It doesn’t seem to be very good, but don’t worry, just keep prompting Claude and I’m sure you’ll get it sorted out.
Jokes aside, it’s cool but it’s not useful if it’s the first time I visit and I see I have 10+ past visits from all around the world… obviously this is not reliable and I wouldn’t use it for anything, much less anything serious.
Why actually try to understand a problem space? Far easier to prompt a turd into existence, polish it up with a cliché marketing page, and collect public validation from your fellow “hackers”
I’ve visited 292 times. From Melbourne, Athens, Piraeus, Paris, Munich, Vantaa, Berlin and Kuala Lumpur. I’ve used Chrome, Firefox and Safari on both mobile and desktop.
What’s even more impressive is I’ve made all of those visits from all of those cities in the last few minutes.
This helps you see how your browser tries to block or deflect fingerprint and trackers. I miss their "You are one of x,000 users" from the old site but it still gives a nice summary of bits of info your browser leaks and how fingerprinting basically works.
Apparently I went from Germany to UK in 29 minutes, pretty good.
It's a 99.5% declared confidence and says it used 30+ signals.
Assuming you've a list of VPN IP addresses, and travel times between countries, I reckon you should be able to rule out some false positives.
Would be interested to know what the "signals" were that produced the match.
I'm on domestic broadband in the UK (IPv4), according to dnschecker they're on a mainstream mobile provider in Germany. Could be a private tunnel, but those would be rare. Which raises the question of how the confidence rating is made.
I like the general page presentation, a good landing page except that you'll tend to put off everyone who gets a bad result for the example. That might be turned around with something showing "if this isn't you, well done on your browser security" and maybe some compelling stats on confirmed matches from testing?
Visited for the first time and it said I already visited 800+ times with a 99.5% accurancy - not very promising.
From the code this also looks like very simple client-side fingerprinting + IP information?
It has 99.5% confidence this is my 10th visit. I've hit refresh once, but the rest aren't me. My other "visits" are from many countries, saying I've changed browser, IP, and location. They are using the same OS and browser though.
Seeing as everyone is apparently seeing themselves having visited multiple times when it wasn't them, including me, I'm very happy with the privacy of this system =) It cannot effectively track me
It shows I've visited twice already, from different countries, IPs and browsers. I don't think this works. This open source one does work between incognito and normal session: https://fingerprintjs.github.io/fingerprintjs/
Works great, my device visited over 100 times already
edit: not only that, under past visits I can now see the ip address of other visitors, together with their rough location and browser setup. You may want to remove the "gdpr compliant" from the website :)
Don’t worry, it was 0/2 in detecting my browser or OS, like not even close, and I don’t do anything to obfuscate that, so it’s probably accidentally compliant
People in the comment section has noted the site to recognize multiple page visits from them even though this is their first time visiting the site, did you test your service yourself on different browsers / os / devices ?
Jokes aside, it’s cool but it’s not useful if it’s the first time I visit and I see I have 10+ past visits from all around the world… obviously this is not reliable and I wouldn’t use it for anything, much less anything serious.
Anecdotally speaking, this is the case for most new Show HNs now :^)
https://amiunique.org/fingerprint
What’s even more impressive is I’ve made all of those visits from all of those cities in the last few minutes.
You may have a bug.
I think the 'unique' part of fingerprinting here isn't working unfortunately.
You have to be able to understand your core technology/IP/logic - I feel that must have been significantly overlooked here.
It's a red flag if you hide behind a contact form with no reachability beyond that whatsoever.
And as other said: 99.5% accuracy means you should have millions of working fingerprints, since mine and others are faulty as hell.
This helps you see how your browser tries to block or deflect fingerprint and trackers. I miss their "You are one of x,000 users" from the old site but it still gives a nice summary of bits of info your browser leaks and how fingerprinting basically works.
It's a 99.5% declared confidence and says it used 30+ signals.
Assuming you've a list of VPN IP addresses, and travel times between countries, I reckon you should be able to rule out some false positives.
Would be interested to know what the "signals" were that produced the match.
I'm on domestic broadband in the UK (IPv4), according to dnschecker they're on a mainstream mobile provider in Germany. Could be a private tunnel, but those would be rare. Which raises the question of how the confidence rating is made.
I like the general page presentation, a good landing page except that you'll tend to put off everyone who gets a bad result for the example. That might be turned around with something showing "if this isn't you, well done on your browser security" and maybe some compelling stats on confirmed matches from testing?
Visited for the first time and it said I already visited 800+ times with a 99.5% accurancy - not very promising. From the code this also looks like very simple client-side fingerprinting + IP information?
But as others mentioned, it is far from being accurate. I got the same as others, multiple visits from multiple countries.
I'd love to use a reliable system like this to detect returning fake, banned, and bot users on my services.
Works great! Thank you for fighting for users anonymity
edit: not only that, under past visits I can now see the ip address of other visitors, together with their rough location and browser setup. You may want to remove the "gdpr compliant" from the website :)
It shows I've visited all around the world, lots of times.
Nope. Just once, and from one location.