Privacy Online Test And Resource Compendium© project original created under the MIT license 2016 by CHEF-KOCH and community.
This list is designed to show all available (and useful) online tests, we may not add each test if it's unclear if it collects only data to hand/sell it to 3th-party developer or people which pay for it to use it for 'bad' things.
I see this as a 'community' based project since everyone can contribute and no one ever will excluded (only with good reasons like spamming, ...). I/we not accept any donations because we all doing this in our free time and it's up to everyone. The information should be available for free for everyone.
Known Fingerprinting Techniques:
- OSI model fingerprints (based on HTTP, Header, User Agent, Firewall, ...)
- CPU Fingerprint
- Mouse & CPU fingerprinting
- User fingerprinting problem (Canvas, IP, ...)
- Screen resolution (this possible will never be fixed since it would break too much)
- UberCookie/Cookies/EverCookie/Supercookies
- Database fingerprints
- Measuring time (Timezone/NTP)
- getClientRects fingerprinting via DOM
- Hardware implemented fingerprint methods such as hardware based DRM
- Plugin/Extension tracking (Silverlight, Adobe Flash, ...)
- Tor node detection
- DNS leakage or bypasses
- Do not track (DNT) detection
- Font detection & vulnerabilities
- Caching attacks
- PushAPI
- ServiceWorker
- TLS
- Fetch API
- Battery API
- AJAX
- CORS (ajax)
- WebSocket
- Password sniffing
- Canvas
- Several HTTP authorization detection (not fixable because it's protocol depending + meta-data)
- Stuff which is documented and mentioned over here.
- CPU Starvation Attacks
- Memory Starvation Attacks
- Resource Starvation Attacks
- Network Bandwidth Attacks
- ISP throttling checks
- CDN {Web Cache Deception Attack](https://omergil.blogspot.ch/2017/02/web-cache-deception-attack.html)
- Identify theft
- Extension system based attacks
- NoCoin, prevents background mining via opt-in
- Urchin Tracking Module (UTM)
- Common Data leakage
- ....
Fixed within the Browser (ensure you using the latest product [always])
- SSL / TLS (ciphers) [if you only browsing on pages like GitHub ~ you can even more 'harden' it]
- OpenSSL fixed (heartbleed,...)
- Tor (several fingerprints still possible, it's on the todo and will be fixed soon)
- Java/Adobe Flash, both are dead -> HTML5
- HTML5 several stuff like Canvas, Font, ... (will never be fixed, use addons)
- Cookies in general are not fixable since your page may need it, Amazon for shopping as an example (addons/filter-lists may help to whitelist).
- CPU, mouse wheel fingerprinting which needs to be fixed also within the OS (still open)
- MAC address leakage - disable IPv6 (if not necessary/needed)
- WebRTC since Chrome 48+ and Firefox 42+, both getting an new menu to allow it per-page (whitelist) [there exist also for both several addons, workarounds to compile it without WebRTC support)
- PopUps are (if not Canvas/JS related) not anymore possible, you see a permission dialog or can control this behaviour directly via Browser settings
- Audio fingerprint tests, example.
- ....
How to handle this?
Collection of device fingerprints from web clients (browser software) relies on the availability of JavaScript or similar client-side scripting language for the harvesting of a suitably large number of parameters. Overall this means if only one or a small of things are detectable it not automatically reveals your true identify, but all together is pretty dangerous.
