http://darknetsrvqlssdnli6mgoqxud4krgu3hqm62d7whu3gl6xj22fkyaid.onion/read/dns-leaks-webrtc-canvas-invisible-leaks-that-expose-you
Your GPU, fonts, driver, and rendering settings create a unique fingerprint — even without cookies or IP. How it leaks you: If JS is enabled, the fingerprint can be extracted — even via Tor. Used to track unique visits and connect sessions to a single device. How to test: Visit browserleaks.com/canvas See what the site captures.