<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Hafiz Khurram Javid</title>
    <description>The latest articles on Forem by Hafiz Khurram Javid (@hafiz_khurramjavid_610cf).</description>
    <link>https://forem.com/hafiz_khurramjavid_610cf</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3824431%2F3c2743d1-7ce5-4bf3-b42b-dbbaf2b6a8a0.png</url>
      <title>Forem: Hafiz Khurram Javid</title>
      <link>https://forem.com/hafiz_khurramjavid_610cf</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/hafiz_khurramjavid_610cf"/>
    <language>en</language>
    <item>
      <title>What Is Browser Fingerprinting? How Websites Track You Without Cookies (2026)</title>
      <dc:creator>Hafiz Khurram Javid</dc:creator>
      <pubDate>Tue, 07 Apr 2026 19:34:43 +0000</pubDate>
      <link>https://forem.com/hafiz_khurramjavid_610cf/what-is-browser-fingerprinting-how-websites-track-you-without-cookies-2026-3dfn</link>
      <guid>https://forem.com/hafiz_khurramjavid_610cf/what-is-browser-fingerprinting-how-websites-track-you-without-cookies-2026-3dfn</guid>
      <description>&lt;p&gt;You cleared your cookies. You switched to private browsing. You even tried a VPN. And yet the website still knew it was you.&lt;/p&gt;

&lt;p&gt;Browser fingerprinting is why - and it works by reading signals from your device that you cannot delete, clear, or turn off.&lt;/p&gt;




&lt;h2&gt;
  
  
  What Is Browser Fingerprinting?
&lt;/h2&gt;

&lt;p&gt;Browser fingerprinting identifies you by combining technical details about your browser and device into a unique profile. Your &lt;strong&gt;GPU model, installed fonts, screen resolution, audio hardware, timezone, and language settings&lt;/strong&gt; are all read silently - no permission prompt, no cookie banner, no storage on your device.&lt;/p&gt;

&lt;p&gt;Each individual signal is not unique. Millions of people have a 1920×1080 screen. Millions use Chrome on Windows. But when you combine 13 or more signals together, the resulting fingerprint is statistically unique for &lt;strong&gt;83–90% of users&lt;/strong&gt;, according to research from AmIUnique.org and the EFF's Panopticlick project.&lt;/p&gt;

&lt;p&gt;Unlike cookies, fingerprinting leaves no trace on your device. There is nothing to clear, nothing to block with standard privacy settings, and nothing that resets when you close your browser.&lt;/p&gt;




&lt;h2&gt;
  
  
  Cookies vs. Fingerprinting: The Key Difference
&lt;/h2&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;
&lt;th&gt;Cookies&lt;/th&gt;
&lt;th&gt;Fingerprinting&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Stored on your device?&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Can you delete it?&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blocked by incognito?&lt;/td&gt;
&lt;td&gt;Partially&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Blocked by cookie banners?&lt;/td&gt;
&lt;td&gt;Yes (if compliant)&lt;/td&gt;
&lt;td&gt;Rarely&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requires GDPR consent?&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;td&gt;Yes - but often ignored&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Survives browser reset?&lt;/td&gt;
&lt;td&gt;No&lt;/td&gt;
&lt;td&gt;Yes&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;




&lt;h2&gt;
  
  
  The 13 Signals That Make Up Your Fingerprint
&lt;/h2&gt;

&lt;p&gt;Here are the main vectors websites use, ranked by how much identifying information each contributes (measured in entropy bits):&lt;/p&gt;

&lt;h3&gt;
  
  
  🔖 User Agent String - 10.5 bits (High)
&lt;/h3&gt;

&lt;p&gt;Your browser's identity card. Reports your exact browser name, version, OS, and CPU architecture. A single string that narrows you to a very small group.&lt;/p&gt;

&lt;h3&gt;
  
  
  🎨 Canvas Fingerprint - 8.5 bits (High)
&lt;/h3&gt;

&lt;p&gt;The website draws invisible shapes on a hidden canvas element and reads back the pixel data. Your GPU and OS render these slightly differently, creating a hash unique to your hardware.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔤 Installed Fonts - 7.5 bits (High)
&lt;/h3&gt;

&lt;p&gt;The exact set of fonts on your system is surprisingly unique. Design tools, games, and work applications all install custom fonts. The combination is often one-of-a-kind.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔺 WebGL / GPU Renderer - 7.2 bits (High)
&lt;/h3&gt;

&lt;p&gt;WebGL exposes your exact GPU model and driver version to every website without any permission required. Your graphics card is effectively signing every page you visit.&lt;/p&gt;

&lt;h3&gt;
  
  
  🔊 Audio Fingerprint - 5.4 bits (High)
&lt;/h3&gt;

&lt;p&gt;A silent tone is processed through your audio hardware using the Web Audio API. The tiny differences in how your chip handles it create a unique signature - completely invisible and inaudible.&lt;/p&gt;

