Fingerprint.com recognises me even through Tor Browser

Hello,
I am using a smartphone pixel 8 with GrapheneOS for optimised privacy.
Recently I cam across the company / their website fingerprint.com
As soon as you visit their website there detection-system tries to identify you.
I visited their website through TOR in the following way

Connected to my inhouse WiFi-Router and Browser TOR security-Level strong (Level 2 of 3)
terminated Tor. Rebooting my smartphone then

Connected to a mobile Hotspot (Netgear NightHawk M1) using a Data-SIMCard and Tor security-Level strong (Level 2 of 3)
terminated Tor. Rebooting my smartphone then

Connected through the hotspot-function of another smartphone with a different SIM-Card and Tor security-Level strong (Level 2 of 3)

In ALL cases the website fingerprint.com gave me the SAME ID-number !!!
This means fingerprint managed it even through TOR and different network-connections to identify me !
It seems that TOR does not offer anonymity anymore.

Are my conclusions correct?

best regards

Stefan

Hi,

If you rob several banks using exactly the same method, don’t you think law enforcement will make the connection ? But they won’t know who you are unless you left some DNA on scene.

Your device and browser can leak informations so if you don’t change between connections, a match can be made. Maybe a different person connecting via Tor with the same device as yours will also have this fingerprint ?

Yah, I played around with that and found the same. Try it again the next day to see… and the next day.

4 Days later. They still “see” me but get the location wrong. Changing the User Agent in FF did nothing but connecting with Edge (same laptop) gave me a new ID.

Did you try the same with level 3/3, strongest ? And would you share the result in compare to 2/3 ?

Cheers