A device fingerprint or machine fingerprint is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a
fingerprinting algorithm. A browser fingerprint is information collected specifically by interaction with the
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
of the device.
Device fingerprints can be used to fully or partially identify individual devices even when
persistent cookies (and
zombie cookies) cannot be read or stored in the browser, the client
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
is hidden, or one switches to another browser on the same device.
This may allow a service provider to detect and prevent
identity theft
Identity theft, identity piracy or identity infringement occurs when someone uses another's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. ...
and
credit card fraud, but also to compile long-term records of individuals' browsing histories (and deliver
targeted advertising or targeted
exploits) even when they are attempting to
avoid tracking – raising a major concern for
internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
advocates.
History
Basic
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
configuration information has long been collected by
web analytics services in an effort to measure real human
web traffic
Web traffic is the data sent and received by visitors to a website. Since the mid-1990s, web traffic has been the largest portion of Internet traffic. Sites monitor the incoming and outgoing traffic to see which parts or pages of their site are ...
and discount various forms of
click fraud. Since its introduction in the late 1990s,
client-side scripting has gradually enabled the collection of an increasing amount of diverse information, with some
computer security
Computer security (also cybersecurity, digital security, or information technology (IT) security) is a subdiscipline within the field of information security. It consists of the protection of computer software, systems and computer network, n ...
experts starting to complain about the ease of bulk parameter extraction offered by web browsers as early as 2003.
In 2005, researchers at the
University of California, San Diego
The University of California, San Diego (UC San Diego in communications material, formerly and colloquially UCSD) is a public university, public Land-grant university, land-grant research university in San Diego, California, United States. Es ...
showed how
TCP timestamps could be used to estimate the
clock skew
Clock skew (sometimes called timing skew) is a phenomenon in synchronous digital circuit systems (such as computer systems) in which the same sourced clock signal arrives at different components at different times due to gate or, in more advanc ...
of a device, and consequently to remotely obtain a hardware fingerprint of the device.
In 2010,
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
(EFF) launched a website where visitors can test their browser fingerprint. After collecting a sample of 470161 fingerprints, they measured at least 18.1 bits of
entropy
Entropy is a scientific concept, most commonly associated with states of disorder, randomness, or uncertainty. The term and the concept are used in diverse fields, from classical thermodynamics, where it was first recognized, to the micros ...
possible from browser fingerprinting, but that was before the advancements of
canvas fingerprinting, which claims to add another 5.7 bits. Panopticlick, a tool run by EFF, showed that 83.6% of fingerprints are unique, 94.2% with Flash or Java.
In 2012, Keaton Mowery and Hovav Shacham, researchers at
University of California, San Diego
The University of California, San Diego (UC San Diego in communications material, formerly and colloquially UCSD) is a public university, public Land-grant university, land-grant research university in San Diego, California, United States. Es ...
, showed how the
HTML5
HTML5 (Hypertext Markup Language 5) is a markup language used for structuring and presenting hypertext documents on the World Wide Web. It was the fifth and final major HTML version that is now a retired World Wide Web Consortium (W3C) recommend ...
canvas element could be used to create digital fingerprints of web browsers.
In 2013, at least 0.4% of
Alexa top 10,000 sites were found to use fingerprinting scripts provided by a few known third parties.
In 2014, 5.5% of Alexa top 10,000 sites were found to use canvas fingerprinting scripts served by a total of 20 domains. The overwhelming majority (95%) of the scripts were served by
AddThis, which started using canvas fingerprinting in January that year, without the knowledge of some of its clients.
In 2015, a feature to protect against browser fingerprinting was introduced in
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
version 41, but it has been since left in an experimental stage, not initiated by default.
The same year a feature named ''Enhanced Tracking Protection'' was introduced in Firefox version 42 to protect against tracking during private browsing by blocking scripts from third party domains found in the lists published by
Disconnect Mobile.
In 2016, an AmIUnique study found that 89.4% of fingerprints are unique, and attributes to identify them are constantly evolving.
At
WWDC 2018 Apple
An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
announced that
Safari
A safari (; originally ) is an overland journey to observe wildlife, wild animals, especially in East Africa. The so-called big five game, "Big Five" game animals of Africa – lion, African leopard, leopard, rhinoceros, African elephant, elep ...
on
macOS Mojave "presents simplified system information when users browse the web, preventing them from being tracked based on their system configuration."
A 2018 study Hiding in the Crowd found that only 33.6% of fingerprints are unique; on mobile devices the difference is even larger as 18.5% of mobile fingerprints were unique compared to the 81% from earlier data. This study also showed that fingerprints on desktop computers are mostly unique by combinations of attributes, while mobile devices present attributes with unique values.
