Web fingerprinting is worse than I thought (2023)
Browser behavior and real-world tests
- Multiple commenters tested fingerprint.com and similar demos:
- Brave, Firefox, Chrome (even with “hardest” settings) often still yielded stable IDs across normal and private sessions; Tor Browser was the main case that consistently broke tracking.
- Safari (especially Private mode) often produced different IDs between normal and private windows; some saw it as significantly better than Chrome for privacy.
- Mullvad Browser + VPN could still be tracked by fingerprint.com for some users.
- Brave’s built‑in fingerprinting protection and Shields were viewed as weaker than advertised; blocking scripts can break demos but may just hide the identifier UI.
- Firefox’s
privacy.resistFingerprintingand related privacy modes can reduce leakage but:- They break or degrade many sites (timezone forced to UTC, canvas glitches, Cloudflare loops, bot flags, finance sites issues).
- Several users reported still being uniquely fingerprinted or re-identified, especially when IPs are static.
- Librewolf and plugin-heavy Firefox setups often trigger more captchas and bot checks, indicating that “hardened” profiles themselves become fingerprints.
How fingerprinting works and its limits
- Signals mentioned: browser/OS versions, CPU count, screen/viewport size, fonts, codecs, timezone/locale, touchpoints, GPU/canvas/WebGL artifacts, extensions/adblockers, timing/CPU performance, and TLS/JA3/JA4 fingerprints.
- On homogenous platforms like iPhones, fingerprinting is weaker but still possible via regional settings, font sets, rollout timing of versions, and subtle rendering differences.
- IP address:
- Some see it as a major signal (stable home prefixes, household-level ID).
- Others note IPv6 rotation and MAC randomization, though home prefixes can remain static for years.
- Stability over time: Fingerprints can ignore fast-changing attributes (like browser version) and rely more on hardware and network invariants; un-hashed/raw attributes let trackers link “old” and “new” fingerprints.
Mitigations, tradeoffs, and arms race
- Techniques like spoofing user agents, randomizing canvas/fonts, or blocking JS can:
- Make you stand out as “privacy-ext user” and increase fingerprintability or risk of blocking.
- Break legitimate functionality (graphics, terminals, layout adaptation, downloads per-architecture).
- Some argue that removing or heavily gating high-risk APIs (canvas, WebGL, capability queries) would help, but others note modern “web app as VM” design inherently enables fingerprinting.
- Split setups (locked-down browser vs. “clean” browser for banking/government) are a common coping strategy.
Legal and regulatory debates (GDPR, cookies, enforcement)
- Several comments assert that under GDPR and ePrivacy, fingerprinting is legally on par with tracking cookies and requires consent; “cookie banners” are in fact broader tracking-consent dialogs.
- Others emphasize:
- Enforcement difficulty: fingerprinting happens via JS and server-side matching; unlike cookies, there’s no local artifact to inspect.
- Industry has turned consent UIs into dark patterns to force opt-in and blame GDPR for UX pain.
- Disagreement:
- Some say doing fingerprinting without consent is “almost certainly illegal” in the EU.
- Others claim that purely client-side, non-stored, non-shared measurements might be compliant (unclear; multiple “I am not a lawyer” caveats).
- Strong skepticism that regulators will meaningfully act, given corporate lobbying and low political payoff.
Legitimate vs abusive uses
- Cited “legit” uses:
- Bot detection, rate limiting (e.g. JA3/JA4 TLS fingerprints), preventing ban evasion and fraud.
- Abuses:
- Commercial services that “de‑anonymize” site visitors by merging fingerprints with data brokers and selling identity/PII for retargeting.
- Vendors marketing this as “privacy-compliant” and skirting GDPR/CCPA spirit while claiming legality.
Broader sentiment
- Many view browser fingerprinting as more dangerous than cookies and believe it should be outright illegal, but:
- Some argue purely legal approaches are weak and we need technical defenses too; others see technical-only responses as an endless arms race.
- There is deep distrust of ad-funded browser vendors and large platforms; several comments frame the problem as structural: tracking is aligned with their core business models.