Your Browser Is a Fingerprint
If you think incognito mode protects you, it doesn’t.
Private browsing does one thing: it hides your activity from other people who use your device. That’s it. Your ISP still sees every site you visit. Websites still see your IP address. And your browser — the specific combination of your plugins, your fonts, your screen resolution, your language settings, your hardware — is a fingerprint nearly as unique as the one on your thumb.
If you’ve read Through the Looking-Glass, you remember the moment Alice steps through the mirror and discovers that everything on the other side is reversed — familiar but wrong, watching her as much as she’s watching it. Your browser is that mirror. You think you’re looking through a window at the internet. The internet is looking back through that same window at you — reading your configuration, cataloging your fingerprint, tracking your movement from site to site. Incognito mode is a curtain on your side of the glass. It doesn’t change what’s visible from the other side.
Go to coveryourtracks.eff.org. Run the test. It takes thirty seconds.
Look at the result. Look at how many bits of identifying information your browser broadcasts to every website you visit. Most browsers are unique among hundreds of thousands of samples. You’re not anonymous. You’re wearing a name tag you didn’t know you had on.
That fingerprint follows you. When you visit a news site, a shopping site, a porn site, a political forum — the trackers embedded on those pages read your fingerprint and correlate your visits across them. They don’t need cookies. They don’t need you to log in. Your browser configuration is enough.
This is the technical reality behind those ads that follow you around the internet. But it’s not just ads. In 2020, Denver police had no suspects in a fatal arson. They obtained a reverse keyword warrant — an order requiring Google to reveal everyone who had searched for the address of the house in the fifteen days before the fire. Google produced a list. Police identified three teenagers. One of them, Gavin Seymour, was charged and eventually convicted.
The Colorado Supreme Court upheld the evidence in 2023 — the first state high court to rule on reverse keyword warrants. The court acknowledged the warrant was “constitutionally defective” but let the evidence stand under a good-faith exception. Your search history is evidence. Searching while signed into Google makes you identifiable.
Three things. All today.
Install uBlock Origin on Firefox. Not Chrome — Google removed uBlock Origin from the Chrome Web Store in late 2024 as part of its Manifest V3 transition, and permanently disabled all remaining Manifest V2 extensions in mid-2025. A limited version called uBlock Origin Lite exists for Chrome, but it blocks significantly less. If you’re still using Chrome as your primary browser, this is a reason to switch. Firefox still supports the full extension and has committed to keeping it. uBlock Origin blocks trackers, ads, and known malicious domains. It is free and open-source.
Switch your default search engine to DuckDuckGo. DuckDuckGo doesn’t log your searches. When you search on Google, your query is tied to your account, your IP address, your device, and your browsing profile. DuckDuckGo processes the query and returns results without recording who asked. It’s not perfect — it pulls results from Bing — but the privacy difference is structural.
Test your browser fingerprint at coveryourtracks.eff.org — if you haven’t already. Record the result in your field journal. Then install uBlock Origin, and run the test again. Compare.
If you’re Tier 2 or 3 in your threat model, go further. Switch to Firefox if you haven’t already. Enable Enhanced Tracking Protection in strict mode — it’s in Settings → Privacy & Security. Try Firefox Multi-Account Containers, which lets you isolate different activities into separate containers so your banking session can’t see your social media cookies. Enable DNS over HTTPS — in Firefox, go to Settings → Privacy & Security → scroll to DNS over HTTPS and select “Max Protection.” This encrypts your DNS queries so your ISP can’t see which domains you’re visiting.
A note about VPNs, because I know you’re wondering.
A VPN encrypts your internet traffic between your device and the VPN server. This hides your browsing from your ISP and your local network. It does not make you invisible. The VPN provider can see your traffic instead of your ISP — so you’re choosing who to trust, not eliminating trust. VPNs matter most on public Wi-Fi, in situations where you don’t trust your network, or when you want to prevent your ISP from logging the sites you visit.
If you’re going to use one, use Mullvad or ProtonVPN. Mullvad doesn’t require an email address to sign up — you get a random account number. You can pay with cash mailed in an envelope. ProtonVPN is based in Switzerland, has a free tier, and integrates with other Proton services. Both have been independently audited. Both have no-log policies that have held up under legal pressure. Most of the VPNs you see advertised online are owned by companies you should not trust with your traffic.
You can now see more clearly how you’re tracked — through your location, your data, your passwords, your messages, your identity, and your browser. But there’s a skill that matters as much as all of these combined, and it has nothing to do with technology.
It’s about what you believe. The most sophisticated surveillance infrastructure in history is less dangerous than a population that can’t tell truth from fabrication.
