Websites Are Tracking You via Browser Fingerprinting

90 gnabgib 42 6/18/2025, 8:55:06 PM engineering.tamu.edu ↗

Comments (42)

legitster · 2h ago
As someone who works in this tech space, nobody brings up how long fingerprints persist. And the reality is that even a really precise fingerprint has a half-life of only a few days (especially if it's based on characteristics like window size or software versions).

A lot of the big ad networks right now instead rely heavily on geo-data. Which is why you are probably seeing lots of ads in your feeds that seemingly cross between devices or are relating to interests of your spouse/friends/etc. They just look at the geo on your IP and literally flood the zone.

> They developed a measurement framework called FPTrace, which assesses fingerprinting-based user tracking by analyzing how ad systems respond to changes in browser fingerprints.

I'm curious to know a bit more about their methodology. It's more likely to me that the ad networks are probably segmenting the ads based on device settings more than they are individually targeting based on fingerprints. For example, someone running new software versions on new hardware might be lumped into a hotter buyer category. Also, simple things like time of day have huge impacts on ad bidding, so knowing how they controlled would be everything.

glaucon · 1h ago
>As someone who works in this tech space, nobody brings up how long fingerprints persist. And the reality is that even a really precise fingerprint has a half-life of only a few days

I've just looked at my fingerprint and I'm told I'm unique (my mum always said that ;-) ).

Unfortunately it's impossible, using https://www.amiunique.org/fingerprint, to determine what elements of the fingerprint, if changed, would make me significantly non-unique but when I look down the list 16/58 javascript attributes are red (the lowest category of similarity ratio) and only two of those are overtly dependent on a version number, another six refer to screen size/resolution. It seems to me that leaves quite a lot of information which isn't going to change all the quickly.

While the precise value may change with time I feel like saying "has a half-life of only a few days" tends to understate the effectiveness of this technique.

ryukoposting · 18m ago
There are a few obvious ones I knew would be bad for me - the Linux user agent, for example. My canvas also came up unique and I'm betting Dark Reader had something to do with that.

But then there's other things that don't make any sense. How is "NVIDIA Corporation" only 0.74% for "WebGL Vendor?" Why does navigator.hardwareConcurrency even exist?

kul_ · 35m ago
> A lot of the big ad networks right now instead rely heavily on geo-data

How does this work in today's age where ISPs normally will have at least one level of NATing with ipv4. And given ipv6 with prefix delegation is still far away this should continue to be very imprecise?

djrj477dhsnv · 21m ago
> ISPs normally will have at least one level of NATing with ipv4.

I don't think that's generally true for home DSL/cable/fiber service. I've only seen it on mobile internet.

kulahan · 30m ago
Billboards are still among the most effective forms of advertising in terms of efficiency. You don’t need to be very close. I see myself popping up probably 10 miles from where I’m actually at, but the businesses aren’t that inaccessible.
fiddlerwoaroof · 33m ago
I’ve never had an unroutable IP in the US
cosmic_cheese · 2h ago
Wouldn’t things like iCloud Private Relay and other VPN-ish things throw a wrench into IP-geo-based tracking? Seems like it’d make the targeting so broad as to be useless.
ztetranz · 1h ago
As an aside, we just spent a couple of weeks camping in our RV with a cellular router connected to a VPN at home. Now that we're back home, Google maps (on a non-GPS equipped device) and Roku still think we're at the campground several states away. I guess my GPS equipped tablet reported the new location of our home IP address. On past experience, it takes about a week to reset.
lucasban · 1h ago
Conveniently for them, iCloud private relay only really impacts browser usage, third party apps are only impacted when using unencrypted connections, which is unlikely.
legitster · 1h ago
I don't know a lot about iCloud in particular, but in general there are not enough active VPN users to make a noticeable difference in tracking. By its nature ad tracking does not have to be super accurate in the aggregate to beat a wild guess.
DoctorOetker · 1h ago
> And the reality is that even a really precise fingerprint has a half-life of only a few days (especially if it's based on characteristics like window size or software versions).

I don't follow, consider hardware interrupts and their handling delays depending say on the combination of apps installed, the exact gpu driver version, etc ...

