Knowledge

Device fingerprint

Source 📝

761: 730: 103: 282:
A certain degree of instability can be compensated by linking together fingerprints that, although partially different, might probably belong to the same device. This can be accomplished by a simple rule-based linking algorithm (which, for example, links together fingerprints that differ only for the
278:
In order to uniquely distinguish over time some devices through their fingerprints, the fingerprints must be both sufficiently diverse and sufficiently stable. In practice neither diversity nor stability is fully attainable, and improving one has a tendency to adversely impact the other. For example,
660:
A canvas fingerprinting script first draws text of specified font, size, and background color. The image of the text as rendered by the user's browser is then recovered by the ToDataURL Canvas API method. The hashed text-encoded data becomes the user's fingerprint. Canvas fingerprinting methods have
401:
Passive fingerprinting techniques merely require the fingerprinter to observe traffic originated from the target device, while active fingerprinting techniques require the fingerprinter to initiate connections to the target device. Techniques that require interaction with the target device over a
313:
Even if they are not designed to gather and share identifying information, local applications might unwillingly expose identifying information to the remote parties with which they interact. The most prominent example is that of web browsers, which have been proved to expose diverse and stable
429:
Browsers provide their name and version, together with some compatibility information, in the User-Agent request header. Being a statement freely given by the client, it should not be trusted when assessing its identity. Instead, the type and version of the browser can be inferred from the
414:
languages, which were introduced in the late 1990s. Today there are several open-source browser fingerprinting libraries, such as FingerprintJS, ImprintJS, and ClientJS, where FingerprintJS is updated the most often and supersedes ImprintJS and ClientJS to a large extent.
661:
been shown to produce 5.7 bits of entropy. Because the technique obtains information about the user's GPU, the information entropy gained is "orthogonal" to the entropy of previous browser fingerprint techniques such as screen resolution and JavaScript capabilities.
715:
Different approaches exist to mitigate the effects of browser fingerprinting and improve users' privacy by preventing unwanted tracking, but there is no ultimate approach that can prevent fingerprinting while keeping the richness of a modern web browser.
279:
the assimilation of an additional browser setting into the browser fingerprint would usually increase diversity, but it would also reduce stability, because if a user changes that setting, then the browser fingerprint would change as well.
888:
Different browsers on the same machine would usually have different fingerprints, but if both browsers are not protected against fingerprinting, then the two fingerprints could be identified as originating from the same machine.
872:) can sometimes render websites unusable. The preferred approach is to block only third-party domains that seem to track people, either because they are found on a blacklist of tracking domains (the approach followed by most 855:
Spoofing the information differently at each site visit, for example by perturbating the sound and canvas rendering with a small amount of random noise, allows a reduction of stability. This technique has been adopted by the
852:) may create a reduction in diversity, but the contrary could be also achieved if the spoofed information differentiates the user from all the others who do not use such a strategy more than the real browser information. 258:
has been turned on by default for all users also during non-private browsing. The feature was first introduced to protect private browsing in 2015 and was then extended to standard browsing as an opt-in feature in 2018.
695:
can also be used, such as the Battery API, which constructs a short-term fingerprint based on the actual battery state of the device, or OscillatorNode, which can be invoked to produce a waveform based on user entropy.
599:. Typically, a list of 50 popular websites were sufficient to generate a unique user history profile, as well as provide information about the user's interests. However, browsers have since then mitigated this risk. 832:
In order to reduce diversity, Tor browser doesn't allow the width and height of the window available to the webpage to be any number of pixels, but allows only some given values. The result is that the webpage is
297:
Applications that are locally installed on a device are allowed to gather a great amount of information about the software and the hardware of the device, often including unique identifiers such as the
38:
is information collected about the software and hardware of a remote computing device for the purpose of identification. The information is usually assimilated into a brief identifier using a
539:
unique to a browser can be added to a fingerprint directly. Extensions may also modify how any other browser attributes behave, adding additional complexity to the user's fingerprint.
211:
In 2014, 5.5% of Alexa top 10,000 sites were found to use canvas fingerprinting scripts served by a total of 20 domains. The overwhelming majority (95%) of the scripts were served by
1045: 1664: 595:
The fingerprinter could determine which sites the browser had previously visited within a list it provided, by querying the list using JavaScript with the CSS selector
228:
was introduced in Firefox version 42 to protect against tracking during private browsing by blocking scripts from third party domains found in the lists published by
1075: 1729: 1128:. WWW '15: The 24th International Conference on World Wide Web. Florence Italy: International World Wide Web Conferences Steering Committee. pp. 820–830. 2538: 179:
launched a website where visitors can test their browser fingerprint. After collecting a sample of 470161 fingerprints, they measured at least 18.1 bits of
2316:
Olejnik L, Acar G, Castelluccia C, Diaz C (2016). "The Leaking Battery". In Garcia-Alfaro J, Navarro-Arribas G, Aldini A, Martinelli F, Suri N (eds.).
321:
Diverse and stable information can also be gathered below the application layer, by leveraging the protocols that are used to transmit data. Sorted by
868:
Blindly blocking client-side scripts served from third-party domains, and possibly also first-party domains (e.g. by disabling JavaScript or using
1485:. 2014 ACM SIGSAC Conference on Computer & Communications Security. Scottsdale AZ USA: Association for Computing Machinery. pp. 674–689. 898: 2353:. 2014 ACM SIGSAC Conference on Computer & Communications Security. Vienna Austria: Association for Computing Machinery. pp. 1388–1401. 1174:. 2013 ACM SIGSAC Conference on Computer & Communications Security. Berlin Germany: Association for Computing Machinery. pp. 1129–1140. 1304: 1279: 1208:
Abgrall E, Le Traon Y, Monperrus M, Gombault S, Heiderich M, Ribault A (2012-11-20). "XSS-FP: Browser Fingerprinting using HTML Parser Quirks".
