-
-
Notifications
You must be signed in to change notification settings - Fork 70
browserleaks.com
Stéphane Lenclud edited this page Dec 21, 2025
·
2 revisions
BrowserLeaks is a comprehensive suite of online tools for testing browser privacy and security features. We use it to validate various features of Fulguris Web Browser, including geolocation, client hints, user agent detection, and other browser fingerprinting vectors.
- URL: https://browserleaks.com/geo
- Tests HTML5 Geolocation API
- Validates location permission prompts
- Confirms location blocking/allowing functionality
- Tests domain-specific location settings
- URL: https://browserleaks.com/client-hints
- Validates Client Hints headers (Sec-CH-UA, Sec-CH-UA-Mobile, etc.)
- Tests Accept-CH response headers
- Requires HTTPS for Client Hints to work
- Useful for testing user agent customization
- URL: https://browserleaks.com/ua
- Displays current user agent string
- Shows browser engine, platform, and version information
- Tests desktop/mobile user agent switching
- URL: https://browserleaks.com/ip
- Shows client IP address and location
- Shows request headers
- Tests proxy/VPN functionality
- Validates WebRTC IP leak protection
- URL: https://browserleaks.com/canvas
- Tests canvas fingerprinting resistance
- Shows canvas rendering characteristics
- URL: https://browserleaks.com/webrtc
- Tests WebRTC functionality
- Checks for IP address leaks via WebRTC
- Validates WebRTC enable/disable settings
- URL: https://browserleaks.com/javascript
- Comprehensive JavaScript feature detection
- Tests which JavaScript APIs are available
- Validates JavaScript blocking settings
- URL: https://browserleaks.com/fonts
- Detects installed system fonts
- Tests font fingerprinting resistance
- URL: https://browserleaks.com/screen
- Shows screen dimensions and color depth
- Tests screen fingerprinting
- Navigate to https://browserleaks.com/geo
- Click "Show my location"
- Verify permission dialog appears
- Test Allow/Deny functionality
- Verify domain-specific settings work correctly
- Test location permission reset
- Navigate to https://browserleaks.com/client-hints
- Verify page loads over HTTPS (required for Client Hints)
- Check which Client Hints headers are sent
- Test with different user agent settings
- Validate Accept-CH headers are processed correctly
- Navigate to https://browserleaks.com/ua
- Change user agent setting in Fulguris
- Refresh page and verify new user agent is displayed
- Test desktop mode vs mobile mode
- Verify consistency across different pages
- Enable various privacy settings in Fulguris
- Visit multiple BrowserLeaks test pages
- Verify expected information is blocked/modified
- Compare fingerprint before/after settings changes
- Use BrowserLeaks to validate new privacy features
- Test geolocation permissions dialog behavior
- Verify client hints implementation
- Validate user agent customization
- Make changes to privacy/location features
- Build and install Fulguris
- Run through relevant BrowserLeaks tests
- Document any discrepancies
- Verify fixes with follow-up tests
- Useful for isolating browser behavior issues
- Provides detailed technical information
- Helps identify fingerprinting vectors
- Validates header transmission
- HTTPS Required: Some features (like Client Hints) only work over HTTPS
- Permission Prompts: Geolocation tests trigger permission dialogs - useful for testing permission UI
- Fingerprinting: Many tests intentionally expose fingerprinting vectors to help developers understand privacy implications
- Reference Implementation: Compare Fulguris behavior against other browsers on the same tests