Device Fingerprint: Difference between revisions

Beanie Bo (talk | contribs)
Added remedies section (needs more work)
Rudxain (talk | contribs)
lack of data increases fingerprint narrowing
 
Line 1: Line 1:
{{StubNotice}}{{ToneWarning}}
{{StubNotice}}{{ToneWarning}}
A '''device fingerprint''' is a string of data that maps and compiles details of a particular device or user, such as the operating system and browser information. Unlike an IP address, which is a singular piece of data that users can manipulate for privacy and security (such as using a VPN service or resetting network connection), a device fingerprint holds a series of specified data that can be uniquely attributed to a device or user, and are therefore much harder to protect from tracking and abuse of privacy.
A '''device fingerprint''' is a string of data that maps and compiles details of a particular device or user, such as the operating system and browser information. Unlike an IP address, which is a singular piece of data that users can manipulate for privacy and security (such as using a VPN service or resetting network connection), a device fingerprint holds a series of specified data that can be uniquely attributed to a device or user (or a group thereof), and are therefore much harder to protect from tracking and abuse of privacy.


Common data that may be included in a device fingerprint include:
Common data that may be included in a device fingerprint include:
Line 13: Line 13:


==How it works==
==How it works==
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting a data item and turning it into a much shorter bit string that uniquely identifies itself. This includes the operating system, device model, screen resolution and more.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref>
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting one or more data items and turning them into a much shorter bit string that uniquely identifies itself (typically by applying a [[wikipedia:Hash_function|hash-function]]). This includes the operating system, device model, screen resolution, installed fonts, graphic-rendering, and more.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref>
 
Even the '''lack of data can be used to build a fingerprint''', as certain data is unlikely to be missing. This is the case when a "power user" changes many default settings, or clears fields that aren't necessary. Unfortunately, this helps narrow-down the identifier, creating a unique fingerprint.


==Why it is a problem==
==Why it is a problem==
Line 21: Line 23:
Some examples of fingerprinting include some types of cookies,  
Some examples of fingerprinting include some types of cookies,  


== Remedies ==
==Remedies==
Device fingerprinting is notoriously difficult to avoid. IP addresses  can be masked, hidden, or modified, while cookies can be blocked, cleared, and avoided. Device fingerprints, however, are a compilation of basic data points that computers and browsers use to communicate with web pages. The only notable remedy is using privacy-focused browsers such as Mullvad and Brave which randomize certain data points to hide unique attributes.
Device fingerprinting is notoriously difficult to avoid. IP addresses  can be masked, hidden, or modified, while cookies can be blocked, cleared, and avoided. Device fingerprints, however, are a compilation of basic data points that computers and browsers use to communicate with web pages. The only notable remedy is using privacy-focused browsers such as Mullvad and Brave which randomize certain data points to hide unique attributes.