🔒 Security & Privacy

HTTP/3 Fingerprints Betray Browsers — Even in QUIC's Fast Lane

Wireshark sniffs Chrome's GREASE-stuffed settings frame, and bam — instant browser ID. HTTP/3 fingerprinting is here, turning QUIC's speed into a tracking goldmine.

Wireshark screenshot showing HTTP/3 settings frame with Chrome fingerprint

⚡ Key Takeaways

  • HTTP/3 fingerprints use settings and pseudo-headers, MD5-hashed into unique perk_hashes for Chrome, Firefox, curl. 𝕏
  • QUIC doesn't kill tracking — it evolves it, aiding CDNs in bot detection amid 35% web traffic share. 𝕏
  • Browsers' GREASE helps little; expect regulatory scrutiny as privacy claims clash with reality. 𝕏
Published by

theAIcatchup

Community-driven. Code-first.

Worth sharing?

Get the best Open Source stories of the week in your inbox — no noise, no spam.

Originally reported by Dev.to

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.