Your digital shadow has been captured. The mirror never forgets.
// EDUCATIONAL DEMONSTRATION
This tool demonstrates passive browser intelligence techniques used by advertisers, data brokers, and threat analysts — in real time, against your actual device.
Nothing is stored. Nothing is transmitted beyond the API calls listed in our privacy policy. Everything you see is visible only to you.
// ARE YOU SURE?
This will reconstruct your complete ad profile using signals your browser exposes freely.
Nothing is stored.
This is for your eyes only.
Your digital shadow has been captured. The mirror never forgets.
│ WHAT IS BROWSER FINGERPRINTING? │
Every browser leaves a unique trace — a combination of hardware capabilities, installed fonts, graphics rendering characteristics, and behavioral patterns that make you identifiable across the web, even without cookies.
This tool demonstrates passive open-source intelligence (OSINT) techniques used by security researchers and threat analysts to identify and profile web traffic in real time.
Your GPU renders text and shapes in subtly unique ways. Differences in font rendering, anti-aliasing, and sub-pixel composition create a signature tied to your hardware.
Your graphics driver exposes vendor strings, renderer details, and a full list of supported extensions — all of which differ between GPU models and driver versions.
Your IP is cross-referenced against AbuseIPDB, VirusTotal, Shodan, and URLhaus in real time to assess prior malicious activity, open ports, and known vulnerabilities.
WebRTC can reveal your real IP even behind a proxy or VPN through ICE candidate negotiation — a known browser behavior exploited by trackers and fraud detection systems.
The Web Audio API processes sound differently across hardware. An offline audio context with synthetic oscillators produces a hash unique to your audio stack.
By measuring text rendered in different fonts, it's possible to detect which system fonts are installed — a vector that survives browser updates and incognito mode.
│ TOOLS & RESOURCES │
EFF Cover Your Tracks — tests whether your browser is uniquely identifiable.
BrowserLeaks — exhaustive suite of browser leak tests (WebRTC, fonts, canvas, WebGL).
Am I Unique? — academic fingerprint uniqueness study.
AbuseIPDB — community IP abuse reporting database.
VirusTotal — scan IPs, domains, and files against 70+ security engines.
Shodan — search engine for internet-exposed devices and open ports.
URLhaus — real-time malware URL feed by abuse.ch.
NIST NVD — the official US national vulnerability database (powers the CVE feed above).
CVE.org — authoritative CVE identifier registry.
Exploit-DB — public exploit and PoC archive by Offensive Security.
Tor Browser — anonymised browsing with uniform fingerprint across all users.
Mullvad Browser — fingerprint-resistant browser built with the Tor Project.
uBlock Origin — content blocker that prevents tracker and fingerprint scripts.
EFF Privacy — digital rights and surveillance defence resources.
OWASP Top 10 — the definitive web application security risk list.
Have I Been Pwned — check if your email appears in known data breaches.
SecurityHeaders.com — grades your site's HTTP response headers.
Mozilla Observatory — comprehensive HTTP security scanner and scorer.
SSL Labs — deep TLS/SSL configuration analysis by Qualys.