In 2019, starting from Firefox version 69, ''Enhanced Tracking Protection'' has been turned on by default for all users also during non-private browsing. The feature was first introduced to protect private browsing in 2015 and was then extended to standard browsing as an opt-in feature in 2018.
Diversity and stability
Motivation for the device fingerprint concept stems from the
forensic
Forensic science combines principles of law and science to investigate criminal activity. Through crime scene investigations and laboratory analysis, forensic scientists are able to link suspects to evidence. An example is determining the time and ...
value of
human fingerprints.
In order to uniquely distinguish over time some devices through their fingerprints, the fingerprints must be both sufficiently diverse and sufficiently stable. In practice neither diversity nor stability is fully attainable, and improving one has a tendency to adversely impact the other. For example, the assimilation of an additional browser setting into the browser fingerprint would usually increase diversity, but it would also reduce stability, because if a user changes that setting, then the browser fingerprint would change as well. However, in the absence of user opposition, fingerprints are not difficult to identify, especially since they can be based on a wide variety of data. For example, according to research, 56.86% of users have unique extensions, 34% of the population can be identified by the 43 characters of the fonts used.
A certain degree of instability can be compensated by linking together fingerprints that, although partially different, might probably belong to the same device. This can be accomplished by a simple rule-based linking algorithm (which, for example, links together fingerprints that differ only for the browser version, if that increases with time) or machine learning algorithms.
Entropy
Entropy is a scientific concept, most commonly associated with states of disorder, randomness, or uncertainty. The term and the concept are used in diverse fields, from classical thermodynamics, where it was first recognized, to the micros ...
is one of several ways to measure diversity.
Sources of identifying information
Applications that are locally installed on a device are allowed to gather a great amount of information about the software and the hardware of the device, often including unique identifiers such as the
MAC address and
serial number
A serial number (SN) is a unique identifier used to ''uniquely'' identify an item, and is usually assigned incrementally or sequentially.
Despite being called serial "numbers", they do not need to be strictly numerical and may contain letters ...
s assigned to the machine hardware. Indeed, programs that employ
digital rights management
Digital rights management (DRM) is the management of legal access to digital content. Various tools or technological protection measures, such as access control technologies, can restrict the use of proprietary hardware and copyrighted works. DRM ...
use this information for the very purpose of uniquely identifying the device.
Even if they are not designed to gather and share identifying information, local applications might unwillingly expose identifying information to the remote parties with which they interact. The most prominent example is that of web browsers, which have been proved to expose diverse and stable information in such an amount to allow remote identification, see .
Diverse and stable information can also be gathered below the application layer, by leveraging the protocols that are used to transmit data. Sorted by
OSI model
The Open Systems Interconnection (OSI) model is a reference model developed by the International Organization for Standardization (ISO) that "provides a common basis for the coordination of standards development for the purpose of systems inter ...
layer, some examples of protocols that can be utilized for fingerprinting are:
* OSI Layer 7:
SMB,
FTP
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and dat ...
,
HTTP
HTTP (Hypertext Transfer Protocol) is an application layer protocol in the Internet protocol suite model for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web, wher ...
,
Telnet,
TLS/SSL,
DHCP
* OSI Layer 5:
SNMP,
NetBIOS
* OSI Layer 4:
TCP (see
TCP/IP stack fingerprinting)
* OSI Layer 3:
IPv4
Internet Protocol version 4 (IPv4) is the first version of the Internet Protocol (IP) as a standalone specification. It is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. ...
,
IPv6
Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communication protocol, communications protocol that provides an identification and location system for computers on networks and routes traffic ...
,
ICMP
* OSI Layer 2:
IEEE 802.11,
CDP
Passive fingerprinting techniques merely require the fingerprinter to observe traffic originated from the target device, while active fingerprinting techniques require the fingerprinter to initiate connections to the target device. Techniques that require interaction with the target device over a connection initiated by the latter are sometimes addressed as semi-passive.
Browser fingerprint
The collection of a large amount of diverse and stable information from web browsers is possible for most part due to
client-side scripting languages, which were introduced in the late 1990s. Today there are several open-source browser fingerprinting libraries, such as FingerprintJS, ImprintJS, and ClientJS, where FingerprintJS is updated the most often and supersedes ImprintJS and ClientJS to a large extent.