Firefox Addon Detector: https://thehackerblog.com/addon_scanner/
Flash Player System Test: https://www.browserleaks.com/flash
Flash Player Test: https://www.adobe.com/software/flash/about/
Java Test: https://www.java.com/en/download/installed.jsp
Silverlight Test: https://www.browserleaks.com/silverlight
Firefox Compatible check: https://www.arewee10syet.com/
Check Provider-TLS: https://www.checktls.com/
Email IP Leak Test: http://emailipleak.com/
Email Privacy Tester: https://emailprivacytester.com/
Email Trace: http://www.ip-adress.com/trace_email/
Have I Been Pwned?: https://haveibeenpwned.com/
Pwnedlist: https://pwnedlist.com/
Check Your GPG Fingerprints https://evil32.com/
Revocation Awareness Test: https://www.grc.com/revocation.htm
Basic HTMl5 Video and Audio tester (works without JS or Plugins): http://tools.woolyss.com/html5-audio-video-tester/
Battery Status API: http://pstadler.sh/battery.js/
Canvas Fingerprinting: https://www.browserleaks.com/canvas
canvas.toBlob test: https://blueimp.github.io/JavaScript-Canvas-to-Blob/test/
get.Image Canvas test: http://tutorialspark.com/html5/HTML5_Canvas_get_Image_Data_Demo.php
Battery Status API: https://pazguille.github.io/demo-battery-api/
Hard Drive Fill Test: http://www.filldisk.com/
HTML5 Features Detection: https://www.browserleaks.com/modernizr
HTML5 Geolocation Test: https://www.browserleaks.com/geo
HTML5 Test: http://html5test.com/
WebRTC Leak Test: https://www.perfect-privacy.com/webrtc-leaktest/
WebRTC Test: https://test.webrtc.org/
WebRTC What's My IP Check: http://whatismyipaddress.com/webrtc-test
Anonymster WebRTC check: https://anonymster.com/web-rtc-leak-test/
HTML5 Security Cheatsheet: https://html5sec.org/
GeoTek Datentechnik - Web Privacy Check: https://ipinfo.info/html/privacy-check.php
DoiLeak: https://www.doileak.com/
IP Leak: https://ipleak.net/
Content Filters and Proxy Test: https://www.browserleaks.com/proxy
DNS Leak Test: https://www.dnsleaktest.com/
DNS Spoofability Test: https://www.grc.com/dns/dns.htm
IPv4/IPv6 Discovery / Detection Test: https://www.perfect-privacy.com/check-ip/
IP Magnet Test: http://ipmagnet.services.cbcdn.com/
Whois Test (Windows): https://www.browserleaks.com/whois
Mirai Vulnerability Scanner: https://www.incapsula.com/mirai-scanner/
Galhi US Test: http://ip.galih.us
Google Account History: https://www.google.com/settings/accounthistory
Facebook Activity Log: https://www.facebook.com/me/allactivity
YouTube Video History / Search History: https://www.youtube.com/feed/history
Microsoft Account Credentials Leak vulnerability check: https://msleak.perfect-privacy.com/
Checks website reputation and additional security related infos: https://github.com/andersju/webbkoll
Browser Extension and Login-Leak Experiment: https://extensions.inrialpes.fr/
Hide my Footprint: https://hmfp.absolutedouble.co.uk/
Browsers leak installed extensions PoC: https://github.com/earthlng/testpages
Information Disclosure on IE: https://www.cracking.com.ar/demos/ieaddressbarguess/
Arthured Elstein resource:// URIs leak information page: https://arthuredelstein.github.io/tordemos/resource-locale.html
Bad SSL: https://badssl.com/
FREAK Attack - Client Check: https://freakattack.com/clienttest.html
Heartbleed Test: https://filippo.io/Heartbleed/
RC4 Fallback Test: https://rc4.io/
How's My SSL: https://www.howsmyssl.com/
SSL Cipher Suite Details: https://cc.dcsec.uni-hannover.de/
Weak Diffie-Hellman and the Logjam Attack: https://weakdh.org/
SSH Audit: https://github.com/arthepsy/ssh-audit
BrowserRecon (Header/HTTP) Test: http://www.computec.ch/projekte/browserrecon/?s=scan
What Is My Referer?: https://www.whatismyreferer.com/
Browser Referer Headers: https://www.darklaunch.com/tools/test-referer
Do Not Track Test: https://www.browserleaks.com/donottrack
Evercookie Test: http://samy.pl/evercookie/
JavaScript Browser Information: https://www.browserleaks.com/javascript
Popup Blocking Tests: http://www.kephyr.com/popupkillertest/index.html
Redirect Page Test: https://jigsaw.w3.org/HTTP/300/Overview.html
System Fonts Detection Test: https://www.browserleaks.com/fonts
FluxFonts: https://ctrl.blog/entry/fluxfonts
JavaScript/CSS Font Detector: http://www.lalit.org/lab/javascript-css-font-detect/
Universal Plug n'Play (UPnP) Internet Exposure Test: https://www.grc.com/x/ne.dll?rh1dkyd2
JavaScript: PasteJacking: https://www.sempervideo.de/pastejacking/
Punycode converter: https://www.punycoder.com/
Uniquemachine test: http://uniquemachine.org/
Mozilla Observatory: https://observatory.mozilla.org/
PrivacyScore: https://privacyscore.org/
CryptCheck: https://tls.imirhil.fr
Webbkoll (source): https://webbkoll.dataskydd.net/en
Qualys SSL Labs: https://www.ssllabs.com/ssltest/
securityheaders.io: https://securityheaders.io
Hardenize: https://www.hardenize.com
Google Chrome drive-by exploit tester: http://www.sempervideo.de/chrome-driveby/
The Privacy.net Analyzer: http://analyze.privacy.net
Enotus mouse test (Tracking speed and polling rate): http://enotus.at.tut.by/Articles/MouseTest/index.html (link broken?)