1518: 984: 2383: 2605: 2515: 2472: 2366: 2333: 2300: 2248: 2174: 2128: 2086: 2059: 2026: 1939: 1903: 1867: 1498: 1259: 1187: 1151: 1025: 960: 2287:. 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Fukuoka Japan: IEEE. pp. 587–592. 1422: 250:"presents simplified system information when users browse the web, preventing them from being tracked based on their system configuration." 1926:. 10th International Conference on Broadband and Wireless Computing, Communication and Applications. Krakow Poland: IEEE. pp. 57–63. 1659:
Vastel, Antoine; Laperdrix, Pierre; Rudametkin, Walter; Rouvoy, Romain (May 2018). "FP-STALKER: Tracking Browser Fingerprint Evolutions".
2489: 1390: 191: 161: 2155:
Al-Fannah NM, Li W (2017). "Not All Browsers are Created Equal: Comparing Web Browser Fingerprintability". In Obana S, Chida K (eds.).
1760: 2673: 2658: 760: 356: 692: 385: 1705: 2076: 1333: 2636: 845: 176: 450:
comparison of parser behaviors has been shown to effectively fingerprint and differentiate a majority of browser versions.
1071: 1012:. 32nd Annual Conference on Computer Security. Los Angeles CA USA: Association for Computing Machinery. pp. 289–301. 366: 165: 65:
is hidden, or one switches to another browser on the same device. This may allow a service provider to detect and prevent
1541: 434:
is unique to each browser family and, most importantly, each browser family and version differs in its implementation of
1736: 286: 180: 1854:. 2013 International Conference on Availability, Reliability and Security. Regensburg Germany: IEEE. pp. 255–261. 1100: 700: 410:
The collection of a large amount of diverse and stable information from web browsers is possible for most part due to
370: 78: 2217: 431: 157:
experts starting to complain about the ease of bulk parameter extraction offered by web browsers as early as 2003.
2663: 1792: 1591: 307: 2645:, by INRIA and INSA Rennes, implements fingerprinting techniques including collecting information through WebGL. 215:, which started using canvas fingerprinting in January that year, without the knowledge of some of its clients. 829:
disables fingerprintable features such as the canvas and WebGL API and notifies users of fingerprint attempts.
646: 544: 395: 346: 39: 2451: 2668: 2231:
Fifield D, Egelman S (2015). "Fingerprinting Web Users Through Font Metrics". In Böhme R, Okamoto T (eds.).
918: 826: 2578: 2678: 2639:, gathers some elements of a browser's device fingerprint and estimates how identifiable it makes the user 1956: 834: 1625: 669: 624: 608: 411: 184: 2418:. The 19th Annual Network and Distributed System Security Symposium. San Diego CA USA: Internet Society 1816: 1275: 769: 1300: 808: 576: 330: 243: 74: 977: 2565: 2516:"Adblock Plus: We can stop canvas fingerprinting, the 'unstoppable' new browser tracking technique" 2235:. Lecture Notes in Computer Science. Vol. 8975. Springer Berlin Heidelberg. pp. 107–124. 1761:"Chatter on the Wire: A look at excessive network traffic and what it can mean to network security" 673: 2523: 2264:
Obaidat, Muath (2020). "Canvas Deceiver - A New Defense Mechanism Against Canvas Fingerprinting".
876:) or because the intention of tracking is inferred by past observations (the approach followed by 2160: 1209: 572: 560: 536: 208:
top 10,000 sites were found to use fingerprinting scripts provided by a few known third parties.
2450:
Merzdovnik G, Huber M, Buhov D, Nikiforakis N, Neuner S, Schmiedecker M, Weippl E (April 2017).
1982: 2013:. 7th International Conference on New Technologies, Mobility and Security. Paris France: IEEE. 1301:"MSIE clientCaps "isComponentInstalled" and "getComponentVersion" registry information leakage" 1010:
Device Fingerprinting for Augmenting Web Authentication: Classification and Analysis of Methods
776:
which minimizes the availability of identifying information, such as browser fonts, device ID,
637:
to render 2D and 3D graphics in a browser, to gain identifying information about the installed
153:
has gradually enabled the collection of an increasing amount of diverse information, with some
2586: 2468: 2459:. 2017 IEEE European Symposium on Security and Privacy. Paris France: IEEE. pp. 319–333. 2362: 2329: 2296: 2244: 2170: 2124: 2082: 2055: 2022: 1935: 1899: 1863: 1494: 1255: 1183: 1147: 1021: 956: 804: 677: 556: 532: 229: 154: 70: 54: 2081:. 26th USENIX Security Symposium. Vancouver BC Canada: USENIX Association. pp. 679–694. 1379: 2460: 2354: 2321: 2288: 2236: 2116: 2115:. 11th International Conference on Intelligent Systems and Control. Coimbatore India: IEEE. 2047: 2014: 1927: 1891: 1888:
Countering Browser Fingerprinting Techniques: Constructing a Fake Profile with Google Chrome
1855: 1767: 1678: 1668: 1486: 1245: 1175: 1137: 1129: 1013: 923: 908: 903: 785: 564: 447: 424: 268: 86: 53:
Device fingerprints can be used to fully or partially identify individual devices even when
1890:. 17th International Conference on Network-Based Information Systems. Salerno Italy: IEEE. 1645: 1611: 2320:. DPM 2015, QASA 2015. Lecture Notes in Computer Science. Vol. 9481. Springer, Cham. 2159:. Lecture Notes in Computer Science. Springer International Publishing. pp. 105–120. 1565: 1170:
Acar G, Juarez M, Nikiforakis N, Diaz C, Gürses S, Piessens F, Preneel B (November 2013).
222:
version 41, but it has been since left in an experimental stage, not initiated by default.
1046:"You Are Being Tracked Online By A Sneaky New Technology -- Here's What You Need To Know" 2410: 2046:. 2017 IEEE Symposium on Security and Privacy. San Jose CA USA: IEEE. pp. 941–956. 1698: 1276:"EFF's Top 12 Ways to Protect Your Online Privacy | Electronic Frontier Foundation" 951:
Eckersley P (2017). "How Unique Is Your Web Browser?". In Atallah MJ, Hopper NJ (eds.).
743:
Please help update this article to reflect recent events or newly available information.
116:
Please help update this article to reflect recent events or newly available information.