Browser version
Browsers provide their name and version, together with some compatibility information, in the User-Agent request header. Being a statement freely given by the client, it should not be trusted when assessing its identity. Instead, the type and version of the browser can be inferred from the observation of quirks in its behavior: for example, the order and number of
HTTP header fields is unique to each browser family and, most importantly, each browser family and version differs in its implementation of
HTML5
HTML5 (Hypertext Markup Language 5) is a markup language used for structuring and presenting hypertext documents on the World Wide Web. It was the fifth and final major HTML version that is now a retired World Wide Web Consortium (W3C) recommend ...
,
CSS and
JavaScript
JavaScript (), often abbreviated as JS, is a programming language and core technology of the World Wide Web, alongside HTML and CSS. Ninety-nine percent of websites use JavaScript on the client side for webpage behavior.
Web browsers have ...
. Such differences can be remotely tested by using JavaScript. A
Hamming distance
In information theory, the Hamming distance between two String (computer science), strings or vectors of equal length is the number of positions at which the corresponding symbols are different. In other words, it measures the minimum number ...
comparison of
parser
Parsing, syntax analysis, or syntactic analysis is a process of analyzing a string of symbols, either in natural language, computer languages or data structures, conforming to the rules of a formal grammar by breaking it into parts. The term '' ...
behaviors has been shown to effectively fingerprint and differentiate a majority of browser versions.
Browser extensions
A combination of
extensions or
plugins unique to a browser can be added to a fingerprint directly. Extensions may also modify how any other browser attributes behave, adding additional complexity to the user's fingerprint.
Adobe Flash and
Java
Java is one of the Greater Sunda Islands in Indonesia. It is bordered by the Indian Ocean to the south and the Java Sea (a part of Pacific Ocean) to the north. With a population of 156.9 million people (including Madura) in mid 2024, proje ...
plugins were widely used to access user information before their deprecation.
Hardware properties
User agents may provide system hardware information, such as phone
model
A model is an informative representation of an object, person, or system. The term originally denoted the plans of a building in late 16th-century English, and derived via French and Italian ultimately from Latin , .
Models can be divided in ...
, in the HTTP header. Properties about the user's
operating system
An operating system (OS) is system software that manages computer hardware and software resources, and provides common daemon (computing), services for computer programs.
Time-sharing operating systems scheduler (computing), schedule tasks for ...
,
screen size,
screen orientation, and
display aspect ratio can be also retrieved by using
JavaScript
JavaScript (), often abbreviated as JS, is a programming language and core technology of the World Wide Web, alongside HTML and CSS. Ninety-nine percent of websites use JavaScript on the client side for webpage behavior.
Web browsers have ...
to observe the result of
CSS media queries.
Browsing history
The fingerprinter could determine which sites the browser had previously visited within a list it provided, by querying the list using JavaScript with the CSS selector . Typically, a list of 50 popular websites were sufficient to generate a unique user history profile, as well as provide information about the user's interests. However, browsers have since then mitigated this risk.
Font metrics
The letter bounding boxes differ between browsers based on
anti-aliasing and
font hinting configuration and can be measured by JavaScript.
Canvas and WebGL
Canvas fingerprinting uses the HTML5
canvas element, which is used by
WebGL to render 2D and 3D graphics in a browser, to gain identifying information about the installed
graphics driver,
graphics card
A graphics card (also called a video card, display card, graphics accelerator, graphics adapter, VGA card/VGA, video adapter, display adapter, or colloquially GPU) is a computer expansion card that generates a feed of graphics output to a displa ...
, or
graphics processing unit (GPU). Canvas-based techniques may also be used to identify installed
font
In metal typesetting, a font is a particular size, weight and style of a ''typeface'', defined as the set of fonts that share an overall design.
For instance, the typeface Bauer Bodoni (shown in the figure) includes fonts " Roman" (or "regul ...
s. Furthermore, if the user does not have a GPU,
CPU information can be provided to the fingerprinter instead.
A canvas fingerprinting script first draws text of specified font, size, and background color. The image of the text as rendered by the user's browser is then recovered by the ToDataURL Canvas API method. The hashed text-encoded data becomes the user's fingerprint. Canvas fingerprinting methods have been shown to produce 5.7 bits of entropy. Because the technique obtains information about the user's GPU, the information entropy gained is "orthogonal" to the entropy of previous browser fingerprint techniques such as screen resolution and JavaScript capabilities.
Hardware benchmarking
Benchmark tests can be used to determine whether a user's CPU utilizes
AES-NI or
Intel Turbo Boost by comparing the
CPU time used to execute various simple or
cryptographic algorithms.
Specialized
APIs can also be used, such as the Battery API, which constructs a short-term fingerprint based on the actual battery state of the device, or OscillatorNode, which can be invoked to produce a waveform based on user entropy.
A device's hardware ID, which is a
cryptographic hash function specified by the device's
vendor, can also be queried to construct a fingerprint.
