Hoody Logo
beta

Fingerprints

Defeat fingerprinting

equation

Even with a VPN, websites collect data about your browser settings, hardware, behavior & patterns, to create a unique identifier known as "fingerprint", allowing tracking across sites without cookies.

Bulletproof Fingerprints

Generate a unique browser profile for each site, making it nearly impossible for websites to correlate your activities.

Custom Fingerprints

Each container supports unique, sticky fingerprints that you can manually adjust, allowing you to have a consistent profile for specific browsing tasks.

illustration

Containers

Browsing containers

Launch unlimited Bulletproof isolated browsers.

Containers are essential for privacy, as most of the trackers collect your data through browser tracking. VPNs don't protect against browser and device fingerprinting but containerized browsing does.

Customize your containers

illustration illustration illustration illustration illustration illustration default
illustration illustration illustration illustration illustration illustration default

Locations

Location modes

Bulletproof Location

Randomize your exit IP for each request, also available by Regions for best latency & speed.

illutsration

SOCKS5 Proxy

Use your own SOCKS5 proxy (compatible with credentials) for specific containers.

Tor

Route container's traffic through Tor for enhanced anonymity, with your exit IP being a Tor node.

No protection (Real IP)

Disable VPN protection for specific containers, allowing them to use your real IP address.

Organize

Organize your browsing containers

Assign aliases, icons, and settings to each container for easy identification and quick access of your Bulletproof browser.

Custom containers

Quick container access

Launch Bulletproof and custom browsing containers effortlessly from the systray in the bottom right of your OS.

System tray 1 System tray 2

Extensions

illutsration

Different extensions per container

Customize containers with your favorite extensions. Input Chrome Store URLs and have them loaded before even starting the container.

100% anonymous:
no email, no name, no id.

Your unique Hoody Key is a cryptographic secret known only to you. We only store a double-hashed version of it, we have no way to know what a user is doing in our network.

key icon

Anonymous Key

ZNLNT - F42E - HYTI - L6SDE

Payments through any gateway, even non-anonymous ones like PayPal, are completely disassociated from your account, providing absolute privacy.

See Pricing
Hoody

    Relay Locations

    Hoody routes all traffic through at least one Hoody Relay before reaching the desired location.


      Exit Locations

      Hoody routes all traffic through at least one Hoody Relay before reaching the desired location.