Browser Sysinfo: 웹페이지가 당신에 대해 배울 수 있는 모든 것을 확인하세요
포괄적인 클라이언트 측 조사가 웹사이트가 허가 없이 당신의 시스템에 대해 어떤 정보를 지문화할 수 있는지를 정확히 드러냅니다. 명확한 개인정보 점수와 고유성 추정치는 추상적인 위험을 구체적인 실행 가능한 통찰력으로 만듭니다.
운영 중Browser Sysinfo
Browser Sysinfo operates on a principles of radical transparency — it shows users exactly what data a website might gather from their browser as part of device fingerprinting. This isn't just IP checks or basic browser string analysis, but deep dives into canvas rendering variations, WebGL GPU artifacts, typed array endianness, and even Web Audio API fingerable traces. The tool methodically categorizes findings under System, Network, GPU, CPU, and Security sections, with technical footnotes waiting on hover for those who want to understand how each vector is extracted.
Where many browser fingerprinting tools stop at surface-level metrics, Browser Sysinfo pushes deeper by analyzing edge cases. It uniquely identifies how CSS cascade patterns might vary based on system fonts, or how touch screen capabilities get reported differently across devices. The privacy score calculation considers both the number of data points collected and how commonly they appear online, translating raw data into a 0-100 privacy rating with percentile rankings. A surprising amount of the score comes from subtle fingerprinting vectors like the noise patterns in WebGL rendering or variations in WebAssembly compilation.
The network analysis is the most aggressive and informative, exposing local IP addresses through WebRTC STUN requests and testing fully qualified domain name leaks through browser DNS queries. These methods don't just tell you what data might leak, but demonstrate how they can be deliberately collected: the tool actually attempts to reach STUN servers to verify potential leakage points rather than just showing what information is available. The true power lies in this handson approach — instead of merely stating that your ISP can be fingerprinted, it shows you the exact DNS lookup patterns and connection timing data that would allow that identification.
For developers, the finest value comes in the technical depth. This isn't just information exposure — it's a window into the API-level vectors that collect information, with clear technical explanations of how each data point is extracted. For privacy advocates, it's an important warning system showing exact fingerprint surface area. For security researchers, it provides a baseline to assess how effective mitigation techniques like canvas fingerprinting masks truly are. All while staying true to its fundamental promise: all analysis happens entirely in your browser, with no data collection from the service.