73:, but also to compile long-term records of individuals' browsing histories (and deliver 2283:
Saito T, Yasuda K, Ishikawa T, Hosoi R, Takahashi K, Chen Y, Zalasiński M (July 2016).
2078:
Extension Breakdown: Security Analysis of Browsers Extension Resources Control Policies
1850:
Unger T, Mulazzani M, Frühwirt D, Huber M, Schrittwieser S, Weippl E (September 2013).
1329: 877: 812: 792: 777: 630: 205: 198: 172:
of a device, and consequently to remotely obtain a hardware fingerprint of the device.
66: 27:
Information collected about a remote computing device for the purpose of identification
2652: 857: 800: 650: 638: 303: 138: 58: 2196:
Why Johnny Can't Browse in Peace: On the Uniqueness of Web Browsing History Patterns
1831: 1418: 928: 612: 247: 17: 1240:
Nikiforakis N, Kapravelos A, Wouter J, Kruegel C, Piessens F, Vigna G (May 2013).
2566:"The Elephant In The Background: Empowering Users Against Browser Fingerprinting" 2325: 2199:. 5th Workshop on Hot Topics in Privacy Enhancing Technologies. Vigo Spain: INRIA 2437:"What's Brave Done For My Privacy Lately? Episode #3: Fingerprint Randomization" 2240: 955:. Lecture Notes in Computer Science. Springer Berlin Heidelberg. pp. 1–18. 773: 568: 540: 389: 299: 272: 146: 142: 134: 47: 2384:"Firefox to add Tor Browser anti-fingerprinting technique called letter-boxing" 1481:
Acar G, Eubank C, Englehardt S, Juarez M, Narayanan A, Diaz C (November 2014).
325:
layer, some examples of protocols that can be utilized for fingerprinting are:
218:
In 2015, a feature to protect against browser fingerprinting was introduced in
2412:
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications
2120: 2018: 1958:
Fast and Reliable Browser Identification with JavaScript Engine Fingerprinting
1955:
Mulazzani M, Reschl P, Huber M, Leithner M, Schrittwieser S, Weippl E (2013),
1683: 1426: 1242:
Cookieless Monster: Exploring the Ecosystem of Web-Based Device Fingerprinting
913: 873: 849: 816: 685: 642: 580: 547:
plugins were widely used to access user information before their deprecation.
443: 310:
use this information for the very purpose of uniquely identifying the device.
283:
browser version, if that increases with time) or machine learning algorithms.
239: 183:
possible from browser fingerprinting, but that was before the advancements of
169: 150: 62: 2590: 2358: 2218:"Privacy and the :visited selector - CSS: Cascading Style Sheets | MDN" 1490: 1179: 1133: 1096: 1017: 430:
observation of quirks in its behavior: for example, the order and number of
402:
connection initiated by the latter are sometimes addressed as semi-passive.
322: 236: 2464: 1931: 1519:"EFF Says Its Anti-Tracking Tool Blocks New Form Of Digital Fingerprinting" 1142: 2292: 1895: 1673: 2493: 1859: 1452: 869: 681: 82: 2436: 2051: 1545: 1423:"Meet the Online Tracking Device That is Virtually Impossible to Block" 1250: 820: 796: 764:
Typical Tor Browser notification of a website attempting a canvas read.
360: 219: 212: 1244:. 2013 IEEE Symposium on Security and Privacy. Berkeley CA USA: IEEE. 649:(GPU). Canvas-based techniques may also be used to identify installed 1570: 1354: 1050: 837:: it fills a space that is slightly smaller than the browser window. 704: 342: 2490:"'Canvas fingerprinting' online tracking is sneaky but easy to halt" 2194: 1852:
SHPF: Enhancing HTTP(S) Session Security with Browser Fingerprinting
1542:"What You Need to Know About the Sneakiest New Online Tracking Tool" 2165: 2111:
Kaur N, Azam S, KannoorpattiK, Yeo KC, Shanmugam B (January 2017).
978:"(Cross-)Browser Fingerprinting via OS and Hardware Level Features" 2453:
Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools
2388: 1886:
Fiore U, Castiglione A, De Santis A, Palmieri F (September 2014).
1214: 795:
is considered to be the most fingerprintable browser, followed by
781: 634: 454:
JavaScript object manipulation is specific to each browser family
435: 314:
information in such an amount to allow remote identification, see
195: 1483:
The Web Never Forgets: Persistent Tracking Mechanisms in the Wild
446:. Such differences can be remotely tested by using JavaScript. A 2632: 2044:
XHOUND: Quantifying the Fingerprintability of Browser Extensions
381: 377: 350: 338: 848:
some of the information exposed to the fingerprinter (e.g. the
306:
assigned to the machine hardware. Indeed, programs that employ
723: 654: 584: 439: 334: 201:
could be used to create digital fingerprints of web browsers.
96: 46:
is information collected specifically by interaction with the
1793:"EssentialFP: Exposing the Essence of Browser Fingerprinting" 1126:
PriVaricator: Deceiving Fingerprinters with Little White Lies
267:
Motivation for the device fingerprint concept stems from the
1924:
Web Browser Fingerprinting Using Only Cascading Style Sheets
607:
The letter bounding boxes differ between browsers based on
2351:
Online Tracking: A 1-million-site Measurement and Analysis
657:
information can be provided to the fingerprinter instead.
2642: 2604:
Segal, Ory; Fridman, Aharon; Shuster, Elad (2017-06-05).
2577:
Angwin, Julia; Valentino-DeVries, Jennifer (2010-11-30).
2011:
A classification of web browser fingerprinting techniques
190:
In 2012, Keaton Mowery and Hovav Shacham, researchers at
1984:
Fingerprinting Information in JavaScript Implementations
672:
can be used to determine whether a user's CPU utilizes
2075:
Sanchez-Rola I, Santos I, Balzarotti D (August 2017).
1791:
Alexander, Sjosten; Daniel, Hedin; Andrei, Sabelfeld.
61:) cannot be read or stored in the browser, the client 137:
configuration information has long been collected by
2409:
Yen TF, Xie Y, Yu F, Yu R, Abadi M (February 2012).
