facebook-pixel

Browser Fingerprinting: How Websites Track You Without Cookies

L
Lunyb Security Team
··9 min read

Every time you visit a website, your browser quietly reveals dozens of small details about your device — your screen resolution, the fonts you have installed, your time zone, even how your graphics card renders shapes. Combined, these details create a unique signature called a browser fingerprint. Unlike cookies, you can't simply delete it. And unlike an IP address, switching networks won't make it go away.

This guide explains exactly how browser fingerprinting works, what makes your device identifiable, who is using this technology to track you, and what you can do today to reduce your fingerprint and reclaim your privacy.

What Is Browser Fingerprinting?

Browser fingerprinting is a tracking technique that collects information about a user's device and browser configuration to generate a unique identifier. This identifier can then be used to recognize the same user across sessions, websites, and even after they clear cookies or use private browsing mode.

Where traditional tracking relies on storing data on your device (like cookies or local storage), fingerprinting is stateless. The website doesn't need to leave anything behind — it simply observes what your browser tells it and matches that pattern to a record on the server.

Why Fingerprinting Exists

Fingerprinting became popular for three main reasons:

  1. Cookie restrictions: Modern browsers like Safari, Firefox, and Brave block third-party cookies by default.
  2. Privacy laws: GDPR, CCPA, and similar regulations require explicit consent for cookies, but fingerprinting often slips through legal gray areas.
  3. Fraud prevention: Banks, e-commerce platforms, and login systems use fingerprints legitimately to detect suspicious activity.

How Browser Fingerprinting Actually Works

When you load a webpage, JavaScript running on that page can query your browser for dozens of properties. Each property on its own isn't unique, but together they form a combination that is statistically rare — often unique to one person in millions.

The Data Collected in a Typical Fingerprint

Data PointExample ValueUniqueness
User AgentChrome 120 on Windows 11Low
Screen resolution & color depth2560x1440, 24-bitMedium
Installed fontsList of 80+ system fontsHigh
Canvas renderingPixel-level hash of drawn textVery High
WebGL fingerprintGPU model and rendering outputVery High
AudioContext fingerprintAudio waveform processing hashHigh
Time zone & languageAmerica/Los_Angeles, en-USLow
Hardware concurrency8 CPU coresMedium
Browser plugins & extensionsPDF viewer, ad blocker tracesHigh
Touch support & sensorsTouchscreen, gyroscopeMedium

Canvas Fingerprinting Explained

Canvas fingerprinting is one of the most powerful techniques. The website asks your browser to draw an invisible image — usually text with specific fonts, colors, and shapes — using the HTML5 Canvas API. Because of tiny differences in your GPU, graphics drivers, operating system, and font rendering engine, the resulting pixels are slightly different on almost every device. The site hashes this image into a string, and that string becomes part of your fingerprint.

WebGL and Audio Fingerprinting

WebGL fingerprinting goes deeper by rendering 3D scenes and analyzing how your GPU processes them. AudioContext fingerprinting uses the Web Audio API to generate a sound signal and measure how your hardware processes it. Both produce extremely stable identifiers that don't change unless you replace your hardware.

How Unique Is Your Browser Fingerprint?

Research from the Electronic Frontier Foundation's Panopticlick (now Cover Your Tracks) project found that more than 80% of browsers have a unique fingerprint. For users with uncommon settings — niche operating systems, custom fonts, or specific extensions — that number rises above 95%.

This means that even without cookies, a tracker can recognize you on virtually every website you visit, link your browsing across sessions, and build a detailed profile of your interests, location patterns, and behavior.

Who Uses Browser Fingerprinting?

1. Advertising and Marketing Networks

Ad tech companies use fingerprinting to maintain user profiles across the web, especially in browsers where third-party cookies are blocked. This powers targeted advertising, retargeting campaigns, and cross-site behavior analysis.

2. Data Brokers

Companies that compile and sell consumer data use fingerprinting to merge online activity with offline records, creating extremely detailed profiles sold to advertisers, insurers, and political campaigns.

3. Anti-Fraud and Security Systems

Banks, payment processors, and login systems use fingerprinting to detect account takeovers. If your fingerprint suddenly changes during a login, the system may trigger additional verification. This is a legitimate, privacy-respecting use case.

4. Streaming and Content Platforms

Some platforms use fingerprinting to enforce account sharing limits, geo-restrictions, or DRM rules.

5. Governments and Surveillance Vendors

Fingerprinting has been documented in nation-state surveillance toolkits, used to identify specific individuals even when they use Tor or VPNs.

Browser Fingerprinting vs. Cookies: Key Differences

FeatureCookiesBrowser Fingerprinting
Stored on your device?YesNo
Can you delete it?Yes, easilyNo, not directly
Survives private browsing?NoYes
Requires user consent (GDPR)?Almost alwaysOften unclear
Visible to user?Yes (via dev tools)Mostly hidden
Works across browsers?NoSometimes (cross-browser fingerprinting)

How to Test Your Own Browser Fingerprint

Before you can protect yourself, you should know how identifiable you are. Try these free tools:

  1. Cover Your Tracks (EFF) — shows whether your browser has a unique fingerprint.
  2. AmIUnique.org — provides a detailed breakdown of every attribute being shared.
  3. BrowserLeaks.com — tests specific fingerprinting vectors like Canvas, WebGL, and WebRTC.

Run these tests in your everyday browser, then again after applying the protections below to measure your improvement.

How to Protect Yourself From Browser Fingerprinting

There is no single "off switch" for fingerprinting, but you can dramatically reduce your uniqueness by combining several techniques.

