See what your browser is quietly broadcasting right now — before trackers do.
Network Exposure
scanning...- Protocol:
- Referrer:
- Timezone:
- Language(s):
- Online status:
- Local network exposure (WebRTC):
Fingerprint Uniqueness
scanning...- User agent:
- Browser vendor:
- Platform:
- Screen:
- Device pixel ratio:
- Color depth:
- CPU cores / device memory:
- WebGL renderer:
- Canvas fingerprint hash:
- Font profile:
- Color scheme & motion:
- Estimated uniqueness:
Permission & Device Surface
scanning...- Camera permission:
- Microphone permission:
- Notifications permission:
- Geolocation permission:
- Media devices:
- Gamepads:
- Max touch points:
- Input modes:
- User interaction:
Tracking Surface & Protection Radar
scanning...- Cookies enabled:
- LocalStorage / SessionStorage:
- IndexedDB available:
- Do Not Track:
- Ad/tracker blocking signals:
- Potential private/incognito mode:
- HTTPS security:
What a Tracker Sees in 1 Second
In the first second of this page load, a typical tracker could already infer:
- 0–100 ms: your IP (on the server), protocol (HTTP/HTTPS), browser, OS, and referrer.
- 100–300 ms: your screen size, timezone, languages, storage support, and adblock hints.
- 300–1000 ms: a canvas and WebGL fingerprint, device characteristics, and a stable ID it can reuse across sites.
This tool simulates those signals from your browser without sending them anywhere.
Privacy Tips Based on Your Scan
Raw Data Snapshot
This is a JSON snapshot of what this tool sees. It is generated and kept entirely in your browser.