Outerspace's Max IPS logger (Tracking speeds and will show if theres negative/positive acceleration when you hit a certain speed): http://maxouterspace.com/
Mouse Rate Checker (polling rate): http://tscherwitschke.de/old/download.html
Mouse reaction time tester: http://www.humanbenchmark.com/tests/reactiontime
Javascript Key Event Test Script http://unixpapa.com/js/testkey.html
JavaScript Event KeyCode Test Page http://www.asquare.net/javascript/tests/KeyCode.html
http://www.uniquemachine.org/ (Source)
Am I Unique?: https://amiunique.org/fp
Browser Spy (Multiple Tests): http://browserspy.dk/
Cross Browser Fingerprinting Test (User must to disable its ad-blocker!): http://fingerprint.pet-portal.eu/
Jondonym Full Anonymity Test: http://ip-check.info/?lang=en
Panopticlick: https://panopticlick.eff.org/
Browserprint.Info: https://browserprint.info/test
PC Flank: http://www.pcflank.com/index.htm
Onion Leak Test: http://cure53.de/leak/onion.php
Tor Fingerprint Test: https://tor.triop.se/
Whoer: https://whoer.net/
Popup Test: http://www.popuptest.com/
Privacy Check: http://do-know.com/privacy-test.html
Audio Fingerprint Test (see also here): https://audiofingerprint.openwpm.com/
Browser 'auto-download' Security Vulnerability (Chrome, IDM affected at time of writing): https://binaer.xyz/haifei-li/test.html
Check2IP: http://check2ip.com/
Chromium's HSTS preload list submission website: https://hstspreload.org
TorCheck at Xenobite.eu: https://torcheck.xenobite.eu/index.php
Shattered SHA1 attack (SHA1 collusion example): https://shattered.io
Web RTC Chrome vulnerability check: https://internet-israel.com/internet_files/webrtc/index.html Bug 709952
BitTorrent Traffic Shaping: https://neubot.nexacenter.org/download
Glasnost: http://broadband.mpi-sws.org/transparency/glasnost.php
The Internet Health Test: https://www.battleforthenet.com/internethealthtest/
ipMagnet: http://ipmagnet.services.cbcdn.com/
Check My Torrent IP: https://torguard.net/checkmytorrentipaddress.php
NoMoreRansom: https://www.nomoreransom.org
Have I Been Pwned: https://haveibeenpwned.com
Speedometer: http://browserbench.org/Speedometer/
ARES 6: http://browserbench.org/ARES-6/
Motion Mark: http://browserbench.org/MotionMark/
JetStream: http://browserbench.org/JetStream/
PeaceKeeper: http://peacekeeper.futuremark.com
Lite Brite: https://testdrive-archive.azurewebsites.net/Performance/LiteBrite/
Octane: https://chromium.github.io/octane/
Dromaeo: http://dromaeo.com
Acid 3: http://acid3.acidtests.org/
Shodan.io: https://www.shodan.io/