| Browser identified | +8 | Version + engine narrows you to a small group |
| OS identified | +5 | Combined with browser, very specific |
| Screen resolution | +5 | Uncommon resolutions are rare identifiers |
| Language detected | +5 | Language + timezone combo is highly unique |
| Timezone detected | +5 | Narrows location independently of IP |
| DNT not set / disabled | +5 | Most users don't set it β slight signal |
| WebGL GPU exposed | +12 | GPU model+driver is nearly unique per device |
| Canvas fingerprint | +10 | GPU+OS rendering differences = unique hash |
| Audio fingerprint | +8 | Audio hardware processing is device-unique |
| WebRTC local IP leaked | +20 | Critical β reveals real IP even through VPN |
| VPN/proxy detected | +25 | Hosting ASN or proxy flag from ip-api.com |
| Incognito detected | +15 | Storage quota trick reveals private mode |
| Plugins detected | +2 each | Plugin list is a strong fingerprint vector |
| Fonts detected | up to +15 | Installed font set is highly device-specific |
| Permission granted | +5 each | Camera/mic/geo access = high-value data |
| CPU β€ 2 cores | +5 | May indicate VM, bot, or old hardware |
| Bot signals (WebDriver etc) | +20β30 | Automation tools detected in window/navigator |
| AbuseIPDB score > 10% | +15β30 | IP has been reported for abusive behavior |
| Browser capabilities | +1 each | Active API count contributes to uniqueness |
| Connection type exposed | +3 | Network Information API reveals connection |