Unfortunately so. This mentioned on Protocol Leak and Fingerprinting Protection for years.
Two things…
- A) Local detection (using /proc/cpuinfo or CPU)
- B) Remote detection, possibly using JavaScript (JS).
Interesting link. Thanks!
I’ve tried this on two different notebooks with different CPU models and the website showed the same output. In conclusion, it seems the website does not detect anything useful.
This needs further research, testing. Added to wiki just now including instructions for testing:
https://www.whonix.org/wiki/Browser_Tests#cpuid_visualiser
This website might just be a decover, visualizer. It does not directly claim to be able to read CPUID from your local computer. Implies so on, the website states:
But…
sample cpuid data
Needs to be further investigated.
Two new wiki chapters added just now:
- https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection#Remote_Detectable_Hardware_Identifiers
- https://www.whonix.org/wiki/Protocol-Leak-Protection_and_Fingerprinting-Protection#CPUID
Now the CPUID is documented a bit better.