Browser Fingerprinting: What It Is and How to Protect Yourself
Browser fingerprinting tracks you without cookies using canvas rendering, WebGL, fonts, and dozens of other signals. Learn how it works, how a VPN helps, and what additional tools you need.

What is browser fingerprinting?
When you visit a website, your browser reveals dozens of technical details: your screen resolution, installed fonts, time zone, language settings, hardware concurrency, and more. Individually these are mundane, but combined they form a 'fingerprint' that is often unique enough to identify you across sites -- even if you clear cookies, use private browsing mode, or switch IP addresses. Unlike cookies, fingerprinting leaves nothing on your device and cannot be deleted.
Canvas and WebGL fingerprinting
Two of the most powerful fingerprinting techniques exploit your GPU. Canvas fingerprinting draws invisible graphics using the HTML5 canvas element and reads back the pixel data. Because different GPU and driver combinations render the same instructions slightly differently, the resulting image is nearly unique to your device. WebGL fingerprinting works similarly, querying your graphics hardware for renderer and vendor strings, and rendering 3D scenes to extract subtle hardware differences. Together, canvas and WebGL data alone can identify a device with very high accuracy.
Other signals trackers collect
- User agent string (browser name, version, OS)
- Screen resolution and color depth
- Installed system fonts (queried via CSS or JavaScript)
- Audio context characteristics (AudioContext fingerprint)
- Battery level and charging status (where available)
- Timezone and locale settings
- Do Not Track header and cookie preferences
- Network connection type and speed hints
How a VPN helps -- and where it falls short
A VPN hides your IP address, which removes one important data point that trackers use to link sessions and identify your approximate location. This is meaningful -- IP-based tracking is common and your real IP can reveal your ISP, city, and sometimes even your street. However, a VPN does nothing to change the browser signals that make up your fingerprint. If your canvas rendering, font list, and screen resolution are unique, you are still identifiable even with a different IP address.
Additional tools and practices that help
To meaningfully reduce fingerprinting, you need tools that target the browser layer directly. The Tor Browser randomizes or normalizes many fingerprinting vectors by design, giving all users a near-identical profile. Firefox with the privacy.resistFingerprinting setting enabled does the same. Browser extensions like uBlock Origin reduce the number of third-party scripts that can run fingerprinting code. Brave's built-in fingerprint randomization adds noise to canvas and WebGL outputs so that each session returns slightly different data. Using any of these alongside Nexun creates a much stronger privacy setup.
Cookie consent and fingerprinting: the legal grey area
In most EU jurisdictions, fingerprinting used for tracking purposes requires the same legal basis as cookies -- typically explicit consent under the ePrivacy Directive. Many sites attempt to fingerprint users without consent or use it as a fallback when cookies are rejected, which is illegal under GDPR and ePrivacy rules. The UK ICO, Ireland's DPC, and multiple national regulators have issued guidance confirming this. Knowing your rights matters: you can reject tracking-based fingerprinting just as you can reject tracking cookies.
FAQ
Can I stop browser fingerprinting completely?
Complete prevention is very difficult because fingerprinting uses browser features that are necessary for normal web functionality. The most effective approach is to blend in rather than block -- tools like Tor Browser and Firefox with resistFingerprinting make your browser look the same as thousands of other users, making your fingerprint useless for tracking. Combining this with Nexun to mask your IP gives you strong practical privacy.
Does using a VPN change my browser fingerprint?
No, a VPN only changes your IP address and can mask your approximate location. Your browser fingerprint -- the combination of canvas rendering, fonts, screen resolution, timezone, and other signals -- stays the same regardless of VPN use. This is why combining a VPN with browser-level privacy tools gives better results than either approach alone.
Is browser fingerprinting legal?
In the EU, fingerprinting for tracking purposes requires a valid legal basis under GDPR and the ePrivacy Directive -- the same rules that govern tracking cookies. Without explicit user consent, tracking via fingerprinting is illegal. Some first-party uses (like fraud detection or security) may be allowed under legitimate interests, but third-party cross-site tracking without consent is clearly prohibited. Many websites currently do it anyway, which is why regulators across Europe have been increasing enforcement.