UPDATE: I've written an in-depth technical analysis on this experiment on my blog.
This experiment collects data about your browser for research purposes. It won't be shared with third-parties.
This fingerprint is compiled using connection and TLS data server-side.
Server Hash: 0fb5dd8e62905218a7c0e4ae06fd4f60
> Header Hash: 7f2c29bd1fb1e0dd0ee52c243a0a64e0
> TLS Hash: e07086b0f455e91edb56b21e904272aa
I've seen you 4 times.
Font Hash: Loading...
I've seen you ... times.
If the above techniques fail, the similarity algorithm can scan through similar fingerprints and attempt to find your previous fingerprints, even if you try to spoof browser attributes. It can also learn over time and adapt to your fingerprints across multiple browsing profiles or similar browsers.
I think I identified you correctly.Like this project?