VPN
IP address changes
- Network location: Masked behind a new exit IP.
- Browser fingerprint: Mostly unchanged across sessions.
- Result: Sites can still correlate repeat visits with the same fingerprint.
Learn
The tracking method that works across VPNs, incognito windows, and cookie clearing.
The basics
Every time a page loads, websites can observe a long list of browser and device attributes. Some are obvious, like screen size or language. Others are lower-level details, like graphics capabilities, audio behavior, TLS negotiation patterns, and the order your browser sends headers.
On their own, most of these values are not unique. Combined, they become highly distinctive. A site can use that combination to recognize the same browser across visits, even if you never sign in and even if traditional tracking tools are blocked.
That is what makes fingerprinting different from cookies. It does not need local storage, explicit consent, or a user account. Commercial products such as FingerprintJS are designed to identify returning browsers with very high confidence, which is why fingerprinting remains useful even after cookies are cleared or a VPN is enabled.
What gets collected
None of these values needs to be unique on its own. The power comes from the combination, and each guide breaks down one part of that model.
Guide
How hidden drawing tests turn rendering quirks into a stable browser identifier.
Read explainerGuide
How graphics APIs expose GPU, driver, and rendering behavior that can help identify a browser.
Read explainerGuide
How offline audio processing reveals subtle implementation differences across browsers and devices.
Read explainerGuide
How standard browser APIs expose platform, hardware, language, and client identity details by default.
Read explainerGuide
How resolution, pixel ratio, and browser chrome measurements help classify the device and window state.
Read explainerGuide
How text measurement and glyph rendering reveal installed fonts, software footprints, and environment details.
Read explainerGuide
How language order, timezone, and Intl settings expose regional configuration and easy spoofing mistakes.
Read explainerGuide
How the HTTPS handshake itself can identify a client before the page fully loads.
Read explainerGuide
How request metadata, client hints, and header patterns reveal more than most users expect.
Read explainerGuide
How low-level packet defaults and network-stack behavior can classify the client beneath the browser.
Read explainerWhy it matters
Fingerprinting can connect research sessions across networks and browsing contexts, making it easier to link sensitive reporting work back to a known professional identity.
A VPN may hide office IP space, but it does not remove the identifying browser and device signals that can expose repeat research patterns.
Ad-tech and fraud vendors use fingerprinting to rebuild profiles after cookies are cleared, browsers are switched, or private windows are closed.
Why VPNs do not fix it
A VPN can replace your public IP address, which is useful, but the rest of your browser and device profile often remains intact. If the same screen dimensions, header patterns, graphics signals, audio behavior, and network signatures appear before and after the VPN is enabled, the site still has a strong basis for linking those sessions together.
VPNs hide where you are. 404 hides who you are.
See how 404 worksVPN
404
How 404 addresses it
The goal is not perfect anonymity. The goal is to make your browser less stable and less useful as a long-term identifier while staying usable on the modern web.
404 replaces the cipher-suite ordering and related handshake characteristics that feed JA3 and JA4 style signatures.
It rewrites request headers and their ordering so the browser presents a more controlled profile to the server.
Canvas, WebGL, audio, and navigator properties are spoofed so high-entropy browser APIs stop reflecting the underlying machine directly.
On supported systems, packet-level operating system signals are normalized with eBPF-based handling to reduce network-layer leakage.
No anti-fingerprinting tool can promise complete protection against every detection method, every site, or every future browser change. If you want to verify the implementation yourself, the code is public.
View on GitHubFurther reading
A practical way to see how your own browser looks to fingerprinting systems and tracker defenses.
Open resourceA collection of browser-side tests that show how much information common APIs expose.
Open resourceResearch-driven tooling focused on how distinctive browser configurations are in the wild.
Open resourceA useful reference for understanding how network-layer operating system signatures can be inferred.
Open resource