enumeration: Which fonts are installed changes text rendering in measurable ways.
Why Is Fingerprinting a Privacy Problem?
Cookie-based tracking can be defeated by clearing cookies or using private browsing. Fingerprinting sidesteps these protections entirely. Advertising networks use it to re-identify you after you opt out of cookies, link your browsing activity across different devices (if they share characteristics), and build persistent profiles that survive browser resets.
Tools and Techniques to Reduce Fingerprinting
1. Use Firefox with Privacy Protections Enabled
Firefox includes Enhanced Tracking Protection with fingerprinter blocking in "Strict" mode. Mozilla also actively develops anti-fingerprinting features that randomize or normalize many of the values scripts try to collect.
2. Try the Tor Browser
The Tor Browser is specifically engineered to make all users look identical to fingerprinting scripts by standardizing browser properties. It is the strongest anti-fingerprinting tool available, though it comes with speed trade-offs.
3. Install uBlock Origin or Privacy Badger
uBlock Origin can block known fingerprinting domains from loading at all. Privacy Badger (by the EFF) learns and blocks trackers based on their cross-site behavior, including many fingerprinting services.
4. Use the Canvas Blocker Extension
Extensions like CanvasBlocker for Firefox intercept canvas and WebGL API calls and return slightly randomized data, making it much harder to generate a consistent hash of your system.
5. Limit Installed Fonts
Having an unusual set of fonts installed makes your fingerprint more distinctive. On systems where you control font installation, keeping the default OS font set reduces this attack surface.
Setting Realistic Expectations
No single tool eliminates fingerprinting entirely. The goal is to reduce uniqueness — to blend in with a larger pool of users rather than standing out. A combination of Firefox with strict tracking protection, uBlock Origin, and a canvas-blocking extension provides solid day-to-day protection without making your browser unusable. For high-stakes privacy needs, the Tor Browser remains the most robust option.