You are here

Chameleon highlights and protects you from browser fingerprinting in Chrome

Browser fingerprinting refers to methods to profile a browser based on information transferred automatically when connections are made to websites or services, or generated with the help of scripts and technologies.

It is unclear how widely browser fingerprinting is being used on the Internet but it is clear that it is used by some companies to track users online.

Often, it is used in conjunction with traditional tracking methods such as cookies or LSO.

I have analyzed Canvas Fingerprinting yesterday, and Chameleon for Chrome was one of the extensions mentioned in the guide.

While it does not protect against this particular method yet -- it only highlights the use -- it is designed to highlight and protect you against fingerprinting attacks.


chameleon for chrome

Chameleon is not available on the Chrome Web Store which means that installation of the extension is not as straightforward as usual. Here is what you need to do to install it in Chrome or Chromium-based browsers:

  1. Visit the GitHub project page and download the latest working version to your system. You find the download link under Installation on the main page (scroll down).
  2. Extract the zip file to a local directory.
  3. Open the Extensions Manager by loading chrome://extensions/ in Chrome.
  4. Check the Developer Mode box in the top right corner of the screen.
  5. Select Load Unpacked Extensions from the menu and browse to the chrome folder of the directory you have installed the extension to.
  6. Follow the instructions to complete the installation.


chameleon chrome extension

Chameleon adds an icon to Chrome's main toolbar that indicates if the extension is active, and how many tracking elements it has discovered on the active page.

As far as detection is concerned, it is currently supporting the following fingerprinting techniques:

  1. window.navigator values
  2. window.screen values
  3. date/time queries
  4. font enumeration
  5. canvas image data extraction

On the protection side of things, it supports the following (meaning it will block requests or modify them):

  1. request header values
  2. window.navigator values
  3. window.screen values
  4. date/time queries

The developer plans to add additional techniques to the extension including CSS media queries, JavaScript rendering engine differences or checksum generations if the browser allows for that.

When you click on the icon it displays the property access count and scripts used on the page in a summary at the top, and below that the list of hostnames and which properties they have accessed.

Not all requests are used to fingerprint the browser or user. Websites may for instance requests the window width and height to display contents properly in the browser window.

Tip: you may want to use a script blocker if you notice hostnames that are used a lot while you are browsing the Internet. You can use an add-on like HTTP Switchboard for that (read our review of the extension here, and the review of uBlock here which is a lightweight alternative).

You can disable the extension at any time with a click on its icon and the selection of disable in its interface. That's also the way how you enable it again.


Chameleon is an excellent extension for the Chrome web browser that is informing you if a website uses techniques that can be used to fingerprint the browser.

Besides providing you with information about these techniques, it is also protecting you against some of them automatically.

This article was first seen on ComTek's "TekBits" Technology News


Theme by Danetsoft and Danang Probo Sayekti inspired by Maksimer