Your browser fingerprint

This page will allow you to see your browser fingerprint. Have no fear, no information will be stored or cached to perform this and any data that has been displayed remains entirely your own. No third party systems are used to store the information, all code resources come from Clientjs.org.

Below is a table that displays many data elements that are available via your browser fingerprint stored within the browser itself. Many of these may lack meaning to you or may be irrelevant to your device, notably the ‘Is Java Available?’ records and others like it. However, notable elements such as the screen resolution and the operating system are always relevant and identifying in a way.

If there is any confusion on the content of the table, a key has been provided below to clarify any misconceptions or confusion. The information gathered is best considered as a game of ‘Who’s Who’, each data element, when used in combination with the others, builds a unique (most of the time) fingerprint of the user and device. This only happens most of the time as in some cases the fingerprint will not be unique.

 

NOTE: ANY AND ALL INFORMATION DISPLAYED WAS GATHERED LEGALLY AND RETRIEVED FROM YOUR BROWSER. THIS IS ALL READILY ACCESSBILE INFORMATION THAT REQUIRED NOTHING MORE THAN PUBLICLY AVAILABLE APIS FROM VARIOUS SOURCES.

NOTE 2:  THE LOCATIONAL DATA (LAT, LONG, AND MAP) MAY BE INCORRECT OR INACCURATE. THIS IS DUE TO THE SERVER CENTER YOUR ISP IS LOCATED AT AND THEREFORE SHOULD NOT BE TAKEN AS GOSPEL.

 

Metric Value
Browser Fingerprint
Browser UserAgent
Browser Name
Engine Details
Operating System
CPU Details
Screen Details
Plugins installed
Is Java available?
Is Flash available?
Is Silverlight available?
Currently available Fonts
Time zone
Browser Language
Canvas image
IP Address

Where are you?


Lat: , Lng: ,

Key

Here you can see the definitions of all of the above data elements, as well as their uses and applications in practice.

Metric Definition Application
Browser Fingerprint This is the identifier assigned to your browser fingerprint, this number can be either unique or not. The more unique a fingerprint is, the worse privacy this user will have as the fingerprint can be beter used to identify you if it is 100% unique. This has no further application other than being an identifier for your particualr fingerprint
Browser UserAgent This is a list of information that a web server will use to identify the software and device a user is using to connect to the website. In order of display, the UserAgent displays the Mozilla compatible token (Mozilla/5.0) which almost all browsers today return this (a legacy feature). The platform (returning either Windows, Mac, Linux etc) that the browser is running on. The WebKit currently being run (the rendering engine used by your web browser) and its version. The gecko version or likewise software is next (in more recent browsers this can be the same as firefoxversion). Finally the browser in use and the version of said browser. The UserAgent can be used as a culmination of all identifying information in regards to your browser and its version(s). When used for more nefarious purposes, this can be used to identify the version of browsers or rendering engines and any vulnerabiltities that may exist in these versions.
Browser Name The browser name is the browser software in use (Chrome, Firefox, Safari etc). The version number is also displayed here in brackets. A Singular data element once again, to see the browser and version in use, alone without the rest of UserAgent data.
Engine This is the rendering engine and its current in use version that is used by the browser. A Singular data element once again, to see the engine and version in use, alone without the rest of UserAgent data.
Operating System Displays the Operating system and working version (i.e. Windows 10) of the current device the browser is being run on. This is useful to webservers as it allows the correct software or formatting to be used, alongside the system colours or theme (if default is in use).
CPU The central processing unit is displayed here, this will not display the full name but will display the CPU architecure/class (i.e. amd64) This indicates the current CPU in use, an attacker may be able to use this if a particular vulnerability exists to target a user once they have acquired the browser fingerprint.
Screen Details This is a variety of information on the current screen status, including the colour depth being used, and the resolution of the monitor/screen. The X/YDPI refers to the horizontal (X) and vertical (Y) Dots Per Inch, a measurement of the amount printed dots contaiend within one inch of an image printed. This has no application other than allowing websites to see the maximum size to display their site on (for your particular monitor). The available resolution refers to the maximum available resolution for that perticular monitor.
Plugins Installed This is a list of all installed plugins, this will also display default plugins used by the browser. Examples of default plugins are Chrome PDF plugin and Native Client. This has an application for attackers, with this the plugins in use (and therefore any vulnerabilties) are visible, making the user a target.
Is Java Available? Java within browsers is being phased out and as such, is mainly used for legacy or historical applications. It is a server-side language that is used for back-end development projects. Java now has no purpose other than providing additional information within a browser fingerprint.
Is Flash Available? Flash is a software that allows browsers to display multimedia and graphical content. It is currently being phased out by Adobe, its developer. Adobe discontinued Flash on January 12, 2021 and no longer provides it on their site. Chrome and other major browsers are now blocking Flash from running. Its final version was released on December 8, 2020.
Is Silverlight Available? This is a Microsoft developed application that is used to write and run rich web applications (including multimedia). While no longer in use by a majority of browsers, a small number still have it as an available plugin. This is a deprecated plugin that is no longer in further development. Its final version released Januray 15, 2019.
Currently available Fonts This is a list of fonts currently active on the device, this list is comprehensive and can display custom, default, and other fonts. The list can be relatively identifying as users can be seen by the fonts they have, this is particularly identifying if a user has created or edited a font that only they use.
Time Zone Simply the time zone of the device the browser is on. This can be used to tell a users time zone and therefore the rough period within the day (or night). Effective for intrusive services such as call centers or phone scammers.
Browser Language This is the language the browser is displayed in and generally comes from the system language (unless the browser language has been otherwise specified within the settings). This is used by webservers to know what language to display the website in.
Canvas image This is a HTML5 API that draws graphics and animations on the page of a website, this is carried out via JavaScript. The technique works by creating an image (this may be the same on all machines that use this service), the important information here isn't the iamge specifically but rather the various processes the image went through to be created. ALl web browsers use different engines for processing, exporting images, and different levels of image compression, all these different processes and engines form a unique (or not) DNA of the web browser and displays it as a base64 code on the back end, which generates a canvas image as displayed within the cancas image table record. This allows further information to be provided within the browser fingerprint, creating a more unique and identifying fingerprint. It is also used for online tracking purposes.
Where are you? This section uses the latitude and longitude of the IP address, stored within the browser, to locate the general location of the exit point of the network. This can allow attackers to have knowledge of the general location of either a user's address or the address of the center responsible for the ISP connection.