1097:"7 Leading Fraud Indicators: Cookies to Null Values" 596: 2113:Browser Fingerprinting as user tracking technology 1981:Mowery K, Bogenreif D, Yilek S, Shacham H (2011), 1235: 1233: 1231: 1229: 1227: 1225: 707:, can also be queried to construct a fingerprint. 563:, in the HTTP header. Properties about the user's 2285:Estimating CPU Features by Browser Fingerprinting 2266:Journal of Systemics, Cybernetics and Informatics 2004: 2002: 1922:Takei N, Saito T, Takasu K, Yamada T (Nov 2015). 1665:Institute of Electrical and Electronics Engineers 1119: 1117: 615:configuration and can be measured by JavaScript. 2539:"The Limitations of Fingerprint Identifications" 2150: 2148: 2146: 2144: 2142: 2140: 1566:"meta: tor uplift: privacy.resistFingerprinting" 1124:Nikiforakis N, Joosen W, Livshits B (May 2015). 653:. Furthermore, if the user does not have a GPU, 2318:Data Privacy Management, and Security Assurance 2193:Olejnik L, Castelluccia C, Janc A (July 2012). 1172:FPDetective: Dusting the Web for Fingerprinters 1039: 1037: 946: 944: 2188: 2186: 2157:Advances in Information and Computer Security 1699:"Chatter on the Wire: A look at DHCP traffic" 1592:"Firefox's protection against fingerprinting" 1454:Pixel Perfect: Fingerprinting Canvas in HTML5 1446: 1444: 1442: 1203: 1201: 1199: 711:Mitigation methods for browser fingerprinting 289:is one of several ways to measure diversity. 8: 1917: 1915: 1881: 1879: 1845: 1843: 1841: 149:. Since its introduction in the late 1990s, 141:services in an effort to measure real human 2106: 2104: 2009:Upathilake R, Li Y, Matrawy A (July 2015). 1661:2018 IEEE Symposium on Security and Privacy 1476: 1474: 1472: 254:In 2019, starting from Firefox version 69, 2606:"Passive Fingerprinting of HTTP/2 Clients" 1832:"History of the browser user-agent string" 1165: 1163: 1008:Alaca F, van Oorschot PC (December 2016). 465:Reassignment (of navigator/screen object) 2579:"Race Is On to 'Fingerprint' Phones, PCs" 2164: 1682: 1672: 1413: 1411: 1249: 1213: 1141: 168:timestamps could be used to estimate the 2233:Financial Cryptography and Data Security 1512: 1510: 1323: 1321: 759: 462:Property deletion (of navigator object) 452: 315: 187:, which claims to add another 5.7 bits. 2349:Englehardt S, Arvind N (October 2016). 1730:"Wireless Device Driver Fingerprinting" 940: 819:are most fingerprintable, followed by 629:Canvas fingerprinting uses the HTML5 7: 2042:Starov O, Nikiforakis N (May 2017). 699:A device's hardware ID, which is a 192:University of California, San Diego 162:University of California, San Diego 81:) even when they are attempting to 1389:. Electronic Frontier Foundation. 1330:"Remote Physical Device Detection" 1072:"User confidence takes a Net loss" 823:, mobile Edge, and mobile Safari. 768:Users may attempt to reduce their 684:used to execute various simple or 293:Sources of identifying information 25: 2570:Chaos Communication Congress 2020 1396:from the original on 9 March 2016 1380:"How Unique Is Your Web Browser?" 1303:. Archive.cert.uni-stuttgart.de. 720:Offering a simplified fingerprint 1378:Eckersley, Peter (17 May 2010). 728: 101: 2382:Cimpanu, Catalin (2019-03-06). 1711:from the original on 2014-08-11 1626:"Apple introduces macOS Mojave" 1336:from the original on 2010-01-10 1307:from the original on 2011-06-12 1282:from the original on 2010-02-04 1103:from the original on 2016-10-03 1078:from the original on 2015-10-04 990:from the original on 2017-03-07 579:can be also retrieved by using 2637:Electronic Frontier Foundation 2564:Fietkau, Julian (2020-12-28). 953:Privacy Enhancing Technologies 841:Offering a spoofed fingerprint 224:The same year a feature named 177:Electronic Frontier Foundation 145:and discount various forms of 85:– raising a major concern for 1: 1074:. Infoworld.com. 2005-07-01. 2326:10.1007/978-3-319-29883-2_18 1646:"Firefox 69.0 release notes" 1612:"Firefox 42.0 release notes" 1451:Mowery K, Shacham H (2012), 1044:Steinberg J (23 July 2014). 256:Enhanced Tracking Protection 226:Enhanced Tracking Protection 160:In 2005, researchers at the 2241:10.1007/978-3-662-47854-7_7 701:cryptographic hash function 559:information, such as phone 371:TCP/IP stack fingerprinting 2695: 1540:Knibbs K (July 21, 2014). 976:Cao, Yinzhi (2017-02-26). 