An occasional update could change the relevant timings, but would unlikely change all timing distributions (since perhaps the gpu driver wasn't updated, or the some other app wasn't)

minitech · 1h ago
> And the reality is that even a really precise fingerprint has a half-life of only a few days (especially if it's based on characteristics like window size or software versions).

A fingerprint that changes only by the increase of a browser version isn’t dead; it’s stronger.

legitster · 1h ago
I'm not sure if I understand this. If you show up on a website one day with one fingerprint, but on the next day it was a different fingerprint, there's no way to connect that it's the same device unless it wasn't a core trait of the fingerprint in the first place.
kemotep · 1h ago
If everything is the same but the browser version, a day later how is that not the same person?
soared · 3m ago
It doesn’t look like I can access the paper - does it list what ad networks, SSPS, DSPs, advertisers, etc they analyzed?
diggan · 2h ago
I guess we all knew this was happening, but it's hard to "prove" that they track you across devices without resorting to anecdotes. This seems to be a framework for performing studies + a large-scale study in order to get some more concrete proof that it is actually happening in practice, and the fingerprinting isn't just used for other things like anti-abuse.

> Prior studies only measured whether fingerprinting-related scripts are being run on the websites but that in itself does not necessarily mean that fingerprinting is being used for the privacy-invasive purpose of online tracking because fingerprinting might be deployed for the defensive purposes of bot/fraud detection and user authentication. [...] a framework to assess fingerprinting-based user tracking by analyzing ad changes from browser fingerprinting adjustments - https://dl.acm.org/doi/10.1145/3696410.3714548

Unfortunately I don't have access to the paper myself, so not sure what details they share beyond that.

disambiguation · 2h ago
https://www.amiunique.org/

> your browser shares a surprising amount of information, like your screen resolution, time zone, device model and more. When combined, these details create a “fingerprint” that’s often unique to your browser. Unlike cookies — which users can delete or block — fingerprinting is much harder to detect or prevent.

Ironically, the more fine tuned and hardened your device, OS, and browser are for security and privacy, the worse your fingerprint liability becomes.

more idle thoughts - it's strange and disappointing that in the vast space and history of FOSS tools, a proper open source browser never took off. I suppose monopolizing from the start was too lucrative to let it be free. Yet there really is little recourse for privacy enthusiasts. I've entertained the idea of using my own scraper, so I can access the web offline, though seems like more trouble than its worth.

ohso4 · 34m ago
> Ironically, the more fine tuned and hardened your device, OS, and browser are for security and privacy, the worse your fingerprint liability becomes.

1. You could (however, I doubt the effectiveness) use something like brave which tries to randomize your fingerprint.

2. You could "blend in with the crowd" and use tor.

ec109685 · 1h ago
In two separate private browser windows, I was identified as unique, so does that mean a fingerprint across private browser tabs would not work?
disambiguation · 15m ago
I think its matter of "least common denominator" as in the sum of all fields will surely be unique, but what's the _minimum_ number of fields needed to isolate one user? You can download the JSON from each test and compare the diffs yourself - there's a lot of noise from "cpt" and "ratio" fields, but some that stand out are "referer" and "cookie" fields as well as a few SSL attributes. Not sure if controlling for those is all it takes to de-anonymize, but either way it's not great.
jcranmer · 1h ago
> it's strange and disappointing that in the vast space and history of FOSS tools, a proper open source browser never took off.

What makes you disqualify Firefox from being a "proper open source browser"?

disambiguation · 43m ago
FOSS is a flexible term but carries the connotation of community ownership, and therefore independence from for-profit interests. That was an original selling point of FF, and to this day the user base is mainly comprised of individuals (who were at one point or another) seeking free and open alternatives. Sadly Mozilla as an organization has made increasingly user hostile decisions (deals with Google, recent changes in privacy policy, some telemetry on by default) and FF no longer lives up to the original promise. But yes, thanks to the code being open source there are off-shoots like LibreWolf and WaterFox that may be worthwhile (I haven't vetted them) but its the same dilemma as with chrome, the upstream code is captured and controlled by an organization that I don't trust to respect user privacy.
energywut · 9m ago
> FOSS is a flexible term but carries the connotation of community ownership, and therefore independence from for-profit interests.

That's certainly not true. Unless Red Hat, MongoDB, Chef, etc. are not open source.

