Whenever you connect with a program to an Internet resource, a web browser to a website for instance, information are revealed to the server hosting the resource.
That's automatic, and often not the only thing happening. If that site loads resources from other servers, they too gain information, and depending on what is running on the site and supported by the browser, additional information may be revealed.
Usually, information such as your computer's IP address, a user agent that reveals browser, operating system and language, and a handful of other information are revealed automatically during connections.
While there are methods available to hide or block certain information from being made known to sites you connect to, there are also methods that sites can use to find out more about you.
Online privacy tests help you find out what kind of information your browser (or other programs) reveal. The information itself is useful, but you can also act upon it, for instance by disabling certain features in the program you are using if you don't require them.
You find two listings below. The basic tests listing contains resources that perform simple tests (usually one) only while the advanced tests listing resources that run a series of tests.
Add-ons / Plugins
|Firefox Addon Detector||Checks if certain Firefox add-ons are installed||https://thehackerblog.com/addon_scanner/|
|Flash Player System Test||Lists information about Flash Player||https://www.browserleaks.com/flash|
|Flash Player Test||Checks whether Adobe Flash Player is installed||https://www.adobe.com/software/flash/about/|
|Java Test||Tests whether Java is installed||https://www.java.com/en/download/installed.jsp|
|Silverlight Test||Reveals information about Silverlight||https://www.browserleaks.com/silverlight|
|Email IP Leak||Finds out whether your email provider leaks your IP address||http://emailipleak.com/|
|Email Privacy Tester||Tests whether your email client leaks back information to the sender of an email||https://emailprivacytester.com/|
|Email Trace||Run reverse email look ups or email header traces||http://www.ip-adress.com/trace_email/|
|Have I been pwned||Check if an email account has been compromised in a data breach.||https://haveibeenpwned.com/|
|Check if your email address information have been leaked as part of an attack.|
|Battery Status API||Tests the status of the battery||https://pstadler.sh/battery.js/|
|Canvas Fingerprinting||Checks whether Canvas can be used to fingerprint the browser||https://www.browserleaks.com/canvas|
|Hard Drive Fill Test||Tests whether sites can fill your hard drive with data||http://www.filldisk.com/|
|HTML5 Features Detection||Checks HTML5 capabilities||https://www.browserleaks.com/modernizr|
|HTML5 Geolocation Test||Tries to look up your location in the world||https://www.browserleaks.com/geo|
|HTML5 Test||Tests the browsers HTML5 capabilities||http://html5test.com/|
|WebRTC Leak Test||Tests whether local or public IP addresses are leaked||https://www.perfect-privacy.com/webrtc-leaktest/|
|WebRTC Test||Tests WebRTC capabilities||https://test.webrtc.org/|
|Check my Torrent IP||Check which IP address is revealed to peers and trackers when you use torrent clients.||https://torguard.net/checkmytorrentipaddress.php|
|Content Filters and Proxy Test||Tests network filters, TOR browser and local content filters||https://www.browserleaks.com/proxy|
|DNS Leak Test||Tests whether your IP address is leaked by DNS||https://www.dnsleaktest.com/|
|DNS Spoofability Test||Comprehensive analysis of DNS resolving nameservers||https://www.grc.com/dns/dns.htm|
|IP Magnet||Reveal which IP address BitTorrent clients reveal to peers and trackers.||http://ipmagnet.services.cbcdn.com/|
|Whois Test||Reveals IP address, host name, IP address location information and other IP related information||https://www.browserleaks.com/whois|
|Google Account History||Display Google-related activities such as your search history or location history. Includes deletion options.||https://www.google.com/settings/accounthistory|
|Facebook Activity Log||Lists your Facebook activity such as likes, posts and such. You can edit any item or remove them from the log.||https://www.facebook.com/me/allactivity|