703:specified by the device's 622: 422: 316:§ Browser fingerprint 204:In 2013, at least 0.4% of 2674:Fingerprinting algorithms 2659:Computer network security 2121:10.1109/ISCO.2017.7855963 2019:10.1109/NTMS.2015.7266460 1517:Davis W (July 21, 2014). 737:This section needs to be 583:to observe the result of 308:digital rights management 110:This section needs to be 2488:Kirk J (July 25, 2014). 686:cryptographic algorithms 647:graphics processing unit 555:User agents may provide 40:fingerprinting algorithm 2359:10.1145/2976749.2978313 1491:10.1145/2660267.2660347 1328:Kohno; Broido; Claffy. 1278:. Eff.org. 2002-04-10. 1180:10.1145/2508859.2516674 1134:10.1145/2736277.2741090 1018:10.1145/2991079.2991091 919:Fingerprint (computing) 884:Using multiple browsers 263:Diversity and stability 2465:10.1109/EuroSP.2017.26 1932:10.1109/BWCCA.2015.105 899:Anonymous web browsing 765: 2537:Newman, Drew (2007). 2522:. PMC. Archived from 2293:10.1109/IMIS.2016.108 1896:10.1109/NBiS.2014.102 1674:10.1109/SP.2018.00008 1332:. Cs.washington.edu. 763: 665:Hardware benchmarking 625:Canvas fingerprinting 412:client-side scripting 185:canvas fingerprinting 151:client-side scripting 1860:10.1109/ARES.2013.33 1355:"About Panopticlick" 815:, Google Chrome and 577:display aspect ratio 75:targeted advertising 2583:Wall Street Journal 2220:. 21 February 2023. 633:, which is used by 551:Hardware properties 455: 406:Browser fingerprint 44:browser fingerprint 36:machine fingerprint 18:Browser fingerprint 2052:10.1109/SP.2017.18 1684:20.500.12210/23865 1251:10.1109/SP.2013.43 770:fingerprintability 766: 573:screen orientation 527:Browser extensions 514:Internet Explorer 453: 432:HTTP header fields 273:human fingerprints 55:persistent cookies 32:device fingerprint 2526:on July 28, 2014. 2474:978-1-5090-5762-7 2368:978-1-4503-4139-4 2335:978-3-319-29883-2 2302:978-1-5090-0984-8 2250:978-3-662-47854-7 2176:978-3-319-64200-0 2130:978-1-5090-2717-0 2088:978-1-931971-40-9 2061:978-1-5090-5533-3 2028:978-1-4799-8784-9 1941:978-1-4673-8315-8 1905:978-1-4799-4224-4 1869:978-0-7695-5008-4 1500:978-1-4503-2957-6 1421:(July 21, 2014). 1261:978-0-7695-4977-4 1189:978-1-4503-2477-9 1153:978-1-4503-3469-3 1027:978-1-4503-4771-6 962:978-3-642-14527-8 805:Internet Explorer 784:information, and 758: 757: 680:by comparing the 678:Intel Turbo Boost 531:A combination of 524: 523: 230:Disconnect Mobile 194:, showed how the 155:computer security 131: 130: 71:credit card fraud 16:(Redirected from 2686: 2664:Internet privacy 2622: 2620: 2619: 2610: 2600: 2598: 2597: 2573: 2551: 2550: 2543:Criminal Justice 2534: 2528: 2527: 2511: 2505: 2504: 2502: 2500: 2485: 2479: 2478: 2458: 2447: 2441: 2440: 2433: 2427: 2426: 2424: 2423: 2417: 2406: 2400: 2399: 2397: 2396: 2379: 2373: 2372: 2346: 2340: 2339: 2313: 2307: 2306: 2280: 2274: 2273: 2261: 2255: 2254: 2228: 2222: 2221: 2214: 2208: 2207: 2205: 2204: 2190: 2181: 2180: 2168: 2152: 2135: 2134: 2108: 2099: 2098: 2096: 2095: 2072: 2066: 2065: 2039: 2033: 2032: 2006: 1997: 1996: 1995: 1994: 1989: 1978: 1972: 1971: 1970: 1969: 1963: 1952: 1946: 1945: 1919: 1910: 1909: 1883: 1874: 1873: 1847: 1836: 1835: 1830:Aaron Andersen. 1827: 1821: 1820: 1819:. 10 April 2023. 1813: 1807: 1806: 1804: 1802: 1797: 1788: 1782: 1781: 1779: 1778: 1772: 1766:. Archived from 1765: 1757: 1751: 1750: 1748: 1747: 1741: 1735:. Archived from 1734: 1726: 1720: 1719: 1717: 1716: 1710: 1703: 1695: 1689: 1688: 1686: 1676: 1656: 1650: 1649: 1642: 1636: 1635: 1633: 1632: 1622: 1616: 1615: 1608: 1602: 1601: 1599: 1598: 1588: 1582: 1581: 1579: 1578: 1562: 1556: 1555: 1553: 1552: 1537: 1531: 1530: 1528: 1526: 1514: 1505: 1504: 1478: 1467: 1466: 1465: 1464: 1459: 1448: 1437: 1436: 1434: 1433: 1415: 1406: 1405: 1403: 1401: 1395: 1384: 1375: 1369: 1368: 1366: 1365: 1351: 1345: 1344: 1342: 1341: 1325: 1316: 1315: 1313: 1312: 1297: 1291: 1290: 1288: 1287: 1272: 1266: 1265: 1253: 1237: 1220: 1219: 1217: 1205: 1194: 1193: 1167: 1158: 1157: 1145: 1121: 1112: 1111: 1109: 1108: 1093: 1087: 1086: 1084: 1083: 1068: 1062: 1061: 1059: 1058: 1041: 1032: 1031: 1005: 999: 998: 996: 995: 989: 982: 973: 967: 966: 948: 924:Internet privacy 909:Browser sniffing 904:Browser security 864:Blocking scripts 786:local IP address 753: 750: 744: 732: 731: 724: 619:Canvas and WebGL 598: 591:Browsing history 565:operating system 492:Mozilla Firefox 456: 448:Hamming distance 425:Browser sniffing 126: 123: 117: 105: 104: 97: 87:internet privacy 21: 2694: 2693: 2689: 2688: 2687: 2685: 2684: 2683: 2649: 2648: 2629: 2617: 2615: 2608: 2603: 2595: 2593: 2576: 2563: 2560: 2558:Further reading 2555: 2554: 2536: 2535: 2531: 2513: 2512: 2508: 2498: 2496: 2487: 2486: 2482: 2475: 2456: 2449: 2448: 2444: 2439:. 