Rudxain (talk | contribs)
m mention spoofing
Banana (talk | contribs)
Added archive URLs for 3 citation(s) using CRWCitationBot
Line 3: Line 3:


==How it works==
==How it works==
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting one or more data items and turning them into a much shorter bit string that uniquely identifies itself (typically by applying a [[wikipedia:Hash_function|hash-function]]). Such data points include device hardware, web browser, browser plugins and configuration, screen resolution, installed fonts, and many other methods.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com}}</ref> Even the '''lack of data can be used to build a fingerprint''', as certain data is unlikely to be missing.  
<!-- Can someone knowledgable enough please check this? -->Fingerprinting works by getting one or more data items and turning them into a much shorter bit string that uniquely identifies itself (typically by applying a [[wikipedia:Hash_function|hash-function]]). Such data points include device hardware, web browser, browser plugins and configuration, screen resolution, installed fonts, and many other methods.<ref>{{Cite web |title=How does device fingerprinting work? |url=https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |access-date=31 August 2025 |website=crossclasiffy.com |url-status=live |archive-url=http://web.archive.org/web/20250907041725/https://www.crossclassify.com/resources/articles/how-does-fingerprinting-work/ |archive-date=7 Sep 2025}}</ref> Even the '''lack of data can be used to build a fingerprint''', as certain data is unlikely to be missing.  


Because of the many different variables used to generate a fingerprint, adding extensions and changing settings intending to increase privacy may have the opposite effect.  
Because of the many different variables used to generate a fingerprint, adding extensions and changing settings intending to increase privacy may have the opposite effect.  


==Why it is a problem==
==Why it is a problem==
While there are some benefits from a security perspective (e.g. trusted-device recognition and fraud prevention), fingerprinting allows websites to identify individuals even while masking their IP address, flagging privacy concerns and letting companies do things like targeted advertising, selling personal data and more. It also allows another avenue for tracking across websites as services implemented on many different sites on the web will be able to follow device browsing from one website to another. <ref>{{Cite web |title=Browser Fingerprinting: What It Is and How to Block It |url=https://techreviewadvisor.com/browser-fingerprinting/ |access-date=10 October 2025 |website=techreviewadvisor.com}}</ref>
While there are some benefits from a security perspective (e.g. trusted-device recognition and fraud prevention), fingerprinting allows websites to identify individuals even while masking their IP address, flagging privacy concerns and letting companies do things like targeted advertising, selling personal data and more. It also allows another avenue for tracking across websites as services implemented on many different sites on the web will be able to follow device browsing from one website to another. <ref>{{Cite web |title=Browser Fingerprinting: What It Is and How to Block It |url=https://techreviewadvisor.com/browser-fingerprinting/ |access-date=10 October 2025 |website=techreviewadvisor.com |url-status=live |archive-url=http://web.archive.org/web/20251121085958/https://techreviewadvisor.com/browser-fingerprinting/ |archive-date=21 Nov 2025}}</ref>


==Remedies==
==Remedies==
Device fingerprinting is difficult to avoid due to the aforementioned data points available. Notable remedies include using privacy-focused browsers such as Mullvad, Brave, or the Tor browser which either randomizes certain data points to hide unique attributes or modifies identifiers to make all users appear to be the same in an effort to reduce the uniqueness of the system (AKA [https://en.wikipedia.org/w/index.php?title=Device_fingerprint&oldid=1330865841#Offering_a_spoofed_fingerprint spoofing]). <ref>{{Cite web |title=Anti-fingerprinting |url=https://tb-manual.torproject.org/anti-fingerprinting/ |website=tb-manual.torproject.org}}</ref>
Device fingerprinting is difficult to avoid due to the aforementioned data points available. Notable remedies include using privacy-focused browsers such as Mullvad, Brave, or the Tor browser which either randomizes certain data points to hide unique attributes or modifies identifiers to make all users appear to be the same in an effort to reduce the uniqueness of the system (AKA [https://en.wikipedia.org/w/index.php?title=Device_fingerprint&oldid=1330865841#Offering_a_spoofed_fingerprint spoofing]). <ref>{{Cite web |title=Anti-fingerprinting |url=https://tb-manual.torproject.org/anti-fingerprinting/ |website=tb-manual.torproject.org |url-status=live |archive-url=http://web.archive.org/web/20251029015145/https://tb-manual.torproject.org/anti-fingerprinting/ |archive-date=29 Oct 2025}}</ref>


==References==
==References==