Contact
Stealth & Privacy

What is browser fingerprinting?

Browser fingerprinting identifies individual browsers (and by extension, users) by collecting unique attributes of their software and hardware configuration. Unlike cookies, fingerprints can't be cleared — they're derived from how your browser renders content and reports its capabilities.

What's collected: screen resolution, installed fonts, browser plugins, timezone, language settings, WebGL renderer (reveals your GPU), canvas rendering output (slightly different per device), audio processing characteristics, available media codecs, CPU core count, memory size, touch support, and dozens more attributes.

Combined, these attributes create a fingerprint that's unique to roughly 1 in 286,777 browsers, according to research by the EFF. That's enough to reliably track users across sessions without any cookies or local storage.

Who uses it: ad networks (cross-site tracking), fraud detection systems (banks, payment processors), anti-bot platforms (Cloudflare, DataDome, PerimeterX), social networks (multi-account detection), and e-commerce sites (price discrimination).

Defense approaches: anti-detect browsers (Multilogin, GoLogin) that spoof consistent but unique fingerprints per profile, browser extensions that inject noise into fingerprint vectors, and the Tor Browser which aims for uniform fingerprints across all users.

The cat-and-mouse dynamic is constant — as browsers add privacy features, platforms develop new fingerprinting vectors. Canvas and WebGL fingerprinting remain the most reliable methods in 2026.

Still have questions?

Talk to Empirium