We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.
Advertising Disclosure

vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

How to Stop Others from Tracking Your Browser Activity

Kristina Perunicic Former Managing Editor

As you browse the web, your browsing activities may be monitored and aggregated by third-party agents with or without your consent. The phenomenon is known as browser or online tracking, in which websites and advertisers team up to gather your browsing data in order to build up a detailed profile of your interests for commercial gain. It’s so stealthily done that you rarely get to experience the uncanny feeling of being watched; the feeling you get when you suddenly realize that lots of strangers are peeping at you through your windows or that you are being followed around by lots of salespeople in a store.

Techniques commonly used

They use all sorts of techniques such as web beacons, server logs, tracking scripts, user agents, cookies, and browser fingerprinting to track your browsing activities.

Web beacons

Web beacons are tiny graphic images embedded on web pages that alert the server when the page is loaded. Ad companies use these beacons to tell who opened a web page or email and when. This is why most email applications will ask you if you trust the sender before it displays images.

Server Logs

Server logs is another browser tracking technique used to keep track of requests web servers receive from browsers such as what page was loaded and when, what site the browser was on before it came to that page (http referrer), and the internet address (for location tracking).

Browser user agents

Browser user agents are small applications that reveal information about the browser properties and the underlying operating system. This allows advertisers to gather intelligence about the identity of website visitors.

Cookies

Cookies are the most prominent browser tracking technologies known to man. A cookie is basically a small string of text stored on your computer by the sites you visit that uniquely identifies your browser.

When a website sees the string of text is set in a cookie, it knows the browser is one it has seen before. Advertisers use this technology to monitor user browsing behavior in order to target ads.

As user awareness about the intrusiveness of cookies grew, browser developers responded by adding “private browsing” mode to their products. Independent developers also started creating privacy-preserving plugins, and users gradually regained control of their privacy by learning to clear or sidestep cookies.

Like a cat-and-mouse game, the ad companies, in turn, resorted to a new technique that hides information (cookies) in Adobe Flash, which can be stored or retrieved whenever a user accesses a page containing a Flash application.

Flash cookies

Like regular cookies, Flash cookies contain information that uniquely identifies your browser and can survive the clearing of normal cookies. The data hidden in the Flash cookies would then be used to restore the deleted normal cookies. Ad agencies relied on this clever tactic for a few years until researchers busted their shady practices.

Browser Fingerprint

In recent times, advertisers have shifted to a new powerful form of tracking that has more enduring information about user identity even if cookies are turned off or completely erased. This new technique is called browser or device fingerprinting. It allows a website to identify devices or visitors to the site via user browser configuration settings or other discernible characteristics. For example, if you visited a website yesterday and visit it again today, you could be identified by your browser fingerprint even if you cleared all cookies and disguised your IP address.

Browser fingerprinting stems from the concept of human fingerprinting used as a unique long-term marker of human identity. The assumption is that it would also be possible to uniquely distinguish between all computers on the Internet, without the explicit consent of the users themselves.

This is done by obtaining information about a user’s browser environment such as screen settings, browser name, version number, installed plugins, fonts and other properties in order to create a unique “fingerprint” of a user’s computer. The combination of these properties is unique for the vast majority of browsers.

Fingerprinting isn't always unpleasant though, it can be used to combat click fraud or for user authentication and fraud prevention especially in online banking and retail sites. However, fingerprinting also presents a potential threat to users' online privacy as it represents another front in a long-running battle to track users browsing behavior which can be quite intrusive if tied to any personally identifying information.

In the past, browser fingerprinting was limited to single browsers. However, researchers in early 2017 developed a state-of-the-art fingerprinting technique known as cross browser fingerprinting that is more accurate and works across multiple browsers on the same device. The implication is that even if you switch browsers, the ad companies can still recognize and track you.