6 March 2020. 2435: 2434: 2430: 2421: 2419: 2415: 2408: 2407: 2403: 2394: 2392: 2381: 2380: 2376: 2369: 2348: 2347: 2343: 2336: 2315: 2314: 2310: 2303: 2282: 2281: 2277: 2263: 2262: 2258: 2251: 2230: 2229: 2225: 2216: 2215: 2211: 2202: 2200: 2192: 2191: 2184: 2177: 2154: 2153: 2138: 2131: 2110: 2109: 2102: 2093: 2091: 2089: 2074: 2073: 2069: 2062: 2041: 2040: 2036: 2029: 2008: 2007: 2000: 1992: 1990: 1987: 1980: 1979: 1975: 1967: 1965: 1961: 1954: 1953: 1949: 1942: 1921: 1920: 1913: 1906: 1885: 1884: 1877: 1870: 1849: 1848: 1839: 1829: 1828: 1824: 1815: 1814: 1810: 1800: 1798: 1795: 1790: 1789: 1785: 1776: 1774: 1770: 1763: 1759: 1758: 1754: 1745: 1743: 1739: 1732: 1728: 1727: 1723: 1714: 1712: 1708: 1701: 1697: 1696: 1692: 1658: 1657: 1653: 1644: 1643: 1639: 1630: 1628: 1624: 1623: 1619: 1610: 1609: 1605: 1596: 1594: 1590: 1589: 1585: 1576: 1574: 1564: 1563: 1559: 1550: 1548: 1539: 1538: 1534: 1524: 1522: 1516: 1515: 1508: 1501: 1480: 1479: 1470: 1462: 1460: 1457: 1450: 1449: 1440: 1431: 1429: 1417: 1416: 1409: 1399: 1397: 1393: 1382: 1377: 1376: 1372: 1363: 1361: 1353: 1352: 1348: 1339: 1337: 1327: 1326: 1319: 1310: 1308: 1299: 1298: 1294: 1285: 1283: 1274: 1273: 1269: 1262: 1239: 1238: 1223: 1207: 1206: 1197: 1190: 1169: 1168: 1161: 1154: 1123: 1122: 1115: 1106: 1104: 1095: 1094: 1090: 1081: 1079: 1070: 1069: 1065: 1056: 1054: 1043: 1042: 1035: 1028: 1007: 1006: 1002: 993: 991: 987: 980: 975: 974: 970: 963: 950: 949: 942: 937: 895: 886: 866: 843: 813:mobile browsers 772:by selecting a 754: 748: 745: 742: 733: 729: 722: 713: 670:Benchmark tests 667: 639:graphics driver 627: 621: 605: 593: 587:media queries. 557:system hardware 553: 529: 481:Microsoft Edge 459:Browser family 427: 421: 419:Browser version 408: 295: 265: 251: 242:announced that 223: 127: 121: 118: 115: 106: 102: 95: 50:of the device. 28: 23: 22: 15: 12: 11: 5: 2692: 2690: 2682: 2681: 2676: 2671: 2669:Internet fraud 2666: 2661: 2651: 2650: 2647: 2646: 2640: 2628: 2627:External links 2625: 2624: 2623: 2601: 2574: 2559: 2556: 2553: 2552: 2529: 2514:Smith, Chris. 2506: 2480: 2473: 2442: 2428: 2401: 2374: 2367: 2341: 2334: 2308: 2301: 2275: 2256: 2249: 2223: 2209: 2182: 2175: 2136: 2129: 2100: 2087: 2067: 2060: 2034: 2027: 1998: 1973: 1964:, SBA Research 1947: 1940: 1911: 1904: 1875: 1868: 1837: 1822: 1808: 1783: 1752: 1721: 1690: 1651: 1637: 1617: 1603: 1583: 1557: 1532: 1506: 1499: 1468: 1438: 1407: 1370: 1346: 1317: 1292: 1267: 1260: 1221: 1195: 1188: 1159: 1152: 1113: 1099:. 2016-03-10. 1088: 1063: 1033: 1026: 1000: 968: 961: 939: 938: 936: 933: 932: 931: 926: 921: 916: 911: 906: 901: 894: 891: 885: 882: 878:Privacy Badger 865: 862: 842: 839: 821:mobile Firefox 793:Microsoft Edge 778:canvas element 756: 755: 736: 734: 727: 721: 718: 712: 709: 666: 663: 631:canvas element 623:Main article: 620: 617: 604: 601: 592: 589: 552: 549: 528: 525: 522: 521: 518: 515: 511: 510: 507: 504: 500: 499: 496: 493: 489: 488: 485: 482: 478: 477: 474: 471: 470:Google Chrome 467: 466: 463: 460: 423:Main article: 420: 417: 407: 404: 399: 398: 392: 374: 363: 353: 304:serial numbers 294: 291: 264: 261: 199:canvas element 129: 128: 109: 107: 100: 94: 91: 83:avoid tracking 67:identity theft 59:zombie cookies 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2691: 2680: 2679:Web analytics 2677: 2675: 2672: 2670: 2667: 2665: 2662: 2660: 2657: 2656: 2654: 2644: 2641: 2638: 2634: 2631: 2630: 2626: 2614: 2607: 2602: 2592: 2588: 2584: 2580: 2575: 2571: 2567: 2562: 2561: 2557: 2548: 2544: 2540: 2533: 2530: 2525: 2521: 2517: 2510: 2507: 2495: 2491: 2484: 2481: 2476: 2470: 2466: 2462: 2455: 2454: 2446: 2443: 2438: 2432: 2429: 2414: 2413: 2405: 2402: 2391: 2390: 2385: 2378: 2375: 2370: 2364: 2360: 2356: 2352: 2345: 2342: 2337: 2331: 2327: 2323: 2319: 2312: 2309: 2304: 2298: 2294: 2290: 2286: 2279: 2276: 2271: 2267: 2260: 2257: 2252: 2246: 2242: 2238: 2234: 2227: 2224: 2219: 2213: 2210: 2198: 2197: 2189: 2187: 2183: 2178: 2172: 2167: 2162: 2158: 2151: 2149: 