Device Fingerprint
❗Article Status Notice: This Article is a stub
This article is underdeveloped, and needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Learn more ▼
❗Article Status Notice: Inappropriate Tone/Word Usage
This article needs additional work to meet the wiki's Content Guidelines and be in line with our Mission Statement for comprehensive coverage of consumer protection issues. Specifically it uses wording throughout that is non-compliant with the Editorial guidelines of this wiki.
Learn more ▼
A device fingerprint is a string of data that maps and compiles details of a particular device or user, such as the operating system and browser information. Unlike an IP address, which is a singular piece of data that users can manipulate for privacy and security (such as using a VPN service or resetting network connection), a device fingerprint holds a series of specified data that can be uniquely attributed to a device or user (or a group thereof), and are therefore much harder to protect from tracking and abuse of privacy.
Common data that may be included in a device fingerprint include:
- Device model and hardware
- Web browser
- Screen resolution
- Font type and size
- Plugins
- Browser extensions
- and many more
How it works
[edit | edit source]Fingerprinting works by getting one or more data items and turning them into a much shorter bit string that uniquely identifies itself (typically by applying a hash-function). This includes the operating system, device model, screen resolution, installed fonts, graphic-rendering, and more.[1]
Even the lack of data can be used to build a fingerprint, as certain data is unlikely to be missing. This is the case when a "power user" changes many default settings, or clears fields that aren't necessary. Unfortunately, this helps narrow-down the identifier, creating a unique fingerprint.
Why it is a problem
[edit | edit source]Fingerprinting can be used to identify individuals, flagging privacy concerns and letting companies do things like targeted advertising, selling personal data and more.
Examples
[edit | edit source]Some examples of fingerprinting include some types of cookies,
Remedies
[edit | edit source]Device fingerprinting is notoriously difficult to avoid. IP addresses can be masked, hidden, or modified, while cookies can be blocked, cleared, and avoided. Device fingerprints, however, are a compilation of basic data points that computers and browsers use to communicate with web pages. The only notable remedy is using privacy-focused browsers such as Mullvad and Brave which randomize certain data points to hide unique attributes.
References
[edit | edit source]- ↑ "How does device fingerprinting work?". crossclasiffy.com. Retrieved 31 August 2025.