PSA: Brave leaks graphics card model to websites

Through HTML canvas, Brave leaks the exact make and model of the user’s graphics card. Try it on CreepJS and let me know your results.

This is a very particular and isolating aspect of your machine to be disclosed. This must be an oversight of sorts, right?

1 Like

Not much to do. If you feel uncomfortable you may need to switch to another browser. Using that tool I was able to see my installed extensions AFAIR[1].


  1. AFAIK, but instead of “know” it’s “remember”. ↩︎

Also

  • WebGPU is currently still enabled in Brave by default. As far as I know, Brave provides no canvas farbling whatsoever for it (only for WebGL and Canvas2D). Also, it is possible to read the GPU vendor and rough architecture via await (await navigator.gpu.requestAdapter()).requestAdapterInfo().

Interesting.
Even with maximum privacy/security related settings on Brave’s secret(inprivate) mode, it still leaks my exact GPU model.

Mullvad browser definitely does not.

Once again, I appreciate how strong Mullvad/Tor’s antifingerprinting capabilities are.

You can activate the advanced anti-fingerprinting mode from brave flags, which should hide it from WebGL, but that might make you more fingerprintable since very few people use it.

1 Like