&lt;h3&gt;
  
  
  📐 Screen Resolution - 4.8 bits (Medium)
&lt;/h3&gt;

&lt;p&gt;Your screen width, height, color depth, and device pixel ratio. Multi-monitor and high-DPI configurations are especially distinctive.&lt;/p&gt;

&lt;h3&gt;
  
  
  🌍 Browser Language - 4.2 bits (Medium)
&lt;/h3&gt;

&lt;p&gt;The languages your browser is configured to use. Multilingual users with uncommon language pairs can be nearly uniquely identified from this single vector.&lt;/p&gt;

&lt;h3&gt;
  
  
  ⚙️ Hardware Profile - 3.1 bits (Medium)
&lt;/h3&gt;

&lt;p&gt;CPU core count and RAM. Combined with other signals, this narrows your device to a small group.&lt;/p&gt;

&lt;h3&gt;
  
  
  🕐 Timezone - 3.8 bits (Medium)
&lt;/h3&gt;

&lt;p&gt;Your browser reports your real timezone even behind a VPN. A mismatch between your IP geolocation and timezone is a classic VPN detection signal.&lt;/p&gt;




&lt;h2&gt;
  
  
  How Websites Actually Use Your Fingerprint
&lt;/h2&gt;

&lt;p&gt;The most common uses are &lt;strong&gt;ad tracking&lt;/strong&gt;, &lt;strong&gt;fraud detection&lt;/strong&gt;, and &lt;strong&gt;paywall enforcement&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;Ad networks build profiles of your browsing behavior across thousands of sites and use fingerprinting to link those sessions together even when you clear cookies. Banks use fingerprinting as a fraud signal - a sudden change in fingerprint triggers verification challenges.&lt;/p&gt;

&lt;p&gt;News sites and streaming platforms use fingerprinting to enforce article limits and free trial periods. Clearing cookies resets the counter; fingerprinting does not.&lt;/p&gt;

&lt;p&gt;More troublingly, data brokers purchase fingerprint-linked browsing profiles and combine them with offline data. A 2025 investigation found that some brokers could link anonymous browsing sessions to real names and addresses through fingerprint data alone.&lt;/p&gt;




&lt;h2&gt;
  
  
  Is Browser Fingerprinting Legal?
&lt;/h2&gt;

&lt;p&gt;Under &lt;strong&gt;GDPR&lt;/strong&gt;, fingerprinting constitutes processing of personal data because it creates a unique identifier. This means it requires a lawful basis - almost always consent - and must be disclosed. In practice, most websites outside the EU fingerprint without consent.&lt;/p&gt;

&lt;p&gt;Under &lt;strong&gt;CCPA and CPRA&lt;/strong&gt;, browser fingerprints qualify as unique personal identifiers, giving California residents the right to opt out of their sale. Most US state privacy laws passed since 2023 include similar provisions.&lt;/p&gt;

&lt;p&gt;The EU's ePrivacy Directive specifically covers fingerprinting and requires consent, but enforcement has been inconsistent.&lt;/p&gt;




&lt;h2&gt;
  
  
  How to Reduce Your Browser Fingerprint
&lt;/h2&gt;

&lt;h3&gt;
  
  
  → Switch to Brave Browser &lt;em&gt;(highest impact)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Brave actively randomizes canvas, WebGL, audio, and font fingerprinting vectors on every page load. The only mainstream browser with built-in fingerprint randomization that changes per session.&lt;/p&gt;

&lt;h3&gt;
  
  
  → Use the Tor Browser &lt;em&gt;(maximum anonymity)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Tor makes every user appear identical by standardizing all fingerprinting vectors. Trade-off: significantly slower browsing.&lt;/p&gt;

&lt;h3&gt;
  
  
  → Firefox with Strict Mode &lt;em&gt;(good balance)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;Firefox's Enhanced Tracking Protection in strict mode blocks known fingerprinting scripts and restricts font enumeration.&lt;/p&gt;

&lt;h3&gt;
  
  
  → Install CanvasBlocker &lt;em&gt;(partial)&lt;/em&gt;
&lt;/h3&gt;

&lt;p&gt;A Firefox extension that randomizes canvas fingerprinting output. Effective against canvas tracking but leaves WebGL and audio untouched.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Paradox of Anti-Fingerprinting
&lt;/h2&gt;

&lt;p&gt;There is a cruel irony at the heart of fingerprinting defense: some protective measures can make you &lt;em&gt;more&lt;/em&gt; distinctive.&lt;/p&gt;

&lt;p&gt;Enabling Do Not Track, for example, is set by only about 12% of users - meaning having it on is itself a fingerprinting signal. Using an uncommon browser or heavily customizing privacy settings can make your fingerprint more unique rather than less.&lt;/p&gt;

