They differ but overlap. Font probing can use DOM measurements or draw text to canvas and hash pixels. Canvas fingerprinting can include font choice as one factor, but canvas tests can also target GPU paths without listing every font.
What is Font Fingerprinting?
Font fingerprinting identifies a browser by discovering which fonts are available locally. Scripts measure how text renders with candidate font families; if metrics differ from a baseline fallback, the font is treated as present. The resulting bitstring or measurement set is hashed into a compact signature.
Table of Contents
How does font fingerprinting work?
Because sites cannot always read a full system font list directly, they probe indirectly. A hidden element is rendered with a test string using a target family and again using generic fallbacks. Width, height, or canvas pixel hashes that change imply the named font exists. Repeating this across hundreds of names yields a rare combination on many desktops, especially where design software installed extra families.
Font signals are client-side measurements, like other scripted probes. More independent font bits mean more statistical uniqueness across the population. Some privacy tools reduce that uniqueness by limiting exposed fonts or returning standardized lists. On mobile, font diversity is often lower than on creative workstations, so models temper weight for those platforms to avoid false positives.
Why does it matter for click fraud and ad fraud?
Automation and stripped-down environments often ship with small, predictable font sets. A headless cluster may report the same narrow list across thousands of sessions that pretend to be different users via proxies or VPNs. Fraud models use that uniformity alongside other signals to flag invalid clicks and form spam tied to click fraud or ad fraud.
Legitimate users also cluster, so font data rarely triggers a block by itself. It feeds into scores from vendors that explain how fraud is detected. For context on automation at scale, types of bots outlines common roles that leave device traces. Rapid font list changes on every page view are uncommon for humans and may indicate randomization scripts.
Frequently Asked Questions
-
Is font fingerprinting the same as canvas fingerprinting?
-
Can I stop font fingerprinting by blocking JavaScript?
Disabling script stops most probes, but it also breaks most sites. Privacy browsers take a middle path by narrowing what fonts leak while keeping pages usable.
-
Why would fraudsters care about fonts?
Large-scale bots want cheap defaults. Customizing fonts for every session costs effort. Defenders look for that laziness and for mismatches with claimed OS or user-agent data.
