← Blog
2026-05-04 · browser · fingerprinting

Browser Fingerprinting in 2026: What It Is, How to Test for It, How to Stop It

Your browser leaks dozens of data points that together form a unique fingerprint. Here's how it works, how to test your own browser, and which configurations actually defeat it.

Cookies are the obvious tracking surface. Browser fingerprinting is the invisible one — and in 2026 it has gotten precise enough that the average configuration is uniquely identifiable across millions of users.

What gets fingerprinted

A typical fingerprint combines: - Canvas rendering: how your GPU draws a hidden image. Different OS + driver + browser combinations produce different pixels at the byte level. - WebGL parameters: your graphics card vendor, renderer name, supported extensions. - Audio context: how your CPU rounds floating-point operations on audio nodes. Differs by chipset. - Fonts installed: every web font your browser renders fast (because it's cached). - Screen size, color depth, timezone, language headers. - HTTP/2 frame ordering and TLS handshake details — fingerprintable even before JavaScript runs.

Each data point is low-entropy alone. Combined, the average laptop is identifiable to about 1 in 100,000 — enough to track across sessions even with cookies cleared.

Test your browser

Three tools, all free, all worth running:

  • Cover Your Tracks (eff.org/coveryourtracks): EFF's classic, easy to read.
  • AmIUnique (amiunique.org): biggest dataset, best for understanding entropy contribution per attribute.
  • Creepjs (abrahamjuliot.github.io/creepjs): aggressive — exposes attributes the others miss, including audio fingerprinting.

If you run all three on a stock Chrome with a single uBlock Origin extension, you will be uniquely identifiable. This is the baseline — fingerprinting works against almost every default browser configuration.

What actually defeats fingerprinting

The strategy that works is *blending in*, not *opting out*. The more "unique" your defenses make you, the easier you are to track. The two effective approaches:

Option 1: Tor Browser. Every Tor user has the same fingerprint by design — same screen size (letterboxed), same font set, same canvas rendering (disabled). You become one of millions of identical fingerprints. Cost: latency.

Option 2: Mullvad Browser. Same fingerprint-resistance hardening as Tor Browser, without routing through Tor. Use with a VPN. Cost: some sites break because of the aggressive defaults.

LibreWolf hardens Firefox in similar ways and is a softer middle ground; the fingerprint becomes "looks like a hardened Firefox user," which is a smaller pool than stock Firefox but bigger than Tor.

What does NOT defeat fingerprinting

  • Canvas blockers / fingerprint randomizers: lowering canvas entropy without matching a known cohort makes you *more* unique, not less.
  • VPNs alone: hide IP, do nothing for browser fingerprinting.
  • Incognito / private windows: same fingerprint as the regular window.
  • User-agent spoofing: trivially detected; if your UA says iPhone but your audio fingerprint says ThinkPad, you've labeled yourself.

What to actually do

Three tiers based on threat model:

  1. Casual privacy: Brave or LibreWolf with default settings. Reduces tracking surface a lot, doesn't try to win the fingerprint game.
  2. Serious privacy: Mullvad Browser + a VPN. Aggressive anti-fingerprinting, real-world usable.
  3. Anonymity: Tor Browser, only. Slow but it's the only browser that actually hides who you are.

For most people, tier 1 is the right choice. Tier 2 if you have specific reason to believe you're being targeted by ad networks more than you mind some sites breaking. Tier 3 if your threat model is a serious adversary, and only for the activity that needs it — not your daily browsing.

Tools in this post