&lt;p&gt;The most effective defense is not customization but standardization - using browsers designed to make all users appear identical, like Tor.&lt;/p&gt;




&lt;h2&gt;
  
  
  Test Your Own Fingerprint
&lt;/h2&gt;

&lt;p&gt;The best way to understand your exposure is to see it directly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/browser-fingerprint-analyzer" rel="noopener noreferrer"&gt;TrustScan's Browser Fingerprint Analyzer&lt;/a&gt;&lt;/strong&gt; runs 13 tracking vectors against your browser, calculates your entropy score, and shows exactly which signals are most identifying - with specific reduction steps.&lt;/p&gt;

&lt;p&gt;It runs entirely in your browser. Nothing is collected or transmitted. Free, no account required.&lt;/p&gt;




&lt;h2&gt;
  
  
  The Bottom Line
&lt;/h2&gt;

&lt;p&gt;Browser fingerprinting is the tracking technique that works after everything else fails. It does not use cookies. It cannot be cleared by standard browser settings. It is not defeated by a VPN alone. And it is used by thousands of advertising networks and data brokers right now.&lt;/p&gt;

&lt;p&gt;Understanding what it is - and testing your own exposure - is the first step to making informed decisions about your browser and your privacy.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;Originally published at &lt;a href="https://trustscan.dev/blog/what-is-browser-fingerprinting-2026" rel="noopener noreferrer"&gt;trustscan.dev&lt;/a&gt;. TrustScan is a free privacy and security toolkit - 100% client-side, no data collected.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>privacy</category>
      <category>security</category>
      <category>webdev</category>
      <category>browsers</category>
    </item>
    <item>
      <title>I Built a Free Privacy Toolkit with Next.js - 6 Tools, Zero Data Collection</title>
      <dc:creator>Hafiz Khurram Javid</dc:creator>
      <pubDate>Sat, 14 Mar 2026 19:14:08 +0000</pubDate>
      <link>https://forem.com/hafiz_khurramjavid_610cf/i-built-a-free-privacy-toolkit-with-nextjs-5-tools-zero-data-collection-1gkn</link>
      <guid>https://forem.com/hafiz_khurramjavid_610cf/i-built-a-free-privacy-toolkit-with-nextjs-5-tools-zero-data-collection-1gkn</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuli7jmj72f2ig7ggz8mc.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fuli7jmj72f2ig7ggz8mc.png" alt=" " width="800" height="642"&gt;&lt;/a&gt;&lt;/p&gt;




&lt;p&gt;I spent the last few months building &lt;a href="https://trustscan.dev" rel="noopener noreferrer"&gt;TrustScan&lt;/a&gt; - a free privacy and security toolkit with 6 tools. No accounts, no tracking, no data stored. Here's what I built, the tech decisions I made, and what I learned.&lt;/p&gt;

&lt;h2&gt;
  
  
  What It Does
&lt;/h2&gt;

&lt;p&gt;TrustScan has 6 free tools:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/privacy-policy-simplifier" rel="noopener noreferrer"&gt;Privacy Policy Simplifier&lt;/a&gt;&lt;/strong&gt; - paste any privacy policy URL, get an AI-powered risk report with red flags, data collection breakdown, and a downloadable PDF&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/website-audit" rel="noopener noreferrer"&gt;Website Privacy Audit&lt;/a&gt;&lt;/strong&gt; - scan any URL for HTTPS, security headers, trackers, cookie consent, and privacy policy presence&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/privacy-law-checker" rel="noopener noreferrer"&gt;Privacy Law Checker&lt;/a&gt;&lt;/strong&gt; - answer 7 questions, find out which of 30+ privacy laws apply to your business&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/pdf-metadata-stripper" rel="noopener noreferrer"&gt;PDF Metadata Stripper&lt;/a&gt;&lt;/strong&gt; - deep scan and strip hidden metadata from PDFs, 100% client-side&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/ai-opt-out-hub" rel="noopener noreferrer"&gt;AI Training Opt-Out Hub&lt;/a&gt;&lt;/strong&gt; - opt-out links for 30+ AI platforms in one place&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;&lt;a href="https://trustscan.dev/tools/browser-extension-auditor" rel="noopener noreferrer"&gt;Extension Security Auditor&lt;/a&gt;&lt;/strong&gt; - analyze browser extension permissions and risks to identify potential security threats&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Next.js 14&lt;/strong&gt; with App Router and TypeScript&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Tailwind CSS&lt;/strong&gt; for styling with a custom dark/light theme system&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Groq API&lt;/strong&gt; (free tier) for the Privacy Policy Simplifier AI analysis&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;pdf-lib&lt;/strong&gt; for client-side PDF metadata stripping&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;jsPDF&lt;/strong&gt; for generating branded PDF reports&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Netlify&lt;/strong&gt; for deployment&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;JSON-LD structured data&lt;/strong&gt; on every page for SEO&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  Key Architecture Decision: Client-Side First
&lt;/h2&gt;