How you can protect your privacy

Achieving device protection against fingerprinting can be a challenging task. Utilizing tools like NoScript or ScriptSafe to disable JavaScript and Flash can significantly decrease your vulnerability to fingerprinting. However, the difficulty lies in the fact that most websites depend on these technologies for proper functionality.

A more effective means of lowering the risk of having a unique fingerprint would be to ensure your browser configuration blends with the rest. The more your browser configuration settings closely align with others on the Internet, the harder it is to identify you.

This is already happening with mobile device browsers, which can’t be uniquely customized to the extent that computer browsers can. Tor browsers have also been found to be very effective against cross-browser fingerprinting. You may use tools such as AmIUnique (single browsers fingerprinting) and Uniquemachine (cross browser fingerprinting) to learn how identifiable you are on the Internet. The EFF’s Panopticlick tool can also show you how well your browser is protected against fingerprinting and tracking in general.

You can also use a VPN service to mask your IP address and encrypt your browsing data.

“CyberGhost” has an advantage in this context as it claims to have anti fingerprinting feature that when enabled can help mitigate browser fingerprinting. Although VPNs mask your IP address, they won’t necessarily protect you from invisible trackers and ads. To protect against ubiquitous ad tracking, use ad blockers such as uBlock origin or Ghostry and tracking blockers such as DoNotTrackMe, PrivacyBadger or Disconnect.

To sum it all, as long as advertising remains a vital element of the Internet business model, it is suffice to say that browser tracking in general and fingerprinting, in particular, are here to stay. You have no choice but to embrace privacy-preserving technologies (including VPN) if you really care about your privacy.

Editor's Note: We value our relationship with our readers, and we strive to earn your trust through transparency and integrity. We are in the same ownership group as some of the industry-leading products reviewed on this site: Intego, Cyberghost, ExpressVPN, and Private Internet Access. However, this does not affect our review process, as we adhere to a strict testing methodology.

Rank
Provider
Our Score
Discount
Visit Website
1
medal
9.9 /10
9.9 Our Score
Save 61%!
2
9.2 /10
9.2 Our Score
Save 83%!
3
9.7 /10
9.7 Our Score
Save 84%!
Privacy Alert!

Your data is exposed to the websites you visit!

Your IP Address:

Your Location:

Your Internet Provider:

The information above can be used to track you, target you for ads, and monitor what you do online.

VPNs can help you hide this information from websites so that you are protected at all times. We recommend ExpressVPN — the #1 VPN out of over 350 providers we've tested. It has military-grade encryption and privacy features that will ensure your digital security, plus — it's currently offering 61% off.

Visit ExpressVPN

We review vendors based on rigorous testing and research but also take into account your feedback and our affiliate commission with providers. Some providers are owned by our parent company.
Learn more
vpnMentor was established in 2014 to review VPN services and cover privacy-related stories. Today, our team of hundreds of cybersecurity researchers, writers, and editors continues to help readers fight for their online freedom in partnership with Kape Technologies PLC, which also owns the following products: ExpressVPN, CyberGhost, and Private Internet Access which may be ranked and reviewed on this website. The reviews published on vpnMentor are believed to be accurate as of the date of each article, and written according to our strict reviewing standards that prioritize professional and honest examination of the reviewer, taking into account the technical capabilities and qualities of the product together with its commercial value for users. The rankings and reviews we publish may also take into consideration the common ownership mentioned above, and affiliate commissions we earn for purchases through links on our website. We do not review all VPN providers and information is believed to be accurate as of the date of each article.

About the Author

Kristina Perunicic is a former editor for vpnMentor. She’s a cybersecurity expert with an interest in VPNs and their importance in the digital privacy landscape.

Did you like this article? Rate it!
I hated it! I don't really like it It was ok Pretty good! Loved it!
out of 10 - Voted by users
Thank you for your feedback

Please, comment on how to improve this article. Your feedback matters!

Leave a comment

Sorry, links are not allowed in this field!

Name should contain at least 3 letters

The field content should not exceed 80 letters

Sorry, links are not allowed in this field!

Please enter a valid email address