Home | View fingerprints | Statistics | Blog (RSS)

Does your web browser have a unique fingerprint? If so your web browser could be tracked across websites without techniques such as tracking cookies. Additionally the anonymisation aspects of services such as Tor or VPNs could be negated if websites you visit track you using your browser fingerprint. This service is designed to test how unique your web browser's fingerprint is, and hence how identifiable your browser is.

This is a free service provided for research purposes. If you are worried about privacy feel free to read our privacy policy.

Browserprint is a free open source project designed to provide the same and better functionality as the original Panopticlick. Several of the tests are based on publicly available code from Am I unique? and Fingerprintjs2. The inspiration for each test can be found on the sources page.

Browserprint is developed by a student of and generously hosted by the University of Adelaide. Browerprint's development was partially funded by ACEMS. This project would not be possible without these institutions' help.

News 2017-05-03 A new blog post in which we discuss how Browserprint guesses your browser family and operating system, and how accurate this is.

News 2017-02-15 Browserprint now tries to guess what operating system you're using in the same way that it guesses your browser. This can also theoretically be used to detect and defeat fingerprint spoofing.

News 2017-02-13 Browserprint now tries to guess what family of browser you're using (e.g. Firefox, Chrome, ...) by running part of your fingerprint (not including user-agent, that's cheating) through a machine learning algorithm. Theoretically this can be used to detect and defeat fingerprint spoofing.

News 2017-01-24 New blog post discussing the how fingerprint properties are intertwined.

News 2016-09-08 New blog post discussing HSTS supercookies.

News 2016-08-16 We've added a new test. This one detects whether HSTS is supported by the browser. HSTS is a web security policy that prevents browsers from accessing HTTPS sites via HTTP. It can be abused to store supercookies in your browser potentially without the need for JavaScript.

News 2016-08-05 We have written a blog post discussing what you can do against fingerprinting.

News 2016-08-02 We've been featured on the front page of slashdot!

News 2016-07-05: We have implemented a test that detects what fonts your browser has using CSS without JavaScript.

News 2016-06-28: We have added tests. These tests work using the AudioContext API and are based on real world fingerprinting code discovered here https://audiofingerprint.openwpm.com/.

News 2016-06-15: We have added a new test. This test checks to see whether like/share/social buttons are blocked or modified by the browser.

News 2016-06-11: We have written a blog post discussing a kind of fingerprinting that may have never have been explored until now.

News 2016-06-04: We have now implemented our first CSS fingerprinting test that doesn't involve JavaScript; a test for the size of the monitor the browser is being displayed on. It's our hope that this will be just the first of many innovative CSS-only tests. Thanks to Arthur Edelstein for the concept.