&lt;p&gt;The biggest design decision was making the PDF Metadata Stripper run entirely in the browser. Most "free" PDF tools upload your file to a server, process it, and send it back. That's a privacy risk - you're trusting a random server with your sensitive documents.&lt;/p&gt;

&lt;p&gt;With pdf-lib, the entire stripping process happens in your browser tab. Zero network requests. You can verify this yourself by opening DevTools while using the tool.&lt;/p&gt;

&lt;p&gt;This became a genuine differentiator. Users in the privacy community immediately noticed and appreciated it.&lt;/p&gt;

&lt;h2&gt;
  
  
  AI Without Breaking the Bank
&lt;/h2&gt;

&lt;p&gt;The Privacy Policy Simplifier needed an LLM to analyze policies. I started with Anthropic's API, then tried Google's Gemini free tier. Problem: Gemini's free tier is blocked in the EU, and I'm based in Finland.&lt;/p&gt;

&lt;p&gt;Switched to Groq (free tier, uses Llama models). It's fast, works globally, and the free tier is generous enough for a tool like this. The prompt engineering was the real challenge - getting consistent structured JSON output (company name, risk level, data collected, third parties, etc.) took many iterations.&lt;/p&gt;

&lt;h2&gt;
  
  
  SEO Strategy That's Starting to Work
&lt;/h2&gt;

&lt;p&gt;Every tool page has:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;10-15 targeted keywords in metadata&lt;/li&gt;
&lt;li&gt;JSON-LD structured data (WebApplication + FAQPage + BreadcrumbList)&lt;/li&gt;
&lt;li&gt;6 FAQ items with schema markup&lt;/li&gt;
&lt;li&gt;Open Graph and Twitter card meta tags&lt;/li&gt;
&lt;li&gt;Canonical URLs&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;I also wrote 12 blog posts targeting specific keywords like "how to remove metadata from PDF," "GDPR vs CCPA," and "best privacy policy summarizers." Each post links to a relevant tool, creating internal link loops.&lt;/p&gt;

&lt;p&gt;The comparison posts ("Best Free PDF Metadata Removers" and "Best Free Privacy Policy Summarizers") are designed to capture "best X" searches where buying intent is high.&lt;/p&gt;

&lt;h2&gt;
  
  
  PDF Report Generation with jsPDF
&lt;/h2&gt;

&lt;p&gt;The Privacy Policy Simplifier generates downloadable branded PDF reports. Built with jsPDF:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Risk-colored header banner (green/amber/red based on score)&lt;/li&gt;
&lt;li&gt;Structured sections for data collected, third parties, rights, red flags&lt;/li&gt;
&lt;li&gt;Footer on every page with date, disclaimer, and branding&lt;/li&gt;
&lt;li&gt;Auto page breaks with footer preservation&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;One gotcha: &lt;code&gt;splitTextToSize()&lt;/code&gt; calculates line wraps based on the &lt;strong&gt;current&lt;/strong&gt; font size. If you set the font size after calling it, your text wrapping will be wrong. Set the font before measuring.&lt;/p&gt;

&lt;h2&gt;
  
  
  What I'd Do Differently
&lt;/h2&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Start with SEO keyword research before naming tools.&lt;/strong&gt; I called it "Privacy Policy Simplifier" but people search for "privacy policy summarizer." Same tool, wrong keyword. Had to fix this retroactively.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Build backlinks from day one.&lt;/strong&gt; Great content with zero domain authority means Google won't rank you. I should have started directory submissions and community engagement alongside development, not after.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;&lt;strong&gt;Ship fewer tools, promote more.&lt;/strong&gt; 6 tools is a lot to maintain. I could have shipped 2-3 and spent the extra time on distribution.&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;h2&gt;
  
  
  What's Next
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;More comparison blog posts for SEO&lt;/li&gt;
&lt;li&gt;Backlink building through directories, Quora, and community engagement&lt;/li&gt;
&lt;li&gt;Additional tools covering AI disclosure scanning and digital identity exposure&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;If you work with privacy policies, PDFs, browser extensions, or compliance, give it a try at &lt;a href="https://trustscan.dev" rel="noopener noreferrer"&gt;trustscan.dev&lt;/a&gt;. Everything is free. I'd love feedback from the dev community on the tools or the tech stack.&lt;/p&gt;




&lt;p&gt;&lt;em&gt;I'm a Wazuh Cybersecurity Ambassador and experienced Full Stack developer. TrustScan is my indie project built at the intersection of web development, AI, and privacy.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>nextjs</category>
      <category>privacy</category>
      <category>webdev</category>
      <category>opensource</category>
    </item>
  </channel>
</rss>
