Chipp.in Tech News and Reviews

Windows, Security & Privacy, Open Source and more

Menu
  • Home
  • Windows
  • Security & Privacy
  • Gaming
  • Guides
  • Windows 11 Book
  • Contact
  • RSS Feed
Menu

Adbleed: A Proof of Concept for Adblocker Fingerprinting

Posted on February 12, 2026February 12, 2026 by Martin Brinkmann

Internet users have plenty of options to make their connections more private. Popular choices include content blocking, using VPNs, or disabling services or features that may reveal information about them.

However, in rare circumstances, it is the very tools designed to protect users that may reveal information about them.

Enter Adbleed

Adbleed is a proof-of-concept designed to highlight a specific privacy risk associated with the use of regional adblocking rules.

The tool functions by detecting which country-specific filter lists—such as EasyList Germany or Liste FR—are currently active within a user’s browser. By probing for the blocking of domains unique to these specific lists, Adbleed creates a “filter fingerprint” that can reveal a user’s likely country of origin or language preference.

This technique demonstrates that users can be partially de-anonymized based solely on their adblocking configuration, even when employing VPNs or proxies to mask their physical location.

The detection process follows three simple steps:

  • Domains: The tool uses a curated list of domains that are blocked exclusively by certain filter lists, such as EasyList Germany.
  • Probing: Adbleed attempts to load resources from these specific domains. It then looks at what is returned. Blocked requests, which happen near instantly, are what the tool is after. It measures the time it takes to get a response to distinguish blocked requests from other errors, e.g., network failures.
  • Fingerprinting: When a specific number of domains are blocked from a regional listing, Adbleed concludes that the list is active.

What does it mean? It means that a site can detect if certain regional content blocking lists are likely enabled. This adds another factor to fingerprinting attempts.

Mitigation & Protection

Here are a few suggestions to mitigate Adbleed or limit its use for fingerprinting:

  • Stick to the defaults. If you do not enable any regional lists, Adbleed won’t detect any, which in turn makes your configuration less unique.
  • Enable anti-fingerprinting: If the browser supports anti-fingerprinting techniques, make sure they are enabled.
  • Disable JavaScript or enable hard-mode blocking: This may not be practicable, especially the JavaScript part, but this should protect against this particular type of attack.
  • Use different browsers: If you use different browsers, you torpedo tracking attempts, as the trackers can’t link your activities between different apps or browsers (unless there is a common factor that is unique).

Adbleed demonstrates that the tools designed to protect users on the Internet can sometimes be used against them. It reveals how regional content blocking preferences may allow sites to fingerprint and track users. It is not an argument against content blocking, but rather a wake-up call that things are never as straightforward as they look like on first glance.

Tags: privacy
Category: Security & Privacy

Post navigation

← Six Zero-Days in the Wild: The February 2026 Windows Patch Tuesday Breakdown
The One Feature Everyone Missed is Reportedly Coming Back to Windows 11 →

5 thoughts on “Adbleed: A Proof of Concept for Adblocker Fingerprinting”

  1. Tom Hawack says:
    February 12, 2026 at 7:23 pm

    Blocking ads is one thing, blocking tracking (when not tied to ads) is another, and attempting to remain anonymous still another.

    With a proxy, VPN, Tor, ‘Adbleed’ is pertinent.
    Without a proxy, VPN, Tor, the device’s IP means the device’s location : ‘Adbleed’ is not pertinent.

    Moreover, ‘Adbleed’ connects to 3rd-party servers to establish the correlations with the user’s country-specific adblock lists. If you use a tool such as uBO and set it to refuse by default 3rd-party connections (allowing them specifically per-domain) then the results provided by ‘Adbleed’ are significantly different then if connections to 3-rd party servers are factual.

    Personally my aim is not to hide, in which case I’d use a VPN or more likely Tor, but to avoid advertisement and reduce tracking as much as I can. My device’s IP is of course what prevents it from being masked, but if the aim is to avoid having a sticker (tracker) on its back far more than being recognized in the “masked bal”, then that scenario fits my needs.

