How to get rid of device fingerprints

Fingerprint scanner on yellow background

The internet is a scary place and your personal data can be very valuable to unscrupulous marketing companies that want to harvest your information to serve you targeted ads.

Although VPNs encrypt your traffic, they can't stop websites from tracking your activities through clickbait ads and cookies. Fortunately, most major browsers support extensions that can block harmful links and prevent unnecessary cookies from being downloaded onto your device.

If you don't already have one of these extensions, take a look at our guide to the best ad-blockers of 2023. You can also check the settings of your web browser to make sure your cookie settings are configured to respect your privacy.

While using a VPN, browser extensions, and making sure your web browser settings are configured for privacy are good steps towards anonymity, unfortunately, they cannot stop you from being tracked completely. Your device fingerprints might still be giving you away.

What are device fingerprints?

 

Device fingerprinting, sometimes known as machine fingerprinting, is the process of collecting information about the software and hardware on a device in order to identify it from others. This isn't always done for sinister reasons. For instance, a software licence may only allow you to install software on one computer and unfortunately that computer required a system reset. In this case, the developer can use a special fingerprinting algorithm based on your machine's specifications to make sure it's the same one you used last time, allowing you to install the software again.

Unfortunately, fingerprinting can be exploited to identify your device in scenarios that you don't want to be identified. In recent years browser fingerprinting has become very sophisticated and the implications are very scary. You can be using a reliable VPN, an ad-blocker, have antivirus installed, and even be using your browser in incognito mode but you can still be identified.

A lot of the time it's your web browser that sells you out. Each time your web browser requests to load a page from the internet, it sends a header detailing which operating system and web browser you're using. This way, sites can more efficiently send the information needed for you to view the web page. Sometimes these headers also contain information about the type of device you're using. This in itself isn't much to go on but this is just one example of a device fingerprint that might be making your device more identifiable.

Untrustworthy websites can also use Javascript to find out even more information about you. Like what browser extensions you’re using, your monitor size, resolution, your time zone, system language and so on.  

Some sites even go as far as using a technique called canvas fingerprinting, which uses HTML5 to insert invisible text onto your page. When your device processes the text, the time your machine took to render the image can be used to find out the exact model of GPU you're using. A similar technique called WebGL fingerprinting can also be used to identify your GPU and single it out from others as each GPU will perform ever so slightly differently.

Sometimes a tracker will even play a very short sound and then analyse it through audio fingerprinting, as each web browser manages and plays sounds slightly differently.

So you can find out how easily your device can be singled out from others, the Electronic Frontier Foundation have created the Cover your Tracks online test. If you are concerned that you can still easily be tracked online and you want to make yourself more anonymous, you can try some of these techniques to help you cover your tracks.

Use a common web browser

If you're using a particularly unusual type of browser, you're more likely to have a unique fingerprint. Consider using one of the major players like Mozilla Firefox, Google Chrome or Microsoft Edge.

The Tor Browser was one of the very first browsers to be specifically designed to resist browser fingerprinting. The developers do their best to make sure the browser fingerprint is the same for all Tor users. Some of the data sent in headers is fake so that no matter what operating system you're using, you'll always appear to be using Windows. This OS was chosen because it's the OS most commonly used around the globe. The Tor Browser can also block WebGL and Canvasing tools, and uses the NoScript extension to disable Javascript. 

Disable Javascript

A lot of the information that can be used to fingerprint your device is gathered through trackers running Javascript code in your browser. You can disable Javascript altogether in all major browsers but this may prevent some legitimate sites from loading properly. Instead you can consider using a browser extension like NoScript, which blocks Javascript by default but lets you enable it for specific sites. 

fingerprint

(Image credit: ar130405 from Pixabay)

Use CanvasBlocker

Given that browser extensions are one of the ways you can be identified, you may wonder why we recommend installing another. We recommend CanvasBlocker as it has some great features which can prevent you from being fingerprinted from Canvas and WebGL methods mentioned above. It can also protect you from more sophisticated fingerprinting techniques like playing sounds and detecting your screen resolution. The extension is available for all major browsers like Chrome, Edge, and Firefox.

Use your smartphone more

Believe it or not mobile devices are actually harder to fingerprint. They're less configurable and support fewer extensions. This means that people use more identical browsers on their smartphones making them harder to identify through browser fingerprinting.

Stay encrypted

Trackers sometimes use supercookies to identify your device. These are inserted into your network by your ISP. They're not stored on your machine, so you can't detect or remove them. They also can't be blocked via AdBlockers. The only way to stop them giving you away is to make sure that your header information remains encrypted. 

Don't give yourself away

Although device fingerprinting has some legitimate uses, it's most often used by bad actors to track your online browsing activities. There's no need for them to have your personal data, particularly as they never asked permission to gather it.  

Adam Marshall

Adam was formerly the Content Director of Subscriptions and Services at Future, meaning that he oversaw many of the articles TechRadar produces about antivirus software, VPN, TV streaming, broadband and mobile phone contracts - from buying guides and deals news, to industry interest pieces and reviews. Adam has now dusted off his keyboard to write articles for the likes of TechRadar, T3 and Tom's Guide.

Read more
Abstract illustration of a young woman looking at a smartphone, as large eyes peek through from her hair
Want to hit restart on your online presence? Here's 5 tools you need to stay truly private online
Dozens of chocolate cookie biscuits floating on a light pink background
How to prevent data collection (and kick unwanted cookies to the curb)
Fingerprint
Profit over privacy? Google gives advertisers more personal info in major ‘fingerprinting’ U-turn
Digital hand set location on map with two pins. AI technology in GPs, innovation delivery, map location, future transport logistic, route path concept. GPs point. New office location, change address
What does your IP address reveal about you?
Abstract winter forest design with glowing pine trees on dark starry background
Season's cyber-cleanings: how to tidy up your digital footprint
Young woman holds a smartphone with a beam of light obscuring her eyes
Privacy powerhouses: 5 apps to take your online security to the next level
Latest in Security
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Lock on Laptop Screen
Medusa ransomware is able to disable anti-malware tools, so be on your guard
An abstract image of digital security.
Fake file converters are stealing info, pushing ransomware, FBI warns
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Coinbase targeted after recent Github attacks
hacker.jpeg
Key trusted Microsoft platform exploited to enable malware, experts warn
IBM office logo
IBM to provide platform for flagship cyber skills programme for girls
Latest in News
Girl wearing Meta Quest 3 headset interacting with a jungle playset
Latest Meta Quest 3 software beta teases a major design overhaul and VR screen sharing – and I need these updates now
Microsoft
"Another pair of eyes" - Microsoft launches all-new Security Copilot Agents to give security teams the upper hand
Hatch Restore 3 in Putty
You can finally start your day with The Office theme song, and I couldn't be more excited
Cassian Andor looking nervously over his shoulder in Andor season 2
New Andor season 2 trailer has got Star Wars fans asking the same question – and it includes an ominous call back to Rogue One's official teaser
Ncuti Gatwa as The Fifteenth Doctor in Doctor Who
Disney+ drops new trailer for Doctor Who season 2 that promises an epic adventure across time and space
23andMe
23andMe is bankrupt and about to sell your DNA, here's how to stop that from happening