← Home  |  ← Protection Tools

Browser Settings

Built-in configuration options to resist fingerprinting and improve privacy

How They Work

Many browsers offer built-in settings that improve privacy without needing extensions or additional software. These settings can resist fingerprinting, disable WebRTC, limit cookie access, and restrict JavaScript features. No installation needed — just change settings in about:config or browser preferences.

What They Can Protect

Key Settings

Firefox privacy.resistFingerprinting

The most powerful single setting for fingerprint protection available in any browser. When enabled, Firefox automatically applies dozens of anti-fingerprinting measures at once:

To enable: open about:config in Firefox, search for privacy.resistFingerprinting, and set it to true.

Note: This setting may cause minor usability issues — for example, websites that detect your timezone for scheduling (Google Calendar, airline booking sites) will show UTC instead of your local time. You can add per-site exceptions using privacy.resistFingerprinting.exemptedDomains in about:config.

Firefox privacy.fingerprintingProtection

A newer, more granular alternative to resistFingerprinting introduced in recent Firefox versions. Instead of applying all protections at once, it lets you choose which fingerprinting vectors to protect against individually.

This is useful if resistFingerprinting breaks too many websites for your use case — you can enable only the protections you need (e.g., canvas noise and font restrictions) without forcing your timezone to UTC.

To configure: set privacy.fingerprintingProtection to true in about:config, then use privacy.fingerprintingProtection.overrides to specify which protections to enable or disable.

Disable WebRTC

WebRTC (Web Real-Time Communication) is a browser technology used for video calls, voice chat, and peer-to-peer connections. The problem: it can bypass VPN tunnels and reveal your real IP address through STUN server requests — even when your VPN is working correctly.

This is one of the most common privacy leaks for VPN users in the US. Services like Google Meet, Zoom Web, Discord, and Facebook Messenger all use WebRTC.

Trade-off: Disabling WebRTC breaks video calls and real-time communication on websites that use it (Google Meet, Discord web, Zoom web client, etc.). If you need these services, use Brave's partial restriction instead of fully disabling it.

Third-party cookies are the primary mechanism for cross-site tracking. When you visit a website, cookies from advertising networks (Google, Meta, etc.) are loaded alongside the page, allowing those networks to follow you across millions of websites. Blocking third-party cookies is one of the most impactful privacy settings you can change.

Disable JavaScript

Nearly all browser fingerprinting relies on JavaScript APIs — canvas readback, WebGL rendering, font enumeration, screen size detection, and hardware queries all require JavaScript to execute. Disabling it eliminates the vast majority of fingerprinting techniques.

However, disabling JavaScript globally breaks almost every modern website. Online banking, social media, email clients, streaming services — nearly everything Americans use daily requires JavaScript to function.

Practical approach: Instead of disabling JavaScript globally, use uBlock Origin's per-site JavaScript blocking. Click the uBlock icon, then the </> button to disable scripts on the current site only. This lets you selectively block scripts on untrusted or suspicious sites while keeping your banking, email, and everyday sites functional.

Disable IPv6

If you use a VPN that only tunnels IPv4 traffic, your device may still connect to websites directly over IPv6 — exposing your real IPv6 address and bypassing the VPN entirely. This is a common leak, especially on US home networks where ISPs like Comcast, AT&T, and Verizon have widely deployed IPv6.

Note: Most reputable VPN providers (Mullvad, ProtonVPN, IVPN) already handle IPv6 correctly — either tunneling it or blocking it. Check your VPN's IPv6 leak test before disabling it manually.

Change Timezone

Websites can read your timezone offset through JavaScript (new Date().getTimezoneOffset()). If you're using a VPN server in Los Angeles (PST, UTC-8) but your device reports Eastern Time (EST, UTC-5), websites can detect the mismatch and flag your connection as suspicious.

To fix this, change your OS timezone to match your VPN server location:

Simpler alternative: Enable privacy.resistFingerprinting in Firefox, which forces the timezone to UTC for all sites, eliminating the mismatch problem entirely.

Change Browser Language

Your browser's language setting is sent to every website through the Accept-Language HTTP header and is accessible via navigator.language. For US users, en-US is the most common value and provides the best anonymity. If your browser is set to a less common language (e.g., cs-CZ, ko-KR, or vi-VN), you become significantly easier to identify — even with other protections in place.

HTTPS-Only Mode

HTTPS encrypts the connection between your browser and the website, preventing your ISP, network administrators, and attackers from reading or modifying the data in transit. Enabling HTTPS-Only mode forces your browser to always use encrypted connections and warns you when a site only supports unencrypted HTTP.

Tip: Start with privacy.resistFingerprinting in Firefox — it's the single most effective setting and handles many fingerprint vectors at once. If it breaks too many sites, try the newer privacy.fingerprintingProtection for granular control. Add cookie blocking, HTTPS-only mode, and WebRTC restrictions based on your specific needs.

Browser Compatibility Matrix

Not every setting is available in every browser. This matrix shows native support, workaround-only options, and settings that are simply not available.

Firefox Chrome Brave Safari Edge resistFingerprinting fingerprintingProtection Disable WebRTC Block 3rd Party Cookies Disable JavaScript Disable IPv6 Change Timezone Change Language HTTPS-Only Mode Native support Workaround / OS-level Not available

Firefox stands out with the most comprehensive native privacy settings. Chrome and Edge lack built-in fingerprint resistance entirely, while Brave includes strong defaults out of the box. Timezone changes require OS-level adjustment in all browsers, and Safari's language setting is controlled through macOS system preferences.

Privacy vs. Usability Trade-off

Every privacy setting comes with a trade-off. Some are invisible to your daily browsing, while others will break websites you rely on. This scale shows where each setting falls.

Settings Impact: Easy → Aggressive No breakage Sites will break HTTPS-Only Change Language Cookie Policies Disable IPv6 Change Timezone fingerprintingProtection resistFingerprinting Disable WebRTC Disable JavaScript Safe for everyone No visible impact Some trade-offs Minor site issues possible Significant breakage Video calls, banking may fail Start from the left and move right only as far as your needs require.

Settings on the left side of the scale are safe to enable for everyone — they improve privacy with zero impact on daily browsing. As you move right, the privacy gains increase, but so does the likelihood of breaking websites you depend on. Most users should enable everything up to "Cookie Policies" and stop there unless they have specific privacy needs.

Quick Start Guide

Follow these four steps in order, starting with the easiest changes that provide the most benefit. You can stop at any step — each one adds meaningful protection on its own.

1 Enable HTTPS-Only Mode All browsers Encrypts all connections. Zero breakage on modern websites. Impact: invisible | Breakage risk: none | Time: 30 seconds 2 Block Third-Party Cookies + Change Language to en-US All browsers Stops cross-site tracking by ad networks. Language blends you into the largest group. Impact: major tracking reduction | Breakage risk: very low | Time: 1 minute 3 Enable resistFingerprinting Firefox only Spoofs timezone, screen size, fonts, canvas, and more. The single most powerful setting. Impact: comprehensive fingerprint protection | Breakage risk: moderate | Time: 1 minute 4 Disable WebRTC + IPv6 (if using a VPN) Firefox / Brave Prevents your real IP from leaking through WebRTC or IPv6 when connected to a VPN. Impact: closes VPN leak vectors | Breakage risk: video calls break | Time: 2 minutes

Each step builds on the previous one. Steps 1 and 2 are recommended for all users on any browser. Steps 3 and 4 are for Firefox users who want stronger protection and are willing to deal with occasional website issues.

On This Page