Your Web browser's fingerprints can betray you, study finds

Test reveals that unique browser configurations can allow tracking without the use of cookies

Browsers have fingerprints, too, which means that Web sites could be able to identify and track visitors even without the use of cookies or super cookies, according to a recent study by the Electronic Frontier Foundation.

EFF set up a test site for what it calls its Panopticlick project and invited people to take part. Of the 470,161 visitors who did, 83.6 percent of the browsers had a unique fingerprint, EFF’s report said. And 94.2 percent of the browsers with Flash or Java installed were identified as unique.

The test collected information on visiting browsers – such as type of browser, operating system, screen resolution, browser plug-ins and system fonts – and compared them to EFF’s extensive list of configurations. Browsers with Java installed make it easier to identify such things as screen resolutions and Flash can give up the system fonts, which is why those browsers were easier to identify. Taken together, the configurations often add up to a unique fingerprint that could identify the browser when it visits another site.

“In general, modern desktop browsers fare very poorly,” in terms of protecting privacy, the report said.

The browsers that were the least unique, and therefore the most difficult to identify, were those with JavaScript disabled, those using TorButton (an add-on that protects privacy), and iPhone and Android browsers, which the report said are more uniform than other browsers. However, iPhone and Android browsers don’t have good cookie control, so those users are subject to tracking anyway, the report said.

The idea of browser fingerprints isn’t new, but report puts a number on how many browsers are could be tracked without cookies. And although it’s uncertain whether many Web sites are using fingerprinting to track visitors, some banking, e-commerce and social Web sites have been using this kind of tracking in incidents of suspected fraud.

At any rate, the study shows that users are not as anonymous as they might have thought, even if they’re careful about blocking cookies.

“Policy-makers should start treating fingerprintable records as potentially personally identifiable,” the EFF reported concluded, “and set limits on the durations for which they can be associated with identities and sensitive logs like clickstreams and search terms.”

About the Author

Kevin McCaney is a former editor of Defense Systems and GCN.


  • Government Innovation Awards
    Government Innovation Awards -

    Congratulations to the 2020 Rising Stars

    These early-career leaders already are having an outsized impact on government IT.

  • Cybersecurity
    cybersecurity (Rawpixel/

    CMMC clears key regulatory hurdle

    The White House approved an interim rule to mandate defense contractors prove they adhere to existing cybersecurity standards from the National Institute of Standards and Technology.

Stay Connected