Browser Attributes
User-agent string, installed plugins, supported MIME types, Do Not Track settings, cookie and JavaScript capabilities, and language preferences.
Fraud Type Guide
Device fingerprinting is one of the most powerful tools for identifying bots, emulators, and repeat offenders. Learn how it works and why it is essential for modern fraud detection.
Device fingerprinting is a technique that creates a unique identifier for a device by collecting and combining dozens of attributes — screen resolution, installed fonts, browser plugins, GPU model, timezone, language settings, audio processing characteristics, and more. Together, these attributes form a "fingerprint" that is highly unique to each individual device.
Unlike cookies or device advertising IDs, fingerprints cannot be easily deleted or reset by users or fraudsters. This persistence makes device fingerprinting invaluable for ad fraud detection, where fraudsters routinely clear cookies, rotate IPs, and reset device identifiers to avoid being recognised.
In the context of ad fraud, device fingerprinting serves as a foundational detection layer. It reveals when the same physical device interacts with your ads under multiple identities, when an emulator impersonates real hardware, and when claimed device attributes are inconsistent with actual capabilities.
A comprehensive device fingerprint analyses multiple layers of signals that are difficult for fraudsters to spoof simultaneously.
User-agent string, installed plugins, supported MIME types, Do Not Track settings, cookie and JavaScript capabilities, and language preferences.
Rendering differences in HTML5 Canvas and WebGL produce unique outputs based on the GPU, driver version, and operating system — extremely difficult to replicate across devices.
The Web Audio API processes sound slightly differently on each device due to hardware and software variations, producing a unique audio fingerprint.
CPU core count, device memory, screen resolution and colour depth, GPU renderer string, and available sensors (accelerometer, gyroscope) all contribute to device identification.
The set of installed fonts varies significantly between devices and operating systems, providing a high-entropy signal that is difficult to fake comprehensively.
Connection type, TCP/IP stack behaviour, TLS fingerprint, and timing-based signals provide additional layers that round out the device profile.
Device fingerprinting exposes fraud through several mechanisms that work together to identify both simple and sophisticated attacks.
When a device clears cookies and rotates IP addresses, its fingerprint persists. This reveals the same device clicking your ads repeatedly under different identities.
Emulated devices produce fingerprints with telltale anomalies — missing sensors, generic GPU strings, inconsistent rendering results — that distinguish them from real hardware.
When a fraudster claims to be on an iPhone but the fingerprint reveals Android-specific APIs, Linux kernel timing, or desktop GPU characteristics, the inconsistency signals fraud.
Groups of devices with suspiciously similar fingerprints — identical font lists, same GPU renderer, matching rendering outputs — indicate a bot farm or emulator array.
Device fingerprinting complements other fraud detection techniques, each covering different blind spots.
Cookies can be deleted, blocked, or faked. Device fingerprints persist across sessions and cannot be cleared by the user, providing more reliable identification.
IP addresses change with VPNs, proxies, and mobile networks. Fingerprinting identifies the device itself regardless of which network it connects through.
Behavioural analysis detects how a user interacts; fingerprinting identifies what device they use. Together they provide much stronger fraud detection than either alone.
CAPTCHAs disrupt user experience and can be solved by CAPTCHA farms. Fingerprinting works passively in the background with no impact on genuine visitors.
Opticks collects and analyses over 30 device attributes in real time, building comprehensive fingerprints that are extremely difficult for fraudsters to spoof.
Device fingerprints persist across campaigns, channels, and time periods — revealing patterns of fraudulent activity that single-campaign analysis would miss.
Fingerprinting works alongside IP intelligence, behavioural analysis, and network checks for multi-layered fraud detection that catches both simple and advanced threats.
Keep Exploring
See how Opticks uses device fingerprinting to expose bots, emulators, and repeat offenders across all your campaigns. No code changes required — install via Google Tag Manager in under five minutes.