Mitigation methods for browser fingerprinting
Different approaches exist to mitigate the effects of browser fingerprinting and improve users' privacy by preventing unwanted tracking, but there is no ultimate approach that can prevent fingerprinting while keeping the richness of a modern web browser.
Offering a simplified fingerprint

Users may attempt to reduce their
fingerprintability by selecting a
web browser
A web browser, often shortened to browser, is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's scr ...
which minimizes the availability of identifying information, such as browser fonts, device ID,
canvas element rendering,
WebGL information, and
local IP address.
As of 2017
Microsoft Edge
Microsoft Edge is a Proprietary Software, proprietary cross-platform software, cross-platform web browser created by Microsoft and based on the Chromium (web browser), Chromium open-source project, superseding Edge Legacy. In Windows 11, Edge ...
is considered to be the most fingerprintable browser, followed by
Firefox
Mozilla Firefox, or simply Firefox, is a free and open-source web browser developed by the Mozilla Foundation and its subsidiary, the Mozilla Corporation. It uses the Gecko rendering engine to display web pages, which implements curr ...
and
Google Chrome
Google Chrome is a web browser developed by Google. It was first released in 2008 for Microsoft Windows, built with free software components from Apple WebKit and Mozilla Firefox. Versions were later released for Linux, macOS, iOS, iPadOS, an ...
,
Internet Explorer
Internet Explorer (formerly Microsoft Internet Explorer and Windows Internet Explorer, commonly abbreviated as IE or MSIE) is a deprecation, retired series of graphical user interface, graphical web browsers developed by Microsoft that were u ...
, and
Safari
A safari (; originally ) is an overland journey to observe wildlife, wild animals, especially in East Africa. The so-called big five game, "Big Five" game animals of Africa – lion, African leopard, leopard, rhinoceros, African elephant, elep ...
. Among
mobile browsers, Google Chrome and
Opera Mini are most fingerprintable, followed by
mobile Firefox, mobile Edge, and mobile Safari.
Tor Browser disables fingerprintable features such as the canvas and WebGL API and notifies users of fingerprint attempts.
In order to reduce diversity, Tor browser doesn't allow the width and height of the window available to the webpage to be any number of pixels, but allows only some given values. The result is that the webpage is
windowboxed: it fills a space that is slightly smaller than the browser window.
Offering a spoofed fingerprint
Spoofing some of the information exposed to the fingerprinter (e.g. the
user agent
On the Web, a user agent is a software agent responsible for retrieving and facilitating end-user interaction with Web content. This includes all web browsers, such as Google Chrome and Safari
A safari (; originally ) is an overland jour ...
) may create a reduction in diversity, but the contrary could be also achieved if the spoofed information differentiates the user from all the others who do not use such a strategy more than the real browser information.
Spoofing the information differently at each site visit, for example by perturbating the sound and canvas rendering with a small amount of random noise, allows a reduction of stability. This technique has been adopted by the
Brave browser in 2020.
Blocking scripts
Blindly blocking client-side scripts served from third-party domains, and possibly also first-party domains (e.g. by disabling JavaScript or using
NoScript) can sometimes render websites unusable. The preferred approach is to block only third-party domains that seem to track people, either because they are found on a blacklist of tracking domains (the approach followed by most
ad blockers) or because the intention of tracking is inferred by past observations (the approach followed by
Privacy Badger).
Using multiple browsers
Different browsers on the same machine would usually have different fingerprints, but if both browsers are not protected against fingerprinting, then the two fingerprints could be identified as originating from the same machine.
See also
*
Anonymous web browsing
*
CSS fingerprinting
*
Browser security
*
Browser sniffing
*
Evercookie
*
Fingerprint (computing)
*
Internet privacy
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. P ...
*
Web tracking
Web tracking is the practice by which operators of websites and third parties collect, store and share information about visitors' activities on the World Wide Web. Analysis of a user's behaviour may be used to provide content that enables the op ...
References
Further reading
*
*
*
External links
Panopticlick by the
Electronic Frontier Foundation
The Electronic Frontier Foundation (EFF) is an American international non-profit digital rights group based in San Francisco, California. It was founded in 1990 to promote Internet civil liberties.
It provides funds for legal defense in court, ...
, gathers some elements of a browser's device fingerprint and estimates how identifiable it makes the user
Am I Unique by INRIA and INSA Rennes, implements fingerprinting techniques including collecting information through WebGL.
{{DEFAULTSORT:Device Fingerprint
Computer network security
Internet privacy
Internet fraud
Fingerprinting algorithms
Web analytics
Tracking