Skip to main content

What does your browser leak?

Without a VPN or Tor, every site you visit can read most of this silently. Here's what yours just told us.

100% client-side. Nothing on this page is logged or sent anywhere.

Scanning…

Every site you visit can read most of these without asking. None of this data leaves your browser on this page.

Where you are

IP address

216.73.216.182

Sent on every HTTP request. Reveals city-level location and ISP.

Location

Columbus, OH, US

Derived from your IP. A VPN would hide this.

Coordinates

39.9587, -82.9987

City-block accuracy from your IP geo.

Timezone

scanning…

Even with a VPN, your timezone often gives you away.

Languages

scanning…

Strong signal of country and culture.

Your device

Screen

scanning…

Combined with other signals, near-unique.

CPU cores

scanning…

navigator.hardwareConcurrency — exposed by default.

Memory

not exposed

Coarse RAM bucket. Some browsers hide this.

Connection

scanning…

Network speed and round-trip time.

User-Agent

scanning…

Full browser, OS, and version string.

Hidden fingerprints

Canvas hash

scanning…

Trackers draw a hidden image — every device renders it slightly differently.

GPU

scanning…

WebGL exposes your exact graphics card model.

Audio hash

scanning…

Your audio stack produces a measurably unique waveform.

Fonts detected

scanning…

Installed fonts narrow you down fast.

Network leaks

Local IP (WebRTC)

scanning…

Your private LAN IP — leaks past most VPNs unless WebRTC is off.

Do Not Track

scanning…

A polite request that almost no site honors.

Cookies

scanning…

Persistent identifier across visits.

What should I do?

Three things that actually move the needle. In order of impact.

  1. 1

    Use a VPN

    Hides your IP, country, and internet provider in one move. Mullvad, ProtonVPN, and Cloudflare WARP are the easiest to set up.

  2. 2

    Switch to a privacy-first browser

    Brave or Firefox block most fingerprinting tricks by default. Tor Browser is the strongest if you don't mind slower pages.

  3. 3

    Stop pasting passwords into chat

    WhatsApp, Slack, email — they all keep what you sent forever. Use a self-destructing link instead. (That's SnapSend, below.)

Hiding your IP is one layer.

The other is making sure what you send can't be read — even by us. SnapSend encrypts your secret in your browser before it leaves your device, then deletes it the moment your recipient reads it. Free. No account.

How browser fingerprinting works

Every device produces a near-unique combination of screen size, GPU, fonts, and rendering quirks. Trackers don't need cookies — they just record this fingerprint and recognise you across sites. Studies by the EFF have shown that more than 80% of browsers are uniquely identifiable from a handful of these signals alone.

How to reduce what you leak

  • Use a VPN to hide your IP, country, and ISP.
  • Use Firefox or the Tor Browser — both actively spoof or block fingerprinting APIs.
  • Disable WebRTC if you're on Chrome with a VPN. Otherwise your real LAN IP leaks.
  • Block third-party scripts with uBlock Origin or Brave's shields.
  • Don't reuse channels for secrets. Even on a clean browser, sending passwords over email or Slack leaves them in plaintext archives forever.

Where SnapSend fits in

Hiding what your browser leaks is half the problem. The other half is what you actually send. SnapSend encrypts secrets in your browser before they ever reach a server, deletes them after one read, and never asks for your name. If a site has to know nothing about you to deliver a password — that's the only safe way.