2147: 2145: 2143: 2141: 2137: 2132: 2126: 2122: 2118: 2114: 2107: 2105: 2101: 2090: 2084: 2080: 2079: 2071: 2068: 2063: 2057: 2053: 2049: 2045: 2038: 2035: 2030: 2024: 2020: 2016: 2012: 2005: 2003: 1999: 1986: 1985: 1977: 1974: 1960: 1959: 1951: 1948: 1943: 1937: 1933: 1929: 1925: 1918: 1916: 1912: 1907: 1901: 1897: 1893: 1889: 1882: 1880: 1876: 1871: 1865: 1861: 1857: 1853: 1846: 1844: 1842: 1838: 1833: 1826: 1823: 1818: 1812: 1809: 1794: 1787: 1784: 1773:on 2014-08-28 1769: 1762: 1756: 1753: 1742:on 2009-05-12 1738: 1731: 1725: 1722: 1707: 1700: 1694: 1691: 1685: 1680: 1675: 1670: 1666: 1662: 1655: 1652: 1647: 1641: 1638: 1627: 1621: 1618: 1613: 1607: 1604: 1593: 1587: 1584: 1573: 1572: 1567: 1561: 1558: 1547: 1543: 1536: 1533: 1520: 1513: 1511: 1507: 1502: 1496: 1492: 1488: 1484: 1477: 1475: 1473: 1469: 1456: 1455: 1447: 1445: 1443: 1439: 1428: 1424: 1420: 1414: 1412: 1408: 1392: 1388: 1381: 1374: 1371: 1360: 1356: 1350: 1347: 1335: 1331: 1324: 1322: 1318: 1306: 1302: 1296: 1293: 1281: 1277: 1271: 1268: 1263: 1257: 1252: 1247: 1243: 1236: 1234: 1232: 1230: 1228: 1226: 1222: 1216: 1211: 1204: 1202: 1200: 1196: 1191: 1185: 1181: 1177: 1173: 1166: 1164: 1160: 1155: 1149: 1144: 1143:10044/1/74945 1139: 1135: 1131: 1127: 1120: 1118: 1114: 1102: 1098: 1092: 1089: 1077: 1073: 1067: 1064: 1053: 1052: 1047: 1040: 1038: 1034: 1029: 1023: 1019: 1015: 1011: 1004: 1001: 986: 979: 972: 969: 964: 958: 954: 947: 945: 941: 934: 930: 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 896: 892: 890: 883: 881: 879: 875: 871: 863: 861: 859: 858:Brave browser 853: 851: 847: 840: 838: 836: 830: 828: 824: 822: 818: 814: 810: 806: 802: 801:Google Chrome 798: 794: 789: 787: 783: 779: 775: 771: 762: 752: 740: 735: 726: 725: 719: 717: 710: 708: 706: 702: 697: 694: 689: 687: 683: 679: 675: 671: 664: 662: 658: 656: 652: 648: 644: 643:graphics card 640: 636: 632: 626: 618: 616: 614: 610: 609:anti-aliasing 602: 600: 590: 588: 586: 582: 578: 574: 570: 566: 562: 558: 550: 548: 546: 542: 538: 534: 526: 519: 516: 513: 512: 508: 505: 502: 501: 497: 494: 491: 490: 486: 483: 480: 479: 475: 472: 469: 468: 464: 461: 458: 457: 451: 449: 445: 441: 437: 433: 426: 418: 416: 413: 405: 403: 397: 394:OSI Layer 2: 393: 391: 387: 383: 379: 376:OSI Layer 3: 375: 372: 368: 365:OSI Layer 4: 364: 362: 358: 355:OSI Layer 5: 354: 352: 348: 344: 340: 336: 332: 329:OSI Layer 7: 328: 327: 326: 324: 319: 317: 311: 309: 305: 301: 292: 290: 288: 284: 280: 276: 274: 270: 262: 260: 257: 252: 249: 245: 241: 238: 233: 231: 227: 221: 216: 214: 209: 207: 202: 200: 197: 193: 188: 186: 182: 178: 173: 171: 167: 163: 158: 156: 152: 148: 144: 140: 139:web analytics 136: 125: 113: 108: 99: 98: 92: 90: 88: 84: 80: 76: 72: 68: 64: 60: 56: 51: 49: 45: 41: 37: 33: 19: 2633:Panopticlick 2616:. Retrieved 2612: 2594:. Retrieved 2582: 2569: 2549:(36): 36–41. 2546: 2542: 2532: 2524:the original 2519: 2509: 2497:. Retrieved 2483: 2452: 2445: 2431: 2420:. Retrieved 2411: 2404: 2393:. Retrieved 2387: 2377: 2350: 2344: 2317: 2311: 2284: 2278: 2269: 2265: 2259: 2232: 2226: 2212: 2201:. Retrieved 2195: 2156: 2112: 2092:. Retrieved 2077: 2070: 2043: 2037: 2010: 1991:, retrieved 1983: 1976: 1966:, retrieved 1957: 1950: 1923: 1887: 1851: 1825: 1817:"User-Agent" 1811: 1799:. Retrieved 1786: 1775:. Retrieved 1768:the original 1755: 1744:. Retrieved 1737:the original 1724: 1713:. Retrieved 1693: 1660: 1654: 1640: 1629:. Retrieved 1620: 1606: 1595:. Retrieved 1586: 1575:. Retrieved 1569: 1560: 1549:. Retrieved 1535: 1523:. Retrieved 1482: 1461:, retrieved 1453: 1430:. Retrieved 1398:. Retrieved 1386: 1373: 1362:. Retrieved 1358: 1349: 1338:. Retrieved 1309:. Retrieved 1295: 1284:. Retrieved 1270: 1241: 1171: 1125: 1105:. Retrieved 1091: 1080:. Retrieved 1066: 1055:. Retrieved 1049: 1009: 1003: 992:. Retrieved 971: 952: 929:Web tracking 887: 867: 854: 844: 831: 825: 790: 767: 746: 738: 714: 698: 691:Specialized 690: 668: 659: 628: 613:font hinting 606: 603:Font metrics 594: 554: 530: 428: 409: 400: 320: 312: 296: 285: 281: 277: 266: 255: 253: 248:macOS Mojave 234: 225: 217: 210: 203: 189: 174: 159: 132: 119: 111: 77:or targeted 52: 43: 35: 31: 29: 2643:Am I Unique 2272:(6): 66–74. 1521:. MediaPost 874:ad blockers 835:windowboxed 827:Tor Browser 791:As of 2017 780:rendering, 774:web browser 569:screen size 541:Adobe Flash 390:IEEE 802.11 300:MAC address 164:showed how 147:click fraud 143:web traffic 135:web browser 89:advocates. 