A practical explanation of what fingerprints are, what signals get used, and why cookies aren't required.
In most consumer/privacy discussions, yes. People often say "machine fingerprinting" when they really mean browser fingerprinting: a statistical ID built from what your browser and OS reveal through web APIs.
True hardware-serial fingerprinting (CPU serial, disk serial, MAC address, TPM ID) is generally not available to normal websites because the browser sandbox blocks it.
navigator.hardwareConcurrency)navigator.deviceMemory)No single item uniquely identifies you. The fingerprint comes from the combination.
Typically no. Fingerprinting exists specifically to work even when cookies are blocked or cleared. A common flow is:
1) JavaScript collects environment signals 2) Signals are hashed (or scored) into an ID 3) The ID is sent to a tracking / fraud / bot-detection service 4) Returning visits can be recognized probabilistically (even without cookies)
This is why fingerprinting can survive cookie deletion and sometimes incognito sessions.
In banking/fraud and enterprise security contexts, "device fingerprinting" often means a broader bundle of signals, such as:
Even here, it's usually still not raw hardware serial numbers—it's correlation across many weaker signals.
A common, "boring" setup (Windows + mainstream browser + common resolution) can blend in. Unusual combinations (rare resolution, uncommon fonts, distinctive GPU/driver quirks) can increase uniqueness.
Privacy irony: making your setup "special" can make you more fingerprintable.
In everyday use, "machine fingerprinting" usually means browser environment fingerprinting: a statistical signature built from browser/OS/rendering/behavior signals—often without cookies.
It's a probabilistic identity, not a magic hardware-serial readout.
Two popular test sites that show fingerprint uniqueness:
"Unique" there means "statistically rare," not "personally identified."