What does your browser leak?
Without a VPN or Tor, every site you visit can read most of this silently. Here's what yours just told us.
100% client-side. Nothing on this page is logged or sent anywhere.
Scanning…
Every site you visit can read most of these without asking. None of this data leaves your browser on this page.
Where you are
IP address
216.73.216.182
Sent on every HTTP request. Reveals city-level location and ISP.
Location
Columbus, OH, US
Derived from your IP. A VPN would hide this.
Coordinates
39.9587, -82.9987
City-block accuracy from your IP geo.
Timezone
scanning…
Even with a VPN, your timezone often gives you away.
Languages
scanning…
Strong signal of country and culture.
Your device
Screen
scanning…
Combined with other signals, near-unique.
CPU cores
scanning…
navigator.hardwareConcurrency — exposed by default.
Memory
not exposed
Coarse RAM bucket. Some browsers hide this.
Connection
scanning…
Network speed and round-trip time.
User-Agent
scanning…
Full browser, OS, and version string.
Hidden fingerprints
Canvas hash
scanning…
Trackers draw a hidden image — every device renders it slightly differently.
GPU
scanning…
WebGL exposes your exact graphics card model.
Audio hash
scanning…
Your audio stack produces a measurably unique waveform.
Fonts detected
scanning…
Installed fonts narrow you down fast.
Network leaks
Local IP (WebRTC)
scanning…
Your private LAN IP — leaks past most VPNs unless WebRTC is off.
Do Not Track
scanning…
A polite request that almost no site honors.
Cookies
scanning…
Persistent identifier across visits.
What should I do?
Three things that actually move the needle. In order of impact.
- 1
Use a VPN
Hides your IP, country, and internet provider in one move. Mullvad, ProtonVPN, and Cloudflare WARP are the easiest to set up.
- 2
Switch to a privacy-first browser
Brave or Firefox block most fingerprinting tricks by default. Tor Browser is the strongest if you don't mind slower pages.
- 3
Stop pasting passwords into chat
WhatsApp, Slack, email — they all keep what you sent forever. Use a self-destructing link instead. (That's SnapSend, below.)
Hiding your IP is one layer.
The other is making sure what you send can't be read — even by us. SnapSend encrypts your secret in your browser before it leaves your device, then deletes it the moment your recipient reads it. Free. No account.
How browser fingerprinting works
Every device produces a near-unique combination of screen size, GPU, fonts, and rendering quirks. Trackers don't need cookies — they just record this fingerprint and recognise you across sites. Studies by the EFF have shown that more than 80% of browsers are uniquely identifiable from a handful of these signals alone.
How to reduce what you leak
- Use a VPN to hide your IP, country, and ISP.
- Use Firefox or the Tor Browser — both actively spoof or block fingerprinting APIs.
- Disable WebRTC if you're on Chrome with a VPN. Otherwise your real LAN IP leaks.
- Block third-party scripts with uBlock Origin or Brave's shields.
- Don't reuse channels for secrets. Even on a clean browser, sending passwords over email or Slack leaves them in plaintext archives forever.
Where SnapSend fits in
Hiding what your browser leaks is half the problem. The other half is what you actually send. SnapSend encrypts secrets in your browser before they ever reach a server, deletes them after one read, and never asks for your name. If a site has to know nothing about you to deliver a password — that's the only safe way.