What privacy data your browser leaks

Browser Privacy Inspector tool

A comprehensive audit tool of everything your browser leaks to every website you visit. Browser shares this data with web sites without any notification to you.

Eugen Barilyuk EB43 Monkey Writer

by Eugen Barilyuk EB43

β†πŸ  Back to eb43.github.io projects list
Terminal and Pen
β€”
High Risk β†—
β€”
Medium Risk β†—
β€”
Low / Info β†—
β€”
Total Fields
Exposure Score
--> how calculated?
score = min(100, round((HΓ—3 + MΓ—1) / 120 Γ— 100))
●  H  Each High risk field counts as 3 points
●  M  Each Medium risk field counts as 1 point
●  L  Low / Info fields count as 0 points
●  Raw score divided by 120 (hardcoded maximum ceiling)
●  Multiplied by 100, then capped at 100
Scanning…
β€”
πŸͺͺ Identity & Fingerprint High Risk

Readable by every website. Combined, these values form a stable browser fingerprint that tracks you across sites and incognito sessions β€” no permission needed.

πŸ’» Hardware Medium Risk

Browser APIs expose hardware characteristics that narrow down your device model β€” CPU core count, memory class, and touch capability.

πŸ–₯ Screen & Display Medium Risk

Resolution, pixel density, colour depth, and system UI preferences fingerprint your specific monitor and OS configuration.

🌐 Network High Risk

Your public IP reveals city-level location and ISP. Connection type and speed are also exposed without any prompt.

Fetching your public IP…
πŸ“ Location & Timezone High Risk

Your IANA timezone narrows location to a city or region instantly β€” zero GPS, zero permission.

🧭 Browser & OS Medium Risk

Capabilities, referrer, and history give detailed OS and software version data as well as your browsing trail within a session.

🎨 Canvas Fingerprint High Risk

A hidden canvas renders text and shapes off-screen. GPU and driver differences produce a unique pixel hash β€” stable across sessions with no permission.

Hash: Computing…

πŸ”Š Audio Fingerprint High Risk

AudioContext processes a sine wave via your CPU and OS audio stack. The floating-point output hash is unique per machine β€” and completely silent.

πŸ–± WebGL Fingerprint High Risk

WebGL exposes your exact GPU model, vendor, driver version, and rendering capabilities β€” one of the most unique fingerprinting signals available.

⏱ Timing & Side-Channel High Risk

Clock precision, performance timer resolution, and WASM execution timing reveal your CPU architecture and OS. Reduced timer precision itself signals privacy mode.

πŸ“‘ Hardware Sensors Medium Risk

On mobile devices, accelerometer, gyroscope, and magnetometer data is readable without permission in many browsers. Unique noise patterns fingerprint the physical hardware.

🎬 Codec & Media Capabilities Medium Risk

The exact set of supported audio/video codecs, image formats, and DRM systems narrows down your browser version, OS, and hardware decoder capabilities.

πŸ”— Protocol Handlers & Installed Apps High Risk

Registered URI scheme handlers reveal which apps are installed on your device β€” Spotify, Slack, VS Code, Zoom, and others are detectable without permission.

πŸ”Œ Localhost Port Scan High Risk

By timing WebSocket connections to localhost, sites detect which software is running on your machine β€” dev servers, databases, proxies, and apps all listen on known ports.

Scanning common ports… (this takes ~5 seconds)
🎨 CSS & Rendering Quirks Medium Risk

Supported CSS features precisely pin your browser version. Scrollbar width, system font metrics, and sub-pixel rendering differ by OS and reveal platform details.

πŸ€– Automation & Bot Detection High Risk

Sites fingerprint whether your browser is controlled by Selenium, Puppeteer, or other automation tools by checking for missing properties, inconsistent values, and driver flags.

πŸ”‘ Font Detection Medium Risk

Text rendering width differences reveal installed fonts without any permission. Highlighted = detected on your device.

πŸ“· Media Devices Medium Risk

Camera, mic, and speaker counts are readable without permission. Model names are exposed after any permission grant on the device.

πŸ—„ Storage & Capabilities Low Risk

Available storage mechanisms and browser capabilities used for persistent tracking or as fingerprinting signals.

πŸ” Permissions Status Medium Risk

Sites silently query permission states β€” revealing prior camera, mic, or location grants β€” without triggering any new prompt.

πŸ”‹ Battery Status Medium Risk

Battery level and timing were precise enough to track users across incognito sessions. Most browsers have now removed or restricted this API.

πŸ“» WebRTC IP Leak High Risk

WebRTC ICE candidates reveal your real local and public IPs β€” even behind a VPN β€” with no user prompt.

All data collected entirely in your browser. Nothing is sent to any server.

βœ“ Copied to clipboard!
Visit Counter Flag Counter