Privacy Check

Browser Privacy Check - Which Traces Do I Leave on the Web?

With the Browser Privacy Check, you can determine which traces you or your browser leave while surfing. Our test is intended to raise awareness of which data can be used by websites and advertisers to create a profile of you or to track your activities online.

To start the test, please click on the button above.

The Browser Check Finds Data in 7 Different Categories:

The Browser Check attempts to determine your local IP address (via WebRTC), your DNS server, and your public IP address. We also check whether you are accessing the site via a known proxy or Tor and if, in the past, your IP address was considered suspicious.

We use your IP address to determine your location and other location-related data.

Ads & Tracker
We check whether your browser allows advertisements and trackers.

Social Media
Through a neat trick, we're able to determine which social networks you are currently logged in to.

We determine information about your hardware, including your CPU, GPU, and (if on a laptop) current battery status.

In addition to hardware, we also determine what software you're using, including your operating system, browser, and plugins.

Compiling all this information, we're able to generate a browser fingerprint that is specific to you. In this manner, we show that you can also be tracked, even when using your browser's incognito mode.

The Browser Check also provides explanations and solutions for preventing tracking in each of the seven areas listed above.

Data Protection & Privacy

We take the protection of your data very seriously. In order to accurately test your browser's privacy, however, we need to make inquiries about some external services such as Google Analytics. Please do not start the test if you do not agree with this. With the exception of the browser fingerprint (which is created only after your active confirmation), we do not store any of the data we have collected.

Other languages:
Deutsch Italiano Français 
More about IT-Security
Best Password Manager - 12 Tools Reviewed
Phishing: Recognizing the Threat
Data Theft: What Is It? How Can I Protect Myself?
How To Remove Junk Files From Your Windows PC
VPN Leak Test - Is Your Private IP Public?
Browser Fingerprinting - What Is It and How Can I Protect Myself?
Best VPN - Review of 22 VPN Providers
Internet Censorship - Site Blocked in China, Russia or Turkey?
Cyber Attacks - 3 Current Threats and Countermeasures
Password Generator - Generate a Secure Password
Password Checker - How Secure Is My Password?
Darknet - What Is It and How Can I Access It?
Data Breaches - What Is a Data Leak? Have You Been Affected?
Internet Pitfalls - The 7 Biggest Dangers Online
Data Recovery - Restoring Deleted Files
Secure Messengers - The 5 Best Alternatives to WhatsApp
Anonymous Search Engines - 3 Alternatives to Google
Doxing - What It Is and How You Can Protect Yourself
Privacy Browsers: The Best Browsers for Maximum Security
Two-Factor Authentication - This is how you secure your accounts
Ad Blocker - How to Protect Yourself From Annoying Ads
Secure Password - What Makes a Strong Password?
Do Not Track - What It Is and How It Can Protect You
Manage Passwords - Best Way to Store Passwords
Anonymity Online: Tor and the Tor Browser
Identity Theft on The Web – How To Protect Yourself
Best Cloud Backup - 7 Online Backup Providers Reviewed
Best Antivirus Software - 11 Programs Reviewed
How To Change Your IP Address - 3 Simple Ways
Email hacked? How To Find Out if Your Email Has Been Hacked
Anonymous Browsing - How to Surf Anonymously Online
Hide IP - How to Hide My IP Address