    The ‘Adbleed’ concept is of course pertinent, but it’s only another tool to the Fingerprinting arsenal.

    Indeed, to defeat fingerprinting, if that is ever possible, we need to hide the device’s IP and figure out, or try to, all that signs our device, from the device’s local time to its hardware whispers. That would be far above my skills. So I simply walk around the planet, recognized when coming back to a same place but without stickers on my back of all the places I’ve previously visted: the device’s passport aims to be empty of visited locations. That’s all.

    Reply
  2. boris says:
    February 12, 2026 at 11:16 pm

    “Disable JavaScript or enable hard-mode blocking: This may not be practicable”

    Duh. How many sites work without JavaScript? Maybe some basic image and forum websites, but nothing else. It’s like using BitTorrent with p2p sharing disabled. Does not make sense,

    Reply
  3. orptwag says:
    February 14, 2026 at 11:19 pm

    I respectfully disagree with boris. Sure, for most users, I don’t recommend messing with scripts. But I’ve been using NoScript (Firefox add-on) on my primary surfing browser for more than a decade, as I like control over which scripts a site runs. For instance, I’ve whitelisted chipp.in, but this site also is trying to run gstatic.com, which I haven’t… and the site works anyway. I fully accept that most people don’t want this of granularity, but for me, I can’t imagine surfing with scripting uncontrolled; it’s like leaving my doors unlocked.

    A very simple way to reduce the risk of filterlist fingerprinting (which can be done with more than just language lists) is to add or remove filterlists occasionally. I have more than one language filter on, one being one I use and the others – which I change occasionally – being just noise.

    Fingerprints are only useful when they don’t change…

    Reply
  4. TelV says:
    February 15, 2026 at 2:16 pm

    UBO provides the option to add a whole multitude of filter lists for everyday use. I’ve added about 10 of them just to confuse anyone using those as a means of ID’ing me. That and the fact that I do use a VPN with the SOCKS5 proxy enabled just to add a little more flavour to the mix.

    I also use the FF addon called “Disable JavaScript” which can be used to enable/disable Javascript on the fly. It’s most useful for turning JS on and off on the BBC News site when the page starts jumping up and down while I’m tring to read it.

    I installed the Mullvad VPN app on my phone as well and use their DAITA tool (Defence against AI-guided Traffic Analysis) and that takes care of tracking on my phone.

    @ Martin, how about an about:config set of recommendations for Firefox for Android if you have time 🙂

    Reply
  5. ipso says:
    February 21, 2026 at 9:14 pm

    TeIV, Mullvad’s DAITA is not an anti-tracking tool, it’s more of a “VPN traffic hardener”. Unless you are under attack by 3-letter-agency (and possibly even then), it does little more than increase your data usage. I you want to help “take care of tracking on your phone”, activating the DNS blocklists (especially the Tracking list) inside the Mullvad app will do a better job.

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Support This Site

If you like what I do please support me!

Any tip is appreciated. Thanks!
  • April 2, 2026 by Martin Brinkmann Would you trust AI to handle your email inbox?
  • April 1, 2026 by Martin Brinkmann Google Chrome update patches another 0-day vulnerability
  • March 31, 2026 by Martin Brinkmann A new Windows team promises to bring native apps to the operating system
  • March 30, 2026 by Martin Brinkmann Google outlines the new flow for sideloading Android apps
  • March 29, 2026 by Martin Brinkmann Microsoft pauses update KB5079391 for Windows 11 to investigate an issue

About

We talk, write and dream about Technology 24/7 here at Chipp.in. The site, created by Martin Brinkmann in 2023, focuses on well-researched tech news, reviews, guides, help and more.

Legal Notice

Our commitment

Many websites write about tech, but chipp.in is special in several ways. All of our guides are unique, and we will never just rehash news that you find elsewhere.

Read the About page for additional information on the site and its founder and author.

Support Us

We don't run advertisement on this site that tracks users. If you see ads, they are static links. Ads, including affiliate links, never affect our writing on this site.

Here is a link to our privacy policy

©2026 Chipp.in Tech News and Reviews