Shimon (@rakcode/shimon
) is a lightweight browser fingerprinting library for JavaScript and TypeScript applications. The name Shimon (指紋, しもん) is Japanese for "fingerprint," symbolizing the library's core purpose of uniquely identifying users based on device and browser characteristics. It helps identify users without using cookies or local storage.
Install the package using npm or yarn:
npm install @rakcode/shimon
import { takeImpression } from '@rakcode/shimon';
takeImpression().then((fingerprint) => {
console.log('Fingerprint Data:', fingerprint);
});
import React, { useEffect, useState } from 'react';
import { takeImpression } from '@rakcode/shimon';
const FingerprintComponent = () => {
const [fingerprint, setFingerprint] = useState(null);
useEffect(() => {
takeImpression().then(setFingerprint);
}, []);
return <pre>{JSON.stringify(fingerprint, null, 2)}</pre>;
};
export default FingerprintComponent;
<script type="module">
import { takeImpression } from 'https://cdn.jsdelivr.net/npm/@rakcode/shimon/+esm';
takeImpression().then((fingerprint) => {
console.log('Fingerprint:', fingerprint);
});
</script>
Shimon collects a combination of non-sensitive browser and device properties:
These details are hashed to generate a unique identifier.
Shimon generates unique fingerprints directly within the user's browser by analyzing various device and environment characteristics. However, due to the limitations of client-side fingerprinting, the accuracy is approximately 60%. This means that while Shimon can effectively differentiate many users, it may not always produce entirely unique fingerprints, especially when multiple users have identical browser versions, platforms, and hardware configurations. Developers should consider this when using Shimon for user identification or security purposes. For enhanced accuracy, it is recommended to combine Shimon with additional authentication or behavioral tracking mechanisms.
Since Shimon operates entirely on the client side, the generated fingerprints can be susceptible to spoofing and reverse engineering. This means that advanced users or malicious actors may attempt to manipulate their device attributes to produce a different fingerprint or mimic another user's identity. While Shimon provides a useful layer of identification, it should not be solely relied upon for high-security applications. Developers integrating Shimon into security-sensitive systems should consider combining it with additional verification methods, such as server-side validation, multi-factor authentication, or behavioral analysis, to enhance overall reliability.
This project is licensed under the MIT License.
Pull requests are welcome! For major changes, please open an issue first to discuss.
For issues or feature requests, visit the GitHub Issues.
Developed by Rakesh DL - rakcode.com