everything a tracker knows about you · no cookies needed · runs locally
Tracking vector: your GPU, OS fonts, and rendering engine produce a pixel-unique image even from identical drawing instructions. Trackers hash this image silently.
Tracking vector: your GPU make, model, and driver version are exposed via WebGL. Combined with the canvas render, this fingerprints the exact hardware you're running.
Tracking vector: different hardware and OS audio stacks produce microscopically different floating-point outputs from identical audio processing. No microphone is accessed — this uses offline synthesis only.
Tracking vector: installed fonts are one of the strongest fingerprinting signals. Your OS ships with a predictable set; every additional installed app adds more. Fonts are probed by measuring canvas text width — no API access needed.
Tracking vector: screen resolution, pixel density, CPU core count, and available memory narrow you down to a specific device model class. Combined with OS platform, this rules out most users immediately.
Tracking vector: browser settings create a surprisingly unique profile. Note the irony of Do Not Track — enabling it makes you more identifiable because only a small percentage of browsers send that header.
Tracking vector: Chrome's incognito mode caps the storage quota to ~120 MB. By checking this limit, a page can guess with reasonable accuracy whether you're in a private window — without any browser-specific APIs.
Tracking vector: WebRTC forces the browser to expose local network IP addresses even behind a VPN. This can reveal your real subnet, identify home vs. office networks, and bypass anonymization tools.