Share your coveryourtracks score!
Share your coveryourtracks score!
What score does your browser(s) get?
I'll start: I got:
one in ~25000 browsers have the same fingerprint as yours
Share your coveryourtracks score!
What score does your browser(s) get?
I'll start: I got:
one in ~25000 browsers have the same fingerprint as yours
CreepJS is much better (and scarier) at fingerprinting you than EFF. I've not managed to completely fool it yet but I've got my score down to 0% trust, meaning the fingerprint it generates is pretty useless. I suspect the only way to totally fool it (by which I mean spoof my devices) would be to turn JS off completely.
On Safari 17 every time I visit the site it claims it's my first visit, despite a trust score of 57%. Not sure if I'm interpreting the results wrong or ITP is just doing its job.
I'm not 100% sure but I don't think creep stores anything on its github incarnation so it'll always look like it's your first visit.
iOS 17 Safari (especially with enhanced fingerprint protection on) is really good at fingerprint protection. It rotates a few data points like canvas ID so that it makes you look like a new fingerprint each time.
Fingerprint analyzers can find out lots about your fingerprint that way, but if your fingerprint keeps changing, it becomes difficult to identify you. Unique fingerprints don’t mean anything if your fingerprint keeps changing.
Wow yea this seems really good. And scary. Too bad it doesn't seem to work with mullvad browser
I get 0% on CreepJS with default DDG browser set to "strict", with a crowd blending score of 27%.
I get 40.7% with Mull + adblocker and 66.5% with FF + adblocker
"Your browser has a unique fingerprint"...well that isn't good...
Unique among the people who use that website. So if nobody else if you're configuration ever tried that website.... You would be unique
The bits of entropy are the more important parts of the results. The lower the bits the better
Please also consider things like canvas spoofing. It will create a unique fingerprint that is different every time.
I'm not sure how to read this report. It says my browser is unique and random with strong protections.
More of my stats:
Fennec (privacy badger + unlock origin): 1 in 23301.0
Fennec private tab (privacy badger + unlock origin): 1 in 20712.44
Firefox hardened (arkenfox + privacy badger + unlock origin): 1 in 37281.6
Firefox hardened private tab(arkenfox + privacy badger + unlock origin): 1 in 31069.5
Mullvan browser (dafaults with unlock): 1 in 147.48
There is also fingerprint.com, which I tend to trust more since it's a company that literally sells fingerprinting tech to other companies.
It managed to identify me while using the Tor browser on "Safer" (doesn't work on "Safest" due to JS). Edit: this is likely due to an issue with my install, and not the browser itself.
How did it identify you via tor? Were you using the browser bundle? Completely vanilla?
Did you refresh your session between tests?
I got "unique among the 185,973 tested in the past 45 days"
Edit: this is using Firefox Android Nightly with UBlock + Canvas Blocker
Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 4330.4 browsers have the same fingerprint as yours.
Currently, we estimate that your browser has a fingerprint that conveys 12.08 bits of identifying information.
Using Mull with NoScript through Mullvad
Same here Edit: except unique in 186,012 tests
Similar. Using Mull, uBlock, pi-hole, and ghostery. I should try with my VPN on.
Am I looking for a high number or a low number?
Looks like Chrome randomized my fingerprint but Firefox doesn't. Does that mean I should be using chrome instead of FF?
Spoof your user-agent in FF
That's very easy to catch. You stand out much, much more as a spoofing firefox user than as a firefox user.
mullvad vpn + mullvad browser + a bunch of extensions: 1:26830.0
fingerprint.com does not track me
Mullvad browser + extensions is pointless, might as well use LibreWolf or just harden Firefox yourself.
The point of the Mullvad browser is to not stand out from the crowd; by installing extensions you are definitely standing out.
Only one in 706.9 browsers have the same fingerprint as yours mine.
Is that bad? Or is this like golf.
Not necessarily bad, the lower the number the harder it is to fingerprint you. In other words, your browser stands out much less and is less noticeable from the masses than the OPs browser.
Generally the more security/privacy tweaks and add-ons you apply to your browser the more secure it gets, but you tend to stand out from the masses more because of the changes, resulting in the 1 in 4,000 type stat. It becomes easier to differentiate your traffic from others.
Whether anonymity or security is more desirable depends on your threat model.
Edit: "Your browser fingerprint appears to be unique among the 186,867 tested in the past 45 days." Evidently I stand out quite a bit 😂
Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 93387.5 browsers have the same fingerprint as yours.
Currently, we estimate that your browser has a fingerprint that conveys 16.51 bits of identifying information.
But also
Your browser has a nearly-unique fingerprint
I don't get it
Almost no browser has the same fingerprint as yours, which makes it nearly unique.
There's a couple issues going on here. Number one is it's unique amongst the people who go to EFFs website cover your tracks. That's not all of the internet users. Hell that's not even most of the internet users. It's pretty niche community.
The bits of identifying information are the critical key here. 16 bits, 2 ^ 16.. 65,000 different possibilities. Each piece of information you give, makes it a little bit easier to track you. Things like language, time zone.. The more bits, the easier it is to identify you. The less bits, the more you blend into the crowd.
This is why multiple people, including myself, have talked about fingerprint.com they're professional service, who's targeting websites, who want to track users. So they're incentivized to track as best as able.
Even if you've got a great EFF score, you should always check fingerprint.com, to see if they can track you.
Mine said -
Your browser fingerprint appears to be unique among the 184,486 tested in the past 45 days.
Don't get it either, just stock FF on stock Android
Stock browsers give a lot of information, supported system fonts, supported system languages, time zone, canvas size, browser window size, there's a lot of data that leaks out from the browser itself.
Install a weird game that installed a weird font into your system? Well now the entire world can uniquely identify your font combination as you.
Your browser fingerprint appears to be unique among the 187,041 tested in the past 45 days.
Same here. Is there a way to spoof a more generic fingerprint or something?
It seems that my screen resolution is the problem. Brave beats Firefox based browsers because it spoofs the screen resolution
I've an unique fingerprint, but different fp results in every test run, with mostly wrong sys specs, only it shows correct my country, nothing else. Same in Browserleaks.
0 because I have scripts disabled.
On LibreWolf, which I use to surf daily, I got one in 180k+.
Afterwards, I tried Tor Browser -which is honestly almost never used- and this was a lot better at one in 6k+. Though this was only in "Safer" mode, I tried testing it on "Safest" afterwards, but an update screwed it up and I somehow couldn't get it back to its standard opening size.
Interestingly, my best result I got once again on LibreWolf. This time, I changed two things:
This resulted in a one in 800+. I am interested to know how Mullvad browser users fare on Mullvad VPN.
I see. I too use similar settings on Librewolf: should try it.
Doesn't work with Javascript blocked.
Within our dataset of several hundred thousand visitors tested in the past 45 days, only one in 4244.39 browsers have the same fingerprint as yours.
Currently, we estimate that your browser has a fingerprint that conveys 12.05 bits of identifying information.
Firefox mobile with various addons, most important of which is probably NoScript
1:46157.75 using mobileSafari on iOS with NextDNS.
Heh, nice try FBI