For years, the advice was simple: clear your cookies, use incognito mode, and you’re invisible. That hasn’t been true for a long time.

The fingerprint problem

Modern browser fingerprinting doesn’t need cookies. It builds a unique profile from your screen resolution, installed fonts, GPU renderer, audio context, and dozens of other signals your browser leaks by default. Research from the Electronic Frontier Foundation showed that the combination of these signals is unique for over 94% of browsers tested.

The uncomfortable truth is that your browser is a beacon, and it broadcasts a signature as distinctive as your face.

What actually works

If you care about reducing your fingerprint:

  • Tor Browser remains the gold standard โ€” it’s specifically designed to make all users look identical
  • Firefox with privacy.resistFingerprinting is a strong middle ground for daily use
  • Brave ships with fingerprinting protection on by default, though it’s not as aggressive as Tor
  • Browser extensions that promise fingerprint protection often make things worse by adding another distinguishing signal

The bigger picture

The shift from cookie-based tracking to fingerprinting reflects a broader trend: as users gain tools to block one form of surveillance, the industry moves to something harder to detect and harder to block.

This is why privacy can’t be solved with individual tools alone. It requires systemic changes โ€” in browser defaults, in regulation, and in the business models that make surveillance profitable.

The browser you choose matters. But so does demanding better defaults from the ones most people use.