1. Use a Privacy-Focused Browser

Some browsers actively fight fingerprinting:

  • Tor Browser: The gold standard. Every Tor user looks identical, making individual fingerprinting nearly impossible.
  • Brave: Includes built-in fingerprint randomization that adds small, harmless noise to canvas and audio data.
  • Firefox: Offers resistFingerprinting mode (about:config) and standardized values for common attributes.
  • LibreWolf or Mullvad Browser: Hardened Firefox forks built specifically for anti-fingerprinting.

2. Avoid Excessive Extensions

Each extension you install can change your fingerprint. Ironically, installing many "privacy" extensions can make you more unique. Stick to a minimal set — ideally one good content blocker like uBlock Origin.

3. Disable JavaScript Selectively

Most fingerprinting requires JavaScript. Tools like NoScript or Brave's shields let you block JS on untrusted sites. This is aggressive but highly effective.

4. Use a VPN — But Understand Its Limits

A VPN hides your IP address and location but does not change your browser fingerprint. Combine VPN use with a privacy browser for best results.

5. Block Known Fingerprinting Scripts

Content blockers with privacy filter lists (like EasyPrivacy or the Disconnect list) block many fingerprinting domains before they ever run.

6. Use Standard Settings on a Common OS

Counterintuitively, blending in is better than standing out. A default Windows 11 + Chrome user with no custom fonts is harder to fingerprint than a Linux user with rare extensions, because the latter is statistically unique.

7. Be Mindful When Sharing Links

When you share links — especially marketing links — they can be loaded with tracking parameters that work alongside fingerprinting. Using a clean, privacy-respecting URL shortener like Lunyb helps strip unnecessary trackers from your shared URLs. You can learn more in our honest review of Lunyb or compare it against alternatives in our 2026 buyer's guide to URL shorteners.

Advanced Protection: Fingerprint Randomization vs. Standardization

There are two competing philosophies in anti-fingerprinting:

Standardization (Tor's Approach)

Make every user look identical. If millions of people share the exact same fingerprint, no one can be tracked individually. The downside: every Tor user has the same screen size and limited functionality.

Randomization (Brave's Approach)

Slightly randomize values on every page load, so even if a tracker tries to fingerprint you, they get a different ID each time. The downside: a sophisticated tracker can sometimes detect the randomization itself.

Neither approach is perfect, but both are far better than no protection at all.

The Future of Browser Fingerprinting

As cookies continue to disappear, fingerprinting will become more aggressive. Emerging techniques include:

  • Behavioral fingerprinting: Tracking how you move your mouse, type, scroll, and swipe.
  • Battery API fingerprinting: Using battery level and charging patterns as identifiers (now restricted in most browsers).
  • Network-level fingerprinting: Analyzing TLS handshakes and TCP packet patterns.
  • AI-powered cross-device matching: Linking your phone, laptop, and tablet through behavioral similarities.

Regulators are slowly catching up. The EU's ePrivacy Directive and updated GDPR enforcement increasingly treat fingerprinting as personal data processing, requiring consent. But enforcement remains inconsistent worldwide.

Quick-Start Privacy Checklist

  1. Test your fingerprint at coveryourtracks.eff.org.
  2. Switch to Brave, Firefox (with resistFingerprinting), or Tor.
  3. Install uBlock Origin — and remove other redundant extensions.
  4. Use a reputable VPN for IP-level privacy.
  5. Disable WebRTC if you don't need it (it can leak your real IP).
  6. Keep your browser and OS at their default appearance — don't install rare fonts unnecessarily.
  7. Use privacy-respecting tools (search engines, URL shorteners, email providers) that don't profile you.

FAQ: Browser Fingerprinting

Can incognito or private browsing mode prevent fingerprinting?

No. Private browsing only prevents your browser from saving history, cookies, and form data locally. Your fingerprint — screen size, fonts, GPU, time zone — remains exactly the same. Trackers can still identify you across private sessions.

Does a VPN protect me from browser fingerprinting?

A VPN hides your IP address and physical location, which is valuable, but it does not change any of the browser characteristics used in fingerprinting. You need both a VPN and a privacy-focused browser for meaningful protection.

Is browser fingerprinting legal?

It depends on your jurisdiction. Under GDPR (EU) and similar laws, fingerprinting for tracking purposes generally requires user consent, just like cookies. In the United States, it is largely unregulated outside of state laws like the CCPA. Enforcement is inconsistent globally.

Will using lots of privacy extensions make me harder to track?

Surprisingly, often the opposite. A long list of unusual extensions can make your browser more unique. The most effective approach is to use one or two well-known content blockers (like uBlock Origin) plus a browser with built-in anti-fingerprinting features.

Can I be fingerprinted on my phone?

Yes. Mobile browsers expose many of the same attributes — and additionally reveal device sensors, touch capabilities, and battery information. Mobile fingerprinting is just as effective as desktop fingerprinting, sometimes more so because users rarely change their default mobile setup.

Is there a way to be 100% unfingerprintable?

Realistically, no. The closest you can get is using Tor Browser with default settings, which makes you indistinguishable from millions of other Tor users. For everyday browsing, the goal isn't perfection — it's reducing your uniqueness enough that mass tracking becomes unreliable.

Final Thoughts

Browser fingerprinting represents a fundamental shift in how the web tracks people. It's invisible, persistent, and built into the very technologies that make modern websites work. But it isn't unbeatable. With the right browser, a minimal extension setup, careful link-sharing habits, and an understanding of how the system works, you can dramatically reduce how identifiable you are online.

Privacy is no longer a one-step solution — it's a layered practice. The more layers you add, the harder you become to track. And in 2026 and beyond, those layers will matter more than ever.

Protect your links with Lunyb

Create secure, trackable short links and QR codes in seconds.

Get Started Free

Related Articles