I just installed Brave today and decided to test it out. However, as reported in this 2021 thread, Brave still fails to escape browser fingerprinting tracking, which can be tested here: https://fingerprint.com/demo/
This occurs even while using Proton VPN in private mode, and after restarting the browser. I read around and realize that this might not be the most accurate site to test fingerprinting, so I tried it out with another site below, including Cover Your Tracks.
Before restarting (with VPN on)
After restarting (with VPN off)
Browser version visible
I also used this website: amiunique.org/fingerprint. The user agent is not randomized (0.06% similarity), despite Brave claiming so in the Brave Shields panel. My exact GPU model can be seen under the WebGL information, which creates a strong fingerprinting vector.
It would be nice if users who want more privacy could choose to randomize/set their user agent, and also their time-zone, as these are quite revealing as well, when combined with other attributes. As seen above, websites can detect you’re Brave. It would be better to mask as Chrome.
In addition, websites can detect if you’re using a VPN due to the time-zone mismatch, which could cause geo-lock protections to trigger (see demo here: https://demo.fingerprint.com/vpn-detection).
As seen in the screenshots, there are multiple unique attributes that Brave currently reveals, which when combined could be used to create a unique fingerprint like the first website did. The largest privacy issue seems to be the hardware information revealed by the WebGL renderer.