By Sam Roux
There’s an ancient Chinese parable about a merchant who sold both an impenetrable shield and a spear that could pierce anything. When a customer asked what would happen if the two collided, the paradox became clear: they could not both exist.
At Gateway Corporate, we’ve intentionally embraced a similar tension. While developing the Devicer Intelligence Suite, our central mission has been to build world-class digital fingerprinting systems for enterprise use (technology that is, by design, a form of advanced surveillance) while simultaneously arming individual users with powerful anti-fingerprinting tools to reclaim their privacy.
We don’t see this as contradictory. It’s a deliberate two-pronged strategy: enterprises gain highly accurate, compliant KYC and fraud-prevention capabilities, while everyday users receive the means to defend themselves against invasive tracking.
Our pricing model and the open-source release of our core FP-Devicer library are strategic by design. By making sophisticated tracking and intelligence technology accessible and affordable to the widest possible audience, we aim to accelerate meaningful legislative and regulatory action on digital surveillance. When the power to identify and track devices (and therefore people) moves from the hands of a few powerful entities into the hands of many, policymakers - who often align closely with those concentrated interests - will have little choice but to address the issue.
Recently, I had a conversation with Daniel, lead developer at MetaDock, about effective anti-fingerprinting techniques. I suggested that the most powerful current defense would be real-time spoofing of fingerprintable values - particularly WebGL and Canvas hashes - triggered on page reload. Daniel said he’d look into it, and we went our separate ways.
Two weeks later, I received a direct message from him: he had been developing new browser features and had turned my suggestion into reality, along with several additional enhancements. I immediately updated our Devicer test bench to simulate what MetaDock’s new capabilities could achieve.
The results exceeded even my optimistic expectations.
Under MetaDock’s maximum privacy settings, the new features outperformed Tor anonymization in evading accurate fingerprint classification. Even against our most sophisticated device-tracking systems and latest algorithms, the fingerprinting was effectively defeated.
This is a significant milestone for digital privacy.
It is not, however, the death of digital fingerprinting. One browser feature cannot kill the technology, nor should it. Fingerprinting will continue to serve legitimate enterprise, security, and compliance needs. What we’re celebrating here is something more important: a tangible, user-empowering privacy win that emerged from a single conversation and genuine collaboration between teams.
Special thanks to Daniel and the MetaDock team for listening to my deep-dive explanations of device identification algorithms and for transforming them into production-ready features. This is exactly how meaningful progress in privacy technology happens; through open dialogue and shared engineering effort.
We look forward to seeing these capabilities reach users and to continuing the broader conversation about responsible, balanced digital identity solutions.