How Websites Track You: Cookies, Fingerprints, IP & More

Modern tracking has evolved far beyond cookies. Here's the complete picture.

The Tracking Stack: Seven Layers of Identity

Modern web tracking is a layered system where each method backs up the others. If one tracking vector is blocked or cleared, advertisers fall back to the next. Understanding all seven layers explains why cookie-blocking alone doesn't stop tracking and what it actually takes to be untrackable.

  1. IP address: Present in every HTTP request. Used for geolocation, household targeting, and fraud detection. Persists through cookie clears and incognito sessions.
  2. First-party cookies: Set by the site you're visiting. Used for login sessions, preferences, and analytics. Cleared by browser cookie deletion. Blocked by private browsing per-session.
  3. Third-party cookies: Set by embedded trackers (ad networks, social widgets). Major browsers are phasing these out — Chrome completed third-party cookie deprecation, Firefox and Safari blocked them earlier.
  4. Browser fingerprint: A passive identifier assembled from browser configuration, hardware signals, and rendering characteristics. Can't be cleared like cookies. Changes slowly. See below for detail.
  5. Local storage / IndexedDB: Persistent storage that survives cookie clears unless explicitly deleted. Used by some trackers as a cookie alternative.
  6. CNAME cloaking: First-party subdomains that secretly point to third-party trackers via DNS CNAME records. Bypasses third-party cookie blocking because the cookie looks first-party to the browser.
  7. Cross-device linking: Correlating identity across your phone, laptop, and TV using shared IP address (same home network), household targeting, and login sessions.

Cookie Tracking: Still the Foundation

Despite the decline of third-party cookies, first-party cookies remain the dominant tracking mechanism for any site you visit more than once. A first-party tracking cookie contains a unique identifier (UUID) set on your first visit. On every subsequent visit, the site reads that UUID and links your new session to your historical data — pages viewed, time on site, purchases, and behavioral events.

The transition away from third-party cookies has pushed the ecosystem toward first-party data strategies. Publishers now embed tracking code that sets first-party cookies in their own domain, while the data is actually sent to shared analytics and advertising platforms. CNAME cloaking is the technical mechanism enabling this: a publisher's DNS includes a CNAME record like analytics.publisher.com → analytics.provider.com, and the tracking cookie set by analytics.publisher.com appears first-party to the browser.

Effective cookie tracking mitigations: ITP (Intelligent Tracking Prevention) in Safari limits first-party cookie lifetimes to 7 days. Firefox's Total Cookie Protection (enabled in Enhanced Tracking Protection Strict mode) partitions cookies per site, preventing cross-site tracking with first-party cookies. uBlock Origin in medium/hard mode blocks tracking scripts before they can set any cookies. Check your HTTP headers to see what your browser reveals to sites.

🛡️

See What Your Browser and IP Are Exposing

Check your IP address, HTTP headers, and run a DNS leak test to understand your tracking exposure.

Hide My IP Now

Browser Fingerprinting: The Cookie-Free Tracker

Browser fingerprinting collects dozens of technical attributes from your browser without storing anything on your device. The fingerprint is computed from: Canvas API rendering (GPU-specific pixel output), WebGL renderer information, Web Audio API processing, installed fonts (detected via CSS or Canvas), screen resolution, color depth, pixel ratio, timezone, language, platform, User-Agent, battery level (on supported devices), connection type, and touch support.

Research by the EFF's Cover Your Tracks project found that over 83% of browsers tested had a unique fingerprint. When combined with IP data, cross-site fingerprint matching accuracy approaches 95%+ for most users.

The AdTech industry has invested heavily in fingerprinting as a cookie alternative. The IAB's proposed PARAKEET and FLEDGE frameworks, Google's Privacy Sandbox Topics API, and Meta's Conversion API all seek to maintain ad targeting utility as cookies decline. Fingerprinting — being passive and technically difficult to block — is a key element of the post-cookie tracking landscape.

Strongest countermeasures: Tor Browser standardizes fingerprinting API outputs to be identical across all Tor Browser users. Brave randomizes Canvas and WebGL fingerprints per session. Firefox with privacy.resistFingerprinting = true spoofs many fingerprinting APIs. These approaches trade some functionality for meaningfully reduced trackability.

IP-Based Tracking and Household Targeting

IP-based tracking is the method most impervious to browser-level privacy settings. Your IP address is transmitted with every HTTP request — browsers have no API to hide it, and no privacy setting prevents it. This makes IP tracking the backstop layer when all other methods are blocked.

Household targeting, in particular, is a growing area of IP-based tracking. All devices in a home share the same public IP address (through NAT). Advertisers use this to:

IP data enrichment from data brokers takes this further. Matching your IP to third-party consumer databases can link your internet connection to public records data — voter registration, property ownership, vehicle records — providing a household-level identity profile without any cookies or logins.

Check your current IP address and run an IP lookup to see what profile your connection currently generates.

Defending Against Modern Tracking

A layered defense approach addressing each tracking vector:

Special Offer

Frequently Asked Questions

Does deleting cookies stop tracking?

It disrupts cookie-based tracking but leaves IP, fingerprint, and local storage tracking intact. After clearing cookies, your fingerprint immediately relinks your browsing history if you visit the same sites. IP-based tracking is entirely unaffected by cookie deletion.

What is CNAME cloaking and why is it a privacy problem?

CNAME cloaking uses DNS CNAME records to make third-party trackers appear as first-party subdomains. When your browser sees <code>analytics.site.com</code> setting a cookie, it treats it as first-party — bypassing third-party cookie blocking. ITP in Safari and Firefox Total Cookie Protection have implemented CNAME cloaking detection to partially address this.

Can websites track me even if I use a VPN?

Yes. A VPN hides your real IP but doesn't prevent cookie-based tracking (cookies persist through VPN use), fingerprint-based tracking (your browser fingerprint is unchanged), or login-session tracking (being logged into Google or Facebook de-anonymizes you regardless of VPN). A VPN is one tool in a multi-layer defense, not a complete tracking solution.

What is the most privacy-respecting mainstream browser?

Brave offers the strongest privacy defaults out of the box for a Chromium-based browser: built-in ad/tracker blocking, fingerprint randomization, and global privacy network (Brave's opt-in VPN/proxy layer). Firefox with uBlock Origin and privacy extensions is comparable or superior in some areas and benefits from not being based on Google's Chromium engine. Tor Browser is the most private but impractical for daily use.

Special Offer×