Hi there, I'm a privacy web developer and researcher experimenting with browser fingerprinting and its efficacy both with and without Javascript interaction.
UPDATE: I've written an in-depth technical analysis on this experiment on my blog.
This experiment collects data about your browser for research purposes. It won't be shared with third-parties.
This fingerprint is compiled using connection and TLS data server-side.
Server Hash: 0fb5dd8e62905218a7c0e4ae06fd4f60
> Header Hash: 7f2c29bd1fb1e0dd0ee52c243a0a64e0
> TLS Hash: e07086b0f455e91edb56b21e904272aa
I've seen you 6 times.
This fingerprint solely uses Javascript to collect unique data points about your browser.
Font Hash: Loading...
I've seen you ... times.
If the above techniques fail, the similarity algorithm can scan through similar fingerprints and attempt to find your previous fingerprints, even if you try to spoof browser attributes. It can also learn over time and adapt to your fingerprints across multiple browsing profiles or similar browsers.
I think I identified you correctly.
Like this project?