Built-in configuration options to resist fingerprinting and improve privacy
Many browsers offer built-in settings that improve privacy without needing extensions or additional software. These settings can resist fingerprinting, disable WebRTC, limit cookie access, and restrict JavaScript features. No installation needed — just change settings in about:config or browser preferences.
privacy.resistFingerprintingThe most powerful single setting for fingerprint protection available in any browser. When enabled, Firefox automatically applies dozens of anti-fingerprinting measures at once:
en-US for all userswindow.devicePixelRatio to prevent display-based identificationnavigator.hardwareConcurrency (CPU cores) to 2To enable: open about:config in Firefox, search for privacy.resistFingerprinting, and set it to true.
Note: This setting may cause minor usability issues — for example, websites that detect your timezone for scheduling (Google Calendar, airline booking sites) will show UTC instead of your local time. You can add per-site exceptions using privacy.resistFingerprinting.exemptedDomains in about:config.
privacy.fingerprintingProtectionA newer, more granular alternative to resistFingerprinting introduced in recent Firefox versions. Instead of applying all protections at once, it lets you choose which fingerprinting vectors to protect against individually.
This is useful if resistFingerprinting breaks too many websites for your use case — you can enable only the protections you need (e.g., canvas noise and font restrictions) without forcing your timezone to UTC.
To configure: set privacy.fingerprintingProtection to true in about:config, then use privacy.fingerprintingProtection.overrides to specify which protections to enable or disable.
WebRTC (Web Real-Time Communication) is a browser technology used for video calls, voice chat, and peer-to-peer connections. The problem: it can bypass VPN tunnels and reveal your real IP address through STUN server requests — even when your VPN is working correctly.
This is one of the most common privacy leaks for VPN users in the US. Services like Google Meet, Zoom Web, Discord, and Facebook Messenger all use WebRTC.
media.peerconnection.enabled to false in about:config. This completely disables WebRTC.Trade-off: Disabling WebRTC breaks video calls and real-time communication on websites that use it (Google Meet, Discord web, Zoom web client, etc.). If you need these services, use Brave's partial restriction instead of fully disabling it.
Third-party cookies are the primary mechanism for cross-site tracking. When you visit a website, cookies from advertising networks (Google, Meta, etc.) are loaded alongside the page, allowing those networks to follow you across millions of websites. Blocking third-party cookies is one of the most impactful privacy settings you can change.
Nearly all browser fingerprinting relies on JavaScript APIs — canvas readback, WebGL rendering, font enumeration, screen size detection, and hardware queries all require JavaScript to execute. Disabling it eliminates the vast majority of fingerprinting techniques.
However, disabling JavaScript globally breaks almost every modern website. Online banking, social media, email clients, streaming services — nearly everything Americans use daily requires JavaScript to function.
javascript.enabled to false in about:config (global disable)Practical approach: Instead of disabling JavaScript globally, use uBlock Origin's per-site JavaScript blocking. Click the uBlock icon, then the </> button to disable scripts on the current site only. This lets you selectively block scripts on untrusted or suspicious sites while keeping your banking, email, and everyday sites functional.
If you use a VPN that only tunnels IPv4 traffic, your device may still connect to websites directly over IPv6 — exposing your real IPv6 address and bypassing the VPN entirely. This is a common leak, especially on US home networks where ISPs like Comcast, AT&T, and Verizon have widely deployed IPv6.
network.dns.disableIPv6 to true in about:configSet-NetAdapterBinding -Name "*" -ComponentID ms_tcpip6 -Enabled $falseNote: Most reputable VPN providers (Mullvad, ProtonVPN, IVPN) already handle IPv6 correctly — either tunneling it or blocking it. Check your VPN's IPv6 leak test before disabling it manually.
Websites can read your timezone offset through JavaScript (new Date().getTimezoneOffset()). If you're using a VPN server in Los Angeles (PST, UTC-8) but your device reports Eastern Time (EST, UTC-5), websites can detect the mismatch and flag your connection as suspicious.
To fix this, change your OS timezone to match your VPN server location:
timedatectl set-timezone America/Los_AngelesSimpler alternative: Enable privacy.resistFingerprinting in Firefox, which forces the timezone to UTC for all sites, eliminating the mismatch problem entirely.
Your browser's language setting is sent to every website through the Accept-Language HTTP header and is accessible via navigator.language. For US users, en-US is the most common value and provides the best anonymity. If your browser is set to a less common language (e.g., cs-CZ, ko-KR, or vi-VN), you become significantly easier to identify — even with other protections in place.
English (United States) [en-US] to the topEnglish (United States) to the top of the listEnglish (United States) to the topHTTPS encrypts the connection between your browser and the website, preventing your ISP, network administrators, and attackers from reading or modifying the data in transit. Enabling HTTPS-Only mode forces your browser to always use encrypted connections and warns you when a site only supports unencrypted HTTP.
edge://flags and enable "Automatic HTTPS"Tip: Start with privacy.resistFingerprinting in Firefox — it's the single most effective setting and handles many fingerprint vectors at once. If it breaks too many sites, try the newer privacy.fingerprintingProtection for granular control. Add cookie blocking, HTTPS-only mode, and WebRTC restrictions based on your specific needs.
Not every setting is available in every browser. This matrix shows native support, workaround-only options, and settings that are simply not available.
Firefox stands out with the most comprehensive native privacy settings. Chrome and Edge lack built-in fingerprint resistance entirely, while Brave includes strong defaults out of the box. Timezone changes require OS-level adjustment in all browsers, and Safari's language setting is controlled through macOS system preferences.
Every privacy setting comes with a trade-off. Some are invisible to your daily browsing, while others will break websites you rely on. This scale shows where each setting falls.
Settings on the left side of the scale are safe to enable for everyone — they improve privacy with zero impact on daily browsing. As you move right, the privacy gains increase, but so does the likelihood of breaking websites you depend on. Most users should enable everything up to "Cookie Policies" and stop there unless they have specific privacy needs.
Follow these four steps in order, starting with the easiest changes that provide the most benefit. You can stop at any step — each one adds meaningful protection on its own.
Each step builds on the previous one. Steps 1 and 2 are recommended for all users on any browser. Steps 3 and 4 are for Firefox users who want stronger protection and are willing to deal with occasional website issues.