Device Fingerprint: Difference between revisions
Added remedies section (needs more work) |
lack of data increases fingerprint narrowing |
||
Line 1: | Line 1: | ||
{{StubNotice}}{{ToneWarning}} | {{StubNotice}}{{ToneWarning}} | ||
A '''device fingerprint''' is a string of data that maps and compiles details of a particular device or user, such as the operating system and browser information. Unlike an IP address, which is a singular piece of data that users can manipulate for privacy and security (such as using a VPN service or resetting network connection), a device fingerprint holds a series of specified data that can be uniquely attributed to a device or user, and are therefore much harder to protect from tracking and abuse of privacy. | A '''device fingerprint''' is a string of data that maps and compiles details of a particular device or user, such as the operating system and browser information. Unlike an IP address, which is a singular piece of data that users can manipulate for privacy and security (such as using a VPN service or resetting network connection), a device fingerprint holds a series of specified data that can be uniquely attributed to a device or user (or a group thereof), and are therefore much harder to protect from tracking and abuse of privacy. | ||
Common data that may be included in a device fingerprint include: | Common data that may be included in a device fingerprint include: | ||
Line 13: | Line 13: | ||
==How it works== | ==How it works== | ||
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting | <!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting one or more data items and turning them into a much shorter bit string that uniquely identifies itself (typically by applying a [[wikipedia:Hash_function|hash-function]]). This includes the operating system, device model, screen resolution, installed fonts, graphic-rendering, and more.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref> | ||
Even the '''lack of data can be used to build a fingerprint''', as certain data is unlikely to be missing. This is the case when a "power user" changes many default settings, or clears fields that aren't necessary. Unfortunately, this helps narrow-down the identifier, creating a unique fingerprint. | |||
==Why it is a problem== | ==Why it is a problem== | ||
Line 21: | Line 23: | ||
Some examples of fingerprinting include some types of cookies, | Some examples of fingerprinting include some types of cookies, | ||
== Remedies == | ==Remedies== | ||
Device fingerprinting is notoriously difficult to avoid. IP addresses can be masked, hidden, or modified, while cookies can be blocked, cleared, and avoided. Device fingerprints, however, are a compilation of basic data points that computers and browsers use to communicate with web pages. The only notable remedy is using privacy-focused browsers such as Mullvad and Brave which randomize certain data points to hide unique attributes. | Device fingerprinting is notoriously difficult to avoid. IP addresses can be masked, hidden, or modified, while cookies can be blocked, cleared, and avoided. Device fingerprints, however, are a compilation of basic data points that computers and browsers use to communicate with web pages. The only notable remedy is using privacy-focused browsers such as Mullvad and Brave which randomize certain data points to hide unique attributes. | ||