|YouTube Video History / Search history||Displays videos that you have watched and your YouTube search history.||https://www.youtube.com/feed/history|
|Bad SSL||Tests how the browser handles certain SSL certificates and other SSL-types||https://badssl.com/|
|FREAK Attack: Client Check||Tests whether your browser is vulnerable to the Freak Attack||https://freakattack.com/clienttest.html|
|Heartbleed test||Tests a server for the Heartbleed vulnerability||https://filippo.io/Heartbleed/|
|Runs a Fallback Vulnerability test|
|How's My SSL||Checks SSL support and provides a rating||https://www.howsmyssl.com/|
|SSL Check||Reveals the SSL cipher used to connect to the website||https://www.fortify.net/sslcheck.html|
|SSL Cipher Suite Details||Lists all cipher suites supported by the browser||https://cc.dcsec.uni-hannover.de/|
|Weak Diffie-Hellman and the Logjam Attack||Tests whether your browser is vulnerable to the Logjam attack||https://weakdh.org/|
|BrowserRecon||Fingerprinting test based on user agent||http://www.computec.ch/projekte/browserrecon/?s=scan|
|Browser Referer Headers||Browser referer headers test suite.||https://www.darklaunch.com/tools/test-referer|
|Do Not Track||Detects support for Do Not Track||https://www.browserleaks.com/donottrack|
|Evercookie Test||Checks if persistent data can be saved to the local user system.||http://samy.pl/evercookie/|
|Popup Blocking Tests||Tests how well your browser handles (blocks) popups||http://www.kephyr.com/popupkillertest/index.html|
|Redirect test page||Run a series of redirect tests to find out how your browser handles those||https://jigsaw.w3.org/HTTP/300/Overview.html|
|System Fonts Detection||Uses CSS+JS, Flash, Silverlight or Java to detect fonts||https://www.browserleaks.com/fonts|
|Universal Plug n'Play (UPnP) Internet Exposure Test||https://www.grc.com/x/ne.dll?rh1dkyd2|
|Am I Unique||Tests whether the browser is unique by checking the following information: User-agent, Accept, Content Encoding, Content Language, List of Plugins, Platform, Cookies, Do Not Track, Timezone, Screen Resolution, Use of local storage, Use of session storage, Canvas, WebGL, Fonts, Screen resolution, Language, Platform, Use of Adblock||https://amiunique.org/fp|
|Browser Privacy Test||Runs a series of test including IP Leak, WebRTC leak, blacklist, DNS tests and more.||https://tenta.com/test/|
|Cross Browser Fingerprinting Test||Tests locality, operating system, screen resolution, time zone, User Agent string, HTTP Accept, Plugins, Fonts||http://fingerprint.pet-portal.eu/#|
|IP Leak||Runs the following tests: IP address, location, WebRTC IP detection, Torrent address detection, Geolocation detection, IP details, Geek details (user agent, referer, language, content encoding, document, system information, screen information, plugins, HTTP Request headers||https://ipleak.net/|
|IP Lookup||Checks IP address, browser user agent, referer||https://www.ghacks.net/ip/|
|Jondonym Full Anonymity Test||Tests IP, location, net provider, Reverse DNS, Cookies, Authentication, Cache (E-Tags), HTTP Session, Referer, Signature, User-Agent, SSL Session ID, Language, Content Types, Encoding, Do Not Track, Upgrade-Insecure-Requests||http://ip-check.info/?lang=en|
|Panopticlick||Tests Supercookies, Canvas Fingerprinting, Screen size and color depth, browser plugins, time zone, DNT header, HTTP Accept headers, WebGL fingerprinting, language, system fonts, platform, user agent, touch support and cookies||https://panopticlick.eff.org/|
|A whole battery of tests including: Stealth Test, Browser Test, Trojans Test, Advanced Port Scanner, Exploits Test, PC Flank Leaktest|
|Onion Leak Test||For CORS and WebSocket Requests||http://cure53.de/leak/onion.php|
|Web Privacy Check||Displays the IP address, DNS, user agent and other data.||https://ipinfo.info/html/privacy-check.php|
Now You: Please help make this the best privacy test resource online by sharing resources not on this list already.
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats (video ads) or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.