Fraud and Risk Prevention

/

Guides

/

Device Fingerprinting

/

Overview

/

Fingerprints

Fingerprints

A fingerprint is a hashed identifier generated by collecting and combining different low-level signals to form a stable and highly unique identifier of the device accessing your application..

Stytch's Device Fingerprinting product returns multiple fingerprints and identifiers based on information gathered about the hardware, browser and network being used, in order to give you a comprehensive picture of the traffic on your application.

Usage

Rules can be set based on specific fingerprints via our Set Rules functionality in order to customize the behavior for specific devices, or signal sets. Fingerprints can also be tied to other user data to associate known hardware sets, browsers, and other attributes with your user base.

A fingerprint’s uniqueness, stability, and signal set are all factors to consider when determining which fingerprint to use for a given use case.

Fingerprints

Below is an example /lookup response where your application would consume and potentially store fingerprints, followed by a table outlining the distinct qualities of each fingerprint.

For more details on different fingerprint characterstics and usage with our /rules endpoint, see our Settings Rules with DFP Guide.

Fingerprint

Definition

Use Cases

Uniqueness

Visitor ID

The cookie stored on the user’s device that uniquely identifies them.

Having a unique identifier for a user.

Guaranteed unique

Browser ID

Combination of Visitor ID and NetworkFingerprint to create a clear identifier of a browser.

Detecting stolen sessions since the browser ID should only be associated with a single browser fingerprint.

Guaranteed unique

Visitor Fingerprint

A highly unique, cookie-less way of identifying a unique user based on a diverse set of signals.

Enforcing paywalls since the visitor fingerprint will be consistent across incognito mode, or banning specific users in a cookie-less way.

99.9% unique

Browser Fingerprint

Combination of signals to identify a browser and its specific version, on a specific device.

Banning a specific user’s browser version across all profiles on multiple user accounts on a given machine.

Low

Hardware Fingerprint

Combinations of signals to identify an operating system and architecture.

Detecting Proxy or location spoofing since the Hardware fingerprint will be stable across different locations.

Low

Network Fingerprint

Combination of signals associated with a specific network commonly known as TLS fingerprinting.

Blocking programmatic access like Golang, Curl, or Node.

Low