Modern Chrome sends Sec-CH-UA, Sec-CH-UA-Platform, Sec-CH-UA-Arch on every request. The JS API exposes high-entropy versions on demand.
Client Hints test — every Sec-CH-UA your browser leaks
Live test
This card runs only the client hints probe. To run all six fingerprint surfaces at once, use the full browser fingerprint test.
What are Client Hints?
Client Hints are a family of HTTP request headers — Sec-CH-UA, Sec-CH-UA-Mobile, Sec-CH-UA-Platform, plus high-entropy variants like Sec-CH-UA-Platform-Version, Sec-CH-UA-Arch, Sec-CH-UA-Bitness, Sec-CH-UA-Full-Version-List, and Sec-CH-UA-Wow64 — that browsers send to identify themselves more precisely than the old freeform User-Agent string allowed.
The matching JavaScript API is navigator.userAgentData, with getHighEntropyValues() for the more revealing fields. Any anti-fingerprinting effort has to spoof both the JS API and the HTTP headers, otherwise a server-side script detects the mismatch.
How the test works
The test reads navigator.userAgentData.brands, .mobile, and .platform directly, then calls getHighEntropyValues() with all known high-entropy hints to retrieve platformVersion, architecture, bitness, model, fullVersionList, and wow64.
The HTTP-side test would require a server roundtrip — visit browserleaks.com/client-hints for a side-by-side view of HTTP vs JS values. With browser fingerprint shield installed, both sides return the spoofed identity consistently.
How to spoof Client Hints
JavaScript-side spoofing is straightforward — override navigator.userAgentData with a fake object whose getHighEntropyValues returns lies. HTTP-side spoofing is harder because Chrome sends the headers before any extension JS runs. The fix is declarativeNetRequestWithHostAccess, the modern MV3 API that lets an extension rewrite outgoing request headers — including User-Agent and every Sec-CH-UA-* header.
Browser Leaks Fingerprint Shield's Pro tier rewrites both sides in lockstep: the JS userAgentData object and the HTTP Sec-CH-UA-* headers report the same spoofed Chrome 143 macOS / Windows / Linux identity, with explicit excludes for captcha providers (challenges.cloudflare.com, recaptcha, hCaptcha) so verification widgets still work.
Client Hints questions
Are Client Hints sent to every website?
Why is my Sec-CH-UA-Platform-Version 'unknown' or empty?
Can I disable Client Hints in Chrome?
What's the difference between User-Agent and Client Hints?
Run the full browser fingerprint test.
See your composite hash across all six surfaces — canvas, WebGL, audio, WebRTC, Client Hints, and User-Agent — in one click.
Open the browser fingerprint test →