While I love to believe that the FOSS world is an anarchist utopia that believes in wellbeing for all, I think there are plenty of profit driven people there. They just don't sell access to the code/software.

XorNot · 17m ago
This is just making better the enemy of best.

In reality people espouse this opinion then continue using Chrome or Chromium browsers.

disambiguation · 12m ago
see original comment:

> Yet there really is little recourse for privacy enthusiasts

bronson · 1h ago
Firefox never took off.
diggan · 1h ago
At one point, Firefox (3.5 specifically) was #1, for a brief moment:

> Between mid-December 2009 and February 2010, Firefox 3.5 was the most popular browser (when counting individual browser versions) according to StatCounter, and as of February 2010 was one of the top 3 browser versions according to Net Applications. Both milestones involved passing Internet Explorer 7, which previously held the No. 1 and No. 3 spots in popularity according to StatCounter and Net Applications, respectively - https://en.wikipedia.org/wiki/Firefox_3.5

Then Chrome appeared and flattened both IE and Firefox.

doublerabbit · 47m ago
lol, and I used neither. Opera all the way until...
GenerocUsername · 1h ago
Define taking off then. Everyone knows Firefox and some people even like it
halb · 3h ago
This is a problem because unlike cookies, that are tied to specific domains and isolated by security boundaries, fingerprints can be computed across any domain. It's easy to imagine how a website that tracks users and serves ads solely using fingerprints could be exploited to gain informations about a victim, simply by collecting their fingerprint.
ohso4 · 38m ago
check out https://coveryourtracks.eff.org

There really is no way to combat fingerprinting, other than using Tor on the "safest" mode. <- which disables javascript and some other stuff.

otherwise, you're fingerprintable.

also, check out https://demo.fingerprint.com/playground

jpalawaga · 1h ago
Has anyone made a plugin that forces your browser to resize slightly to help avoid fingerprinting? I feel like this is an annoyance I could tolerate, even if over the course of a day or two it causes me to resize it manually to something larger.
handsclean · 5m ago
Firefox has this built in, about:config privacy.resistFingerprinting.letterboxing. It was contributed upstream by Tor, and off by default in Firefox.

Edit: I think I misunderstood you, you’re looking for something that adds changing noise to the viewport size. Letterboxing isn’t that, but it is another, arguably better, approach to reducing the same fingerprinting vector.

paulryanrogers · 44m ago
They've been around a while. Here's the top Google Result: https://chromewebstore.google.com/detail/canvas-fingerprint-...

I think Privacy Badger may also do it.

ohso4 · 37m ago
Plugins are an issue themselves. They're used for fingerprinting too!
superkuh · 1h ago
Luckily most of this is done by web devs using their normal tools which means if you just turn javascript off that gets rid of 99%. Sure, there are ad companies and related out there using actual webserver logs but more and more it's relying on you the user blindly executing their code on your machine. After all, everyone does it. Anyone not running javascript is weird, probably not monetizable, and therefore is a bot and doesn't exist.
azangru · 1h ago
> if you just turn javascript off that gets rid of 99%

Given how websites are built these days, if you just turn javascript off, half of them, if not more, will become unusable.

leptons · 2h ago
“Fingerprinting has always been a concern in the privacy community, but until now, we had no hard proof that it was actually being used to track users,”

Huh? In 2025?? Fingerprinting has been around and actively used to track users for probably at least 20 years.

martinky24 · 2h ago
They said "hard proof". Can you point to openly available "hard proof"? Otherwise your reply is just snark that doesn't add much.
antonok · 1h ago
As someone who's been building an adblocker for the last 6 years: yes, there's plenty of proof in the devtools console on more websites than you'd think.

Fingerprintjs [1] is a well known one that gets a lot of use. And if you check EasyPrivacy, you'll see the rules to block it [2] have been in place for a long time.

[1] https://github.com/fingerprintjs/fingerprintjs [2] https://github.com/easylist/easylist/blob/132813613d04b7228c...

JimDabell · 1h ago
Why do you think a porn site was trying to access MIDI devices? To play some smooth jazz?

https://www.obsessivefacts.com/images/blog/2020-04-04-the-ja...

https://news.ycombinator.com/item?id=23679063