Summary
Incognito mode only hides activity from other users of your device — your ISP, websites, and trackers can still see everything. Your browser’s unique combination of settings (plugins, fonts, resolution, hardware) creates a fingerprint that tracks you across sites without cookies or logins. Reverse keyword warrants can compel search engines to reveal who searched for specific terms. The practical defenses: Firefox with uBlock Origin (not Chrome — Google removed full uBlock Origin support in 2024–2025), DuckDuckGo as default search, and for higher threat models, Enhanced Tracking Protection, Multi-Account Containers, and DNS over HTTPS. VPNs shift trust from your ISP to the VPN provider — Mullvad and ProtonVPN are the recommendations.
Action Items
- Test your browser fingerprint at coveryourtracks.eff.org — record the result in your field journal
- Install uBlock Origin on Firefox (free, open-source — blocks trackers, ads, and malicious domains)
- If still using Chrome as primary browser, switch to Firefox — Chrome no longer supports full uBlock Origin
- Switch default search engine to DuckDuckGo (doesn’t log searches)
- Install uBlock Origin, then re-run the fingerprint test and compare results
- Tier 2/3: Switch to Firefox if you haven’t already; enable Enhanced Tracking Protection (strict mode) in Settings → Privacy & Security; try Firefox Multi-Account Containers; enable DNS over HTTPS (Settings → Privacy & Security → DNS over HTTPS → “Max Protection”)
Case Studies & Citations
- People v. Seymour (Colorado, 2020/2023) — Denver police obtained a reverse keyword warrant requiring Google to reveal everyone who searched for a specific address in the fifteen days before a fatal arson. Three teenagers identified; Gavin Seymour charged and convicted. Colorado Supreme Court upheld the evidence in 2023 — first state high court to rule on reverse keyword warrants. Court acknowledged the warrant was “constitutionally defective” but let evidence stand under good-faith exception.
- Google Manifest V3 transition (2024–2025) — Google removed uBlock Origin from the Chrome Web Store in late 2024 and permanently disabled all remaining Manifest V2 extensions in mid-2025. uBlock Origin Lite (Manifest V3 compliant) exists but blocks significantly less. Firefox committed to continued Manifest V2 support.
- Browser fingerprinting — EFF’s Cover Your Tracks tool demonstrates that most browsers are unique among hundreds of thousands of samples based on plugins, fonts, screen resolution, language settings, and hardware configuration. Trackers use this fingerprint to correlate visits across sites without cookies or login.
Templates, Tools & Artifacts
- Cover Your Tracks (EFF) — Browser fingerprint test at coveryourtracks.eff.org. Shows how many bits of identifying information your browser broadcasts. Run before and after installing uBlock Origin to compare.
- uBlock Origin — Free, open-source browser extension that blocks trackers, ads, and malicious domains. Full version available on Firefox (recommended) and Brave. Chrome limited to uBlock Origin Lite (reduced functionality).
- DuckDuckGo — Search engine that doesn’t log searches or tie queries to user profiles. Pulls results from Bing. Privacy difference from Google is structural, not cosmetic.
- Firefox Multi-Account Containers — Extension that isolates browsing activities into separate containers (e.g., banking separate from social media). Prevents cross-site cookie tracking between contexts.
- DNS over HTTPS — Firefox setting that encrypts DNS queries, preventing your ISP from seeing which domains you visit. Enable in Settings → Privacy & Security → DNS over HTTPS → “Max Protection.”
- Mullvad VPN — No email required to sign up (random account number). Accepts cash payment by mail. Independently audited. No-log policy held up under legal pressure.
- ProtonVPN — Swiss-based. Free tier available. Integrates with Proton Mail and other Proton services. Independently audited. No-log policy held up under legal pressure.
Key Terms
- Browser fingerprinting — The practice of identifying users by the unique combination of their browser’s configuration: plugins, fonts, screen resolution, language settings, hardware. Nearly as unique as a physical fingerprint. Does not require cookies or login. Testable at coveryourtracks.eff.org.
- Reverse keyword warrant — A court order requiring a search engine to reveal all users who searched for specific terms within a given timeframe. Used in the Seymour case (2020). The Colorado Supreme Court was the first state high court to rule on their admissibility (2023).
- Manifest V3 — Google’s updated extension framework for Chrome, which restricts the capabilities of ad blockers and privacy tools. Caused the removal of full uBlock Origin from Chrome. Firefox is not affected.
- VPN (Virtual Private Network) — Encrypts internet traffic between your device and a VPN server, hiding browsing from your ISP and local network. Shifts trust from ISP to VPN provider — does not eliminate the need for trust. Most useful on public Wi-Fi or when ISP logging is a concern.
- DNS over HTTPS — Encrypts the domain name system queries your browser makes, preventing your ISP from seeing which websites you visit. Available in Firefox under Privacy & Security settings.