How do I test my browser fingerprint?
Several free tools show what websites can detect about your browser: BrowserLeaks.com — the most comprehensive checker. Tests canvas, WebGL, audio, fonts, WebRTC, CSS, JavaScript, and 20+ other vectors. Shows your hash and uniqueness score. AmIUnique.org — academic project that compares your fingerprint against their database of millions. Shows which attributes make you most identifiable and your uniqueness percentile. CreepJS — advanced fingerprinting detection tool that tests for anti-detect browser inconsistencies. If your spoofed fingerprint has inconsistencies (e.g., claiming to be Windows but having macOS-specific behavior), CreepJS will flag it. PixelScan.net — specifically designed to test anti-detect browser setups. Checks for headless browser signals, proxy detection, and fingerprint consistency. DeviceInfo.me — shows your user agent, screen, plugins, WebGL, and other device details in one page. Testing workflow for anti-detect setups: 1) Test each profile on BrowserLeaks. Verify canvas, WebGL, and audio hashes are unique per profile. 2) Run CreepJS to check for inconsistencies. 3) Check PixelScan for bot detection signals. 4) Verify WebRTC does not leak your real IP. 5) Compare two profiles — they should have completely different fingerprints.