0 pieces of data
revealed so far

// privacy audit

whoami — what you reveal

Every website you visit collects data about you the moment your browser connects. This page shows you exactly what you're giving away — in real time.

click to expand / collapse
cookies found scanning…
third-party cookies checking…
localStorage items scanning…
sessionStorage items scanning…
You've visited this page before.
This counter is stored in a cookie on your device. Every site you visit can do this silently — tracking how often you return, when, and for how long.
Why this matters: Cookies are tiny files placed on your device by websites — and often by other companies whose trackers are embedded in the site. They follow you across the web, building a profile of your browsing habits, purchases, and interests.
click to expand / collapse
canvas fingerprint generating… trackable
webGL renderer detecting… exposes GPU
webGL vendor detecting…
installed fonts (est.) detecting… fingerprint vector
audio fingerprint generating… unique per device
computing fingerprint hash…
This hash is generated entirely from your browser's characteristics — no cookies, no login, no tracking pixel needed. Ad networks and data brokers use fingerprinting to track you even in private/incognito mode and across different browsers.
Why this matters: Browser fingerprinting is invisible and cannot be blocked by clearing cookies or using incognito mode. Your combination of browser, OS, fonts, GPU, screen, timezone, and dozens of other signals creates a signature that is often unique to you alone out of billions of internet users.
click to expand / collapse
webRTC local IP probing…
webRTC public IP probing…
timezone detecting… VPN mismatch check
do not track header checking…
Why this matters: WebRTC is a browser feature for video/audio calls. A flaw in its design causes your real IP address to leak — even if you're using a VPN. Many VPN users don't know their true IP is exposed to every website they visit.
click to expand / collapse
Every HTTP request your browser makes — to load a page, an image, a font — includes these headers. They are sent automatically, without any action on your part.
user-agent reading… browser + OS
accept-language reading… reveals locale
preferred languages reading…
platform reading…
referrer policy reading…
cookies in header counting… sent with every request
Why this matters: Your User-Agent alone tells a web server your exact browser version, OS, and device type. Combined with your IP and language settings, servers can build a detailed profile before you even click anything.
click to expand / collapse
CPU cores detecting… narrows device type
device memory detecting… approx RAM
touch support detecting… reveals device class
max touch points detecting…
device pixel ratio detecting… Retina / HiDPI
screen resolution detecting… unique fingerprint
available screen detecting… dock/taskbar size
color depth detecting…
online status detecting…
connection type detecting… wifi / cellular

battery level detecting… tracking vector
charging status detecting…
Why this matters: Battery status has been used as a tracking vector — a nearly-depleted battery creates a unique enough signature that it can re-identify users across sessions without cookies. CPU core count, RAM, and screen resolution together narrow your device to a small group, or even uniquely.
click to expand / collapse

Permissions you may have previously granted. Green = denied / not granted (good). Red = granted (sites have this access).

Why this matters: Once you grant a permission — even to a legitimate site — that site retains it until you manually revoke it. Malicious or compromised sites can silently use camera, microphone, or location access.
click to expand / collapse
time on page 0s ticking right now
scroll depth 0% engagement tracking
mouse moves 0 behaviour profiling
clicks recorded 0 interaction map
idle detection active
scroll depth tracker:
live mouse tracking — move your cursor here:
ad networks record this for every page you visit x:0 y:0
Why this matters: Ad networks and analytics tools record your every interaction — how long you hover, where your mouse goes, how far you scroll, when you go idle. This builds a behavioural profile that can identify you even without any account or cookie.
click to expand / collapse
/ 10 — calculated from your browser signals
click to expand / collapse
🦊 Use Firefox
Firefox has built-in Enhanced Tracking Protection. Combined with extensions, it blocks most fingerprinting and trackers.
mozilla.org/firefox
🧱 uBlock Origin
The most effective content blocker available. Blocks ads, trackers, malware domains, and fingerprinting scripts.
ublockorigin.com
🔐 Use a VPN
A VPN hides your real IP and ISP from websites — but make sure it also disables WebRTC leaks in your browser settings.
🧅 Tor Browser
Routes your traffic through multiple nodes and actively resists fingerprinting. Best for maximum anonymity.
torproject.org
🔒 DNS over HTTPS
Your DNS queries reveal every site you visit to your ISP. Use encrypted DNS via Cloudflare (1.1.1.1) or NextDNS.
nextdns.io
🍪 Clear Cookies Regularly
Set your browser to clear cookies on close, or use Firefox Multi-Account Containers to isolate sites from each other.
🚫 Disable WebRTC
In Firefox: set media.peerconnection.enabled to false in about:config to stop IP leaks.
🔍 Check Yourself
Run checks at coveryourtracks.eff.org and browserleaks.com to see how trackable you are.