What happens behind the scenes when you visit a website?
ABOUT TRACELINE
TraceLine is a 100% open-source project built to show you exactly how much data you're bleeding every time you click a damn link. We aren't trying to sell you a VPN, and we don't save your data. We just want you to see the reality of modern browser fingerprinting. The source code is out there for anyone to audit.
SECURITY DISCLAIMER
By clicking the button below, you are explicitly allowing this script to rip through your browser's APIs. It will extract your hardware identity, network footprint, and whatever else it can grab to show you what invisible trackers see every day.
Privacy Guarantee:
There is no backend database connected to this page. The data is pulled locally, and deleted the exact moment you close this tab.
traceline — diagnostic shell
The Post-Mortem: How We Got This &How to Stop It
That wall of text you just watched scroll by? That's your digital footprint. And honestly, it's a privacy shitshow. When you browse the web, you don't just politely ask a server for a webpage — your browser practically hands over a detailed dossier of your machine in exchange. Ad networks and data brokers don't even care about tracking cookies anymore. That's old bullshit. Instead, they look at the exact, hyper-specific combination of hardware, network settings, and system configurations you just exposed. Together, they form a "fingerprint" that is almost certainly unique to you.
Here is a breakdown of exactly how this script tricked your browser into coughing up that information, and more importantly, how you can lock this damn thing down.
1. VPN / Proxy Detection Heuristics
How we got it:
Spotting a VPN just from the browser isn't easy, but your system gives it away if you aren't careful. We checked the local timezone of your operating system (via your browser's system clock) and compared it to the geographical timezone of your IP address. If you're physically sitting in London but your IP claims you're in New York, the clocks mismatch. You get flagged immediately. We also check your Internet Service Provider (ISP) against known datacenter hosts (like AWS or DigitalOcean) because regular people don't browse YouTube from a server farm.
How to prevent it:
Spoof your system timezone to match your VPN's server. Extensions like Spoof Timezone
automate this. To beat the datacenter check, you need Residential Proxies, which route your traffic through actual household connections.
2. The Canvas Fingerprint
How we got it:
HTML5 includes a drawing tool called a <canvas >
. Websites use it for browser games and charts. In this script, we generated an invisible canvas and forced your browser to draw a very specific, layered image using different colors and text fonts. Because every computer has a slightly different combo of graphics drivers, fonts, and sub-pixel smoothing algorithms, the resulting image is microscopically unique. We snapped a picture of those invisible pixels and hashed it into an ID code.
How to prevent it:
Basic ad-blockers do literally nothing against this because canvas drawing is a core web feature. You need a browser that actually gives a shit, like Brave
or the Tor Browser
. Firefox users can install CanvasBlocker
, which silently injects randomized digital "noise" into the math every time a site tries to draw a hidden image, completely ruining their tracking metrics.
3. AudioContext Fingerprinting
How we got it:
We used the Web Audio API to generate a high-frequency sine wave, pushed it through a digital audio compressor, and measured the result. We didn't even play the sound through your speakers. We just captured the internal audio buffer. Your specific sound card hardware dictates exactly how that floating-point math is processed. It's a ridiculously accurate, sneaky hardware ID.
How to prevent it:
Similar to canvas tracking, you're fighting native web tools here. Using the Brave
browser is your best bet; it catches audio API requests and injects cryptographic noise into the output, breaking their algorithms.
4. WebGL &GPU Extraction
How we got it:
WebGL is the engine your browser uses to render 3D graphics. We spun up a 3D environment in the background and simply asked it for the name of the hardware doing the heavy lifting using a debug extension (WEBGL_debug_renderer_info
). Your browser just gladly handed over the exact make and model of your graphics card. It's that easy.
How to prevent it:
You can disable WebGL entirely in your browser's advanced settings (in Firefox, type about:config
and set webgl.disabled
to true
). Just keep in mind this will break 3D browser games and Google Earth.
5. Silent Media Device Enumeration
How we got it:
You know how websites have to ask permission to use your webcam and microphone? Yeah, well, they don't have to ask permission to count
them. By querying navigator.mediaDevices.enumerateDevices()
, we asked your browser exactly how many audio inputs and lenses are plugged into your machine. Even without recording access, knowing you have exactly two cameras and three audio inputs adds another highly specific data point to your tracking profile.
How to prevent it:
Safari actually restricts this by default, which is a rare W for Apple. On Chrome and Firefox, you have to dig into advanced configuration flags to spoof it. Honestly? Just unplug your external mics and webcams when you aren't using them.
6. Hardware &Network Telemetry
How we got it:
We didn't even have to hack anything for this part — your browser just broadcasted it like an idiot. Using standard commands, we asked your machine how many CPU cores it has, how much RAM is installed, and your screen's exact color-depth. Combined with your IP address, this telemetry is enough to track you across different websites even if you clear your cookies every ten minutes.
How to prevent it:
The best defense against general telemetry is blending in. The Tor Browser
handles this by forcing every user to share the exact same screen size, hardware profile, and timezone, making it impossible to tell you apart from anyone else. For daily browsing, a strict privacy browser combined with a trusted VPN is the best way to stop the bleeding.