48:web browser 2653:Categories 2618:2022-02-09 2596:2018-07-10 2422:2020-01-21 2395:2022-06-10 2203:2020-01-21 2166:1703.05066 2094:2020-01-21 1993:2020-01-21 1968:2020-01-21 1777:2010-01-28 1746:2010-01-28 1715:2010-01-28 1631:2018-07-06 1597:2018-07-06 1577:2018-07-06 1551:2020-01-30 1463:2020-01-21 1432:2020-01-30 1427:ProPublica 1364:2018-07-07 1340:2010-01-28 1311:2010-01-28 1286:2010-01-28 1107:2016-07-05 1082:2015-10-03 1057:2020-01-30 994:2017-02-28 935:References 914:Evercookie 850:user agent 817:Opera Mini 749:March 2020 581:JavaScript 533:extensions 444:JavaScript 170:clock skew 122:March 2020 63:IP address 2635:, by the 2591:0099-9660 2499:August 9, 1215:1211.4812 860:in 2020. 323:OSI model 271:value of 237:WWDC 2018 175:In 2010, 2613:BlackHat 2494:PC World 1706:Archived 1525:July 21, 1419:Angwin J 1391:Archived 1334:Archived 1305:Archived 1280:Archived 1101:Archived 1076:Archived 985:Archived 893:See also 870:NoScript 846:Spoofing 811:. Among 682:CPU time 597::visited 520:ignored 517:ignored 509:allowed 506:allowed 498:ignored 495:ignored 487:no data 484:no data 476:allowed 473:allowed 269:forensic 79:exploits 1801:27 July 1546:Gizmodo 1387:eff.org 1359:eff.org 797:Firefox 739:updated 537:plugins 361:NetBIOS 347:TLS/SSL 287:Entropy 220:Firefox 213:AddThis 181:entropy 112:updated 93:History 2589:  2471:  2365:  2332:  2299:  2247:  2173:  2127:  2085:  2058:  2025:  1938:  1902:  1866:  1571:GitHub 1497:  1400:13 Apr 1258:  1186:  1150:  1051:Forbes 1024:  959:  809:Safari 807:, and 705:vendor 674:AES-NI 575:, and 503:Opera 343:Telnet 244:Safari 133:Basic 2609:(PDF) 2457:(PDF) 2416:(PDF) 2389:ZDNet 2161:arXiv 1988:(PDF) 1962:(PDF) 1796:(PDF) 1771:(PDF) 1764:(PDF) 1740:(PDF) 1733:(PDF) 1709:(PDF) 1702:(PDF) 1458:(PDF) 1394:(PDF) 1383:(PDF) 1210:arXiv 988:(PDF) 981:(PDF) 782:WebGL 651:fonts 645:, or 635:WebGL 561:model 436:HTML5 369:(see 240:Apple 206:Alexa 196:HTML5 57:(and 2587:ISSN 2501:2014 2469:ISBN 2363:ISBN 2330:ISBN 2297:ISBN 2245:ISBN 2171:ISBN 2125:ISBN 2083:ISBN 2056:ISBN 2023:ISBN 1936:ISBN 1900:ISBN 1864:ISBN 1803:2021 1527:2014 1495:ISBN 1402:2016 1256:ISBN 1184:ISBN 1148:ISBN 1022:ISBN 957:ISBN 799:and 693:APIs 611:and 545:Java 543:and 442:and 386:ICMP 382:IPv6 378:IPv4 357:SNMP 351:DHCP 339:HTTP 302:and 69:and 42:. A 2520:BGR 2461:doi 2355:doi 2322:doi 2289:doi 2237:doi 2117:doi 2048:doi 2015:doi 1928:doi 1892:doi 1856:doi 1679:hdl 1669:doi 1487:doi 1246:doi 1176:doi 1138:hdl 1130:doi 1014:doi 880:). 676:or 655:CPU 585:CSS 535:or 440:CSS 396:CDP 367:TCP 335:FTP 331:SMB 246:on 235:At 166:TCP 34:or 2655:: 2611:. 2585:. 2581:. 2568:. 2545:. 2541:. 2518:. 2492:. 2467:. 2386:. 2361:. 2328:. 2295:. 2270:18 2268:. 2243:. 2185:^ 2169:. 2139:^ 2123:. 2103:^ 2054:. 2021:. 2001:^ 1934:. 1914:^ 1898:. 1878:^ 1862:. 1840:^ 1704:. 1677:. 1667:. 1663:. 1568:. 1544:. 1509:^ 1493:. 1471:^ 1441:^ 1425:. 1410:^ 1385:. 1357:. 1320:^ 1254:. 1224:^ 1198:^ 1182:. 1162:^ 1146:. 1136:. 1116:^ 1048:. 1036:^ 1020:. 983:. 943:^ 803:, 788:. 688:. 641:, 571:, 567:, 438:, 388:, 384:, 380:, 359:, 349:, 345:, 341:, 337:, 333:, 318:. 275:. 232:. 30:A 2621:. 2599:. 2572:. 2547:1 2503:. 2477:. 2463:: 2425:. 2398:. 2371:. 2357:: 2338:. 2324:: 2305:. 2291:: 2253:. 2239:: 2206:. 2179:. 2163:: 2133:. 2119:: 2097:. 2064:. 2050:: 2031:. 2017:: 1944:. 1930:: 1908:. 1894:: 1872:. 1858:: 1834:. 1805:. 1780:. 1749:. 1718:. 1687:. 1681:: 1671:: 1648:. 1634:. 1614:. 1600:. 1580:. 1554:. 1529:. 1503:. 1489:: 1435:. 1404:. 1367:. 1343:. 1314:. 1289:. 1264:. 1248:: 1218:. 1212:: 1192:. 1178:: 1156:. 1140:: 1132:: 1110:. 1085:. 1060:. 1030:. 1016:: 997:. 965:. 751:) 747:( 741:. 373:) 124:) 120:( 114:. 20:)

Index

Browser fingerprint
fingerprinting algorithm
web browser
persistent cookies
zombie cookies
IP address
identity theft
credit card fraud
targeted advertising
exploits
avoid tracking
internet privacy
web browser
web analytics
web traffic
click fraud
client-side scripting
computer security
University of California, San Diego
TCP
clock skew
Electronic Frontier Foundation
entropy
canvas fingerprinting
University of California, San Diego
HTML5
canvas element
Alexa
AddThis
Firefox

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.