Skip to main content

Your private browsing isn’t as incognito as you want it to be

[ad_1]


There’s no shame in firing up a private browsing window from time to time, whether it’s to visit a NSFW website or just to protect your personal information while checking your email on a public computer. But while private browsing modes do their best to erase your tracks, they can also leave digital clues behind.



The virtue of a feature like Chrome’s Incognito Mode, of course, is that whoever uses that computer after you shouldn’t be able to see the sites you’ve visited, because the browser doesn’t record your history. But traces of your browsing can still remain on your computer after you’ve closed that Incognito window, a phenomenon that can happen in a couple different ways, says Frank Wang, a computer science doctoral candidate at MIT.



One vulnerability has to do with something called a domain name service (or DNS) request. When a browser connects to a website—say, PopSci.com—it needs to translate those letters into numbers, and that process can leave footprints in your operating system, Wang says, in a place called the DNS cache. If a knowledgeable person got access to your machine, they could exploit this vulnerability to figure out what sites you’ve visited. “It’s not very hard actually,” he says.



That’s because just closing your browser after private browsing doesn’t clear that cache, he notes. “The browser doesn’t have enough privilege or access to do that,” Wang says.



Another vulnerability is that your operating system could write information to your hard drive while you’re browsing in private mode to help manage memory efficiently. That happens, Wang says, when your machine starts running out of memory. The result is that images or HTML code from the sites you were visiting could wind up on your hard drive, which the browser would not delete later. The issue in both of these cases is that your browser doesn’t have access to these parts of the operating system to clean up after itself. “Chrome doesn’t have control over how Windows works, or how my macOS X works,” he notes—nor would you necessarily want to give an application that kind of control.



So Wang is proposing a new system, called Veil, that would address these problems. The idea is that instead of going straight to the website you want to visit, or even launching an Incognito window, you’d first navigate to a special Veil website, and then access the other sites you wanted to visit through that one. From there, the system “sends a request to what we call ‘blinding servers,’” which would be hosted by volunteers, Wang says.



The service is currently theoretical, but it would mean that your internet service provider wouldn’t know what website you’re actually visiting—it would only see the connection to the blinding server, which hosts the actual content. The idea, which also makes use of encryption, has additional appeal because it means not using a Google-made service to shield your browsing history. “We don’t want to rely on Chrome for private browsing,” he says.


Hana Habib, a doctoral student in the societal computing program at Carnegie Mellon University, points out another potential flaw in the way private browsing works: If a browser crashes in the middle of a private session, that could interrupt a process that some browsers use in which they only delete information after the session has been properly closed, she says. She also recommends a way that the private browsing feature could be improved: a “time-out function” to auto-close a window that was accidentally left open, just like the way your bank logs you out if you haven’t been active in that tab for a while.



Don’t forget that with private browsing, your internet service provider still knows what sites you’ve connected to, she points out, and if you’re using a machine at work, your employer probably will, too.



But even though private browsing isn’t perfect, it all depends on what your goal for using it is. “A lot of people use private browsing just to hide their activity from other people who might use their computer later,” she says. “And for that, private browsing does a pretty good job of protecting users against that particular threat.”




[ad_2]

Written By Rob Verger

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ice for m

In the wake of NYC terrorist attack, Trump says he's ordered increased 'Extreme Vetting'

[ad_1] President Donald Trump has requested for a heightened vetting program following Tuesday's terrorist attack in New York. @realDonaldTrump: I have just ordered Homeland Security to step up our already Extreme Vetting Program. Being politically correct is fine, but not for this! Earlier, he tweeted that the attack in lower Manhattan was committed by a "sick and deranged person." @realDonaldTrump: In NYC, looks like another attack by a very sick and deranged person. Law enforcement is following this closely. NOT IN THE U.S.A.! His remarks came after a motorist drove onto a busy bicycle path near the World Trade Center memorial and struck several people on Tuesday, leaving at least eight people dead and a dozen injured. NBC News repor

How to save everything you post to social media

[ad_1] If you get the urge to revisit that cute photo you posted some time last year, you'll have to scroll through your timeline for what feels like hours to track it back down. Instead, when you share a post on social media, also save it to your phone for safe-keeping. This will not only save your social media hits for posterity, but also make them easier to find if you ever need to rediscover them. In this guide, we focus on saving photos and videos, because text posts are slightly more complicated—the only way to really preserve text from Facebook and Twitter is to download your entire archive (we'll explain how to do this below), and Instagram and Snapchat don't let you save or export your instant messages at all. When it comes to photos and videos, there's a shortcut to make sure they stay on your phone: Originally film them through a dedicated app, which will save them to a gallery. Only then should you open up a social media app to share them. However, there'