← Glossary
Browser Fingerprinting
Tracking by combining dozens of browser data points (canvas rendering, fonts, timezone) into a unique signature, no cookies needed.
A browser fingerprint is a profile built from data points the browser exposes by default: canvas rendering output, WebGL parameters, audio context behavior, installed fonts, screen size, timezone, language headers. Each data point is low-entropy alone. Combined, the average browser configuration is uniquely identifiable to about 1 in 100,000 — enough for cross-session tracking without cookies.
Fingerprinting matters because it survives every cookie blocker and incognito window. Test your own browser at coveryourtracks.eff.org or amiunique.org.
The strategy that works against fingerprinting is *blending in*, not *opting out*. Tor Browser and Mullvad Browser ship identical fingerprints to every user (same screen size, same fonts, same canvas), which makes any individual user one of millions of identical profiles. Canvas blockers and fingerprint randomizers usually backfire — they make you more unique, not less.