Think your VPN and incognito mode make you anonymous? Here are 5 tests to check.
1. Canvas Fingerprint Test
→ https://browserleaks.com/canvas
If your canvas hash is the same across sessions, you're trackable. Every website can link your visits using this hash, regardless of IP or cookies.
2. WebRTC IP Leak Test
→ https://browserleaks.com/webrtc
Even with a VPN, your local network IP (192.168.x.x) leaks via WebRTC. This local IP stays constant and can tie your sessions together.
3. EFF Cover Your Tracks
→ https://coveryourtracks.eff.org/
Tests whether your browser has a unique fingerprint. Most users get "your browser has a unique fingerprint" — meaning you're individually trackable across the web.
4. Font Fingerprint
→ https://browserleaks.com/fonts
Your installed font list is surprisingly unique, especially if you've installed developer tools (Fira Code, JetBrains Mono) or design software (Adobe fonts).
5. Audio Fingerprint
→ https://audiofingerprint.openwpm.com/
Your audio hardware produces a unique signal hash. Works even in incognito.
What Actually Makes You Anonymous
None of these are solved by:
- ❌ VPN (only changes IP)
- ❌ Incognito mode (hardware-based, not storage-based)
- ❌ Clearing cookies (fingerprint persists)
What works: per-session fingerprint isolation — randomizing all of the above per browser profile.
I use FireKey for this — free open beta, each profile gets unique canvas, WebGL, font, audio, and WebRTC values.
Written in a FireKey isolated browser environment.
Top comments (0)