Browser fingerprinting

  • DNS Benchmark v2 is Finished and Available!
    Guest:
    That's right. It took an entire year, but the result far more accurate and feature laden than we originally planned. The world now has a universal, multi-protocol, super-accurate, DNS resolver performance-measuring tool. This major second version is not free. But the deal is, purchase it once for $9.95 and you own it — and it's entire future — without ever being asked to pay anything more. For an overview list of features and more, please see The DNS Benchmark page at GRC. If you decide to make it your own, thanks in advance. It's a piece of work I'm proud to offer for sale. And if you should have any questions, many of the people who have been using and testing it throughout the past year often hang out here.
    /Steve.
  • Be sure to checkout “Tips & Tricks”
    Dear Guest Visitor → Once you register and log-in please checkout the “Tips & Tricks” page for some very handy tips!

    /Steve.
  • BootAble – FreeDOS boot testing freeware

    To obtain direct, low-level access to a system's mass storage drives, SpinRite runs under a GRC-customized version of FreeDOS which has been modified to add compatibility with all file systems. In order to run SpinRite it must first be possible to boot FreeDOS.

    GRC's “BootAble” freeware allows anyone to easily create BIOS-bootable media in order to workout and confirm the details of getting a machine to boot FreeDOS through a BIOS. Once the means of doing that has been determined, the media created by SpinRite can be booted and run in the same way.

    The participants here, who have taken the time to share their knowledge and experience, their successes and some frustrations with booting their computers into FreeDOS, have created a valuable knowledgebase which will benefit everyone who follows.

    You may click on the image to the right to obtain your own copy of BootAble. Then use the knowledge and experience documented here to boot your computer(s) into FreeDOS. And please do not hesitate to ask questions – nowhere else can better answers be found.

    (You may permanently close this reminder with the 'X' in the upper right.)

a viewer

Well-known member
Sep 30, 2020
105
19
In sn, https://coveryourtracks.eff.org was mentioned, and about the impossibility of hiding your browser. Though it is Whac-A-Mole game trying solve this, that probably is the wrong game. You can't hide anymore, and the egregious abuse by meta proved this. However, you can try to confuse things by changing the info you give every time. Found a plugin (isn't there a plug in for everything?) that does this.

Fingerprint bypass did a very good job removing all the direct identifiers. So good that it broke some sites. Actually there are 2 (only tried one), but not sure which i used since i removed it. Then I found that that canvasblocker along with Font Fingerprint Defender do a good job at obfuscating many of your unique features.

Canvasblocker seems to have a bunch of config, so you might want to play with it. Also coveryourtracks amount of provided number of bits seems to be wrong. Regardless of the changes, it always showed at least 17.92 bits (which technically might be correct), but if you add the bits for each section usually don't add up
 
Found this site and had a duh moment. Doesn't matter if i can obfuscate the browser, if they have my ip
 
I've noticed that the cover your tracks bit counts don't add up either. I usually have 18 point something as my total, but by the time I have added up the first three or four scores I'm well over 18 with many more tests to go. Cant figure that one out????????
 
For serious defense against browser fingerprinting there is an iOS browser called Psylo. This is my summary of the app based on what I have read, I have not yet used it:

In June 2025 security firm Mysk introduced a new iOS browser called Psylo: Introducing Psylo - A New Kind of Private Web Browser by Talal Haj Bakry and Tommy Mysk. The app costs $8/month or $70/year as of August 6, 2025. I have not used it but after reading about it, it sounds more secure than a VPN, for websites visited in the browser. A VPN typically runs at the Operating System level however, so quite different.

Also different is that Mysk does not know who you are. You buy the Psylo through the Apple app store and Apple does not tell developers anything about who purchased the software. Mysk generates a random userid for their tracking purposes. There are no Psylo userids or passwords. In this way, they function much like Mullvad and IVPN. The random userid is all they know about you and the only tracking they do is of bandwidth (to prevent abuse of the system). Psylo is usable on multiple iOS devices, but they must all be associated with the same Apple account. A big selling point is browser tab isolation. Each tab is given a different public IP address on the Mysk Proxy Network. Like a VPN, data transmitted between the iOS device and their Proxy is encrypted. Unlike a VPN, it does not seem like you get to chose a proxy location. Also unlike a VPN, Mysk claims that they could not spy on you if they wanted to.

Browser tab isolation includes the expected separation of storage and cookies, and also includes defenses against browser fingerprinting. Mysk claims these defenses offer more privacy than a VPN even though both hide your public IP address. Psylo adjusts the browser's time zone and language to match the physical location of the proxy the tab is using. To see this protection in action, you need to use a VPN to connect to another country. They have a tester page at psylo.app/location that will show both the country of your VPN server and your actual country. I tested it on Windows 10 and it worked as advertised with Firefox, Chrome, Brave and Edge (see a screen shot). However, the Mullvad browser has its own defenses and the tester page was fooled into thinking I was in Iceland. But, there is no Mullvad browser for iOS. Mysk has been on the front lines of security, so I would consider them a trusted source.

More: Psylo browser tries to obscure digital fingerprints by giving every tab its own IP address by Thomas Claburn for The Register (June 24, 2025).