Issue No. 001·March 21, 2026·Seoul Edition
Back to home
PrivacySecurityBrowser Tools

Browser Sysinfo: See everything a webpage can learn about you

Comprehensive client-side probing reveals exactly what websites could fingerprint about your system without permission Clear privacy score and uniqueness estimates make abstract risks concrete with actionable insights

April 19, 2026·IndiePulse AI Editorial·Stories·Source
Discovered onGLOBALENHN

liveBrowser Sysinfo

TaglineSee everything a webpage can learn about you
Platformweb
CategoryPrivacy · Security · Browser Tools
Visitsysinfo.theden.sh
Source
Discovered onGLOBALENHN

Browser Sysinfo operates on a principles of radical transparency — it shows users exactly what data a website might gather from their browser as part of device fingerprinting. This isn't just IP checks or basic browser string analysis, but deep dives into canvas rendering variations, WebGL GPU artifacts, typed array endianness, and even Web Audio API fingerable traces. The tool methodically categorizes findings under System, Network, GPU, CPU, and Security sections, with technical footnotes waiting on hover for those who want to understand how each vector is extracted.

Where many browser fingerprinting tools stop at surface-level metrics, Browser Sysinfo pushes deeper by analyzing edge cases. It uniquely identifies how CSS cascade patterns might vary based on system fonts, or how touch screen capabilities get reported differently across devices. The privacy score calculation considers both the number of data points collected and how commonly they appear online, translating raw data into a 0-100 privacy rating with percentile rankings. A surprising amount of the score comes from subtle fingerprinting vectors like the noise patterns in WebGL rendering or variations in WebAssembly compilation.

The network analysis is the most aggressive and informative, exposing local IP addresses through WebRTC STUN requests and testing fully qualified domain name leaks through browser DNS queries. These methods don't just tell you what data might leak, but demonstrate how they can be deliberately collected: the tool actually attempts to reach STUN servers to verify potential leakage points rather than just showing what information is available. The true power lies in this handson approach — instead of merely stating that your ISP can be fingerprinted, it shows you the exact DNS lookup patterns and connection timing data that would allow that identification.

For developers, the finest value comes in the technical depth. This isn't just information exposure — it's a window into the API-level vectors that collect information, with clear technical explanations of how each data point is extracted. For privacy advocates, it's an important warning system showing exact fingerprint surface area. For security researchers, it provides a baseline to assess how effective mitigation techniques like canvas fingerprinting masks truly are. All while staying true to its fundamental promise: all analysis happens entirely in your browser, with no data collection from the service.

Article Tags

indieprivacysecuritybrowser tools