How to Check if Websites Are Tracking Your Browser Fingerprint
Patrick Bushe
November 5, 2025 · 5 min read
Testing your fingerprint takes two minutes
Before you do anything about browser fingerprinting, it's worth measuring how exposed you currently are. The results might surprise you.
The best testing tools
EFF's Cover Your Tracks (coveryourtracks.eff.org): The gold standard for fingerprint testing. Tests your browser against a database of real fingerprints and tells you whether yours is unique or how many users share your configuration. Also shows which specific signals are most identifying.
BrowserLeaks.com: A comprehensive collection of individual fingerprint tests — canvas, WebGL, audio, fonts, and dozens more. Good for understanding which specific attributes are contributing to your fingerprint.
Fingerprint.com/demo: Demonstrates commercial-grade fingerprinting. Shows you a persistent ID assigned to your browser that persists across page refreshes and (usually) incognito mode.
amiunique.am: Tracks your browser's fingerprint over time and shows how it changes after software updates.
What the results mean
Cover Your Tracks will tell you your browser is either:
- **Uniquely identifiable**: Your exact configuration matches no other browser in their database
- **Nearly unique**: Only a handful of browsers share your fingerprint
- **Common**: Your fingerprint matches many others and provides weak identification
For context: most standard Chrome installs on consumer hardware score as uniquely identifiable or nearly unique. The combination of your specific font set, screen size, GPU, and OS version is specific enough to identify you.
Which signals matter most
From BrowserLeaks and research data, the highest-entropy signals (those that vary most between users and are therefore most identifying) are:
1. Canvas fingerprint — the pixel output of a test render, unique to your GPU + driver + OS combination
2. Font list — which fonts are installed on your system
3. WebGL renderer — your exact GPU model and driver version string
4. Audio context — differences in your hardware audio processing
5. Screen resolution + color depth — common values are less identifying; unusual resolutions are more so
What a "good" result looks like
You want to see: "Your browser has a randomized or generic fingerprint shared by many users."
Brave Browser achieves this reasonably well out of the box by normalizing canvas output and other signals. Tor Browser achieves it by making all Tor users look identical.
For Chrome users, a fingerprint protection extension is necessary because Chrome does not normalize these signals natively.
Using Ghost Browser to improve your score
Ghost Browser is a Chrome extension that spoofs the identifying signals in your browser fingerprint. Install it from the Chrome Web Store and run the Cover Your Tracks test again.
With Ghost Browser active, the canvas fingerprint changes. The WebGL renderer string changes. The navigator properties report different values. Your fingerprint becomes a moving target rather than a stable identifier.
The goal isn't to score perfectly on every test — some signals are hard to fully spoof without breaking site functionality. The goal is to raise the entropy of your real signals enough that you're no longer uniquely identifiable.
Run the tests periodically after browser updates. Chrome updates often change which signals are exposed and how. A fingerprint configuration that provided good protection last month might need adjustment after a major Chrome release.
Conclusion
Testing your fingerprint takes two minutes and gives you concrete data about your actual tracking exposure. Run the tests, understand the results, and then use Ghost Browser to address the highest-entropy signals. Measuring before and after shows you exactly what the extension is doing.