Skip to main content

Your private browsing isn’t as incognito as you want it to be

[ad_1]


There’s no shame in firing up a private browsing window from time to time, whether it’s to visit a NSFW website or just to protect your personal information while checking your email on a public computer. But while private browsing modes do their best to erase your tracks, they can also leave digital clues behind.



The virtue of a feature like Chrome’s Incognito Mode, of course, is that whoever uses that computer after you shouldn’t be able to see the sites you’ve visited, because the browser doesn’t record your history. But traces of your browsing can still remain on your computer after you’ve closed that Incognito window, a phenomenon that can happen in a couple different ways, says Frank Wang, a computer science doctoral candidate at MIT.



One vulnerability has to do with something called a domain name service (or DNS) request. When a browser connects to a website—say, PopSci.com—it needs to translate those letters into numbers, and that process can leave footprints in your operating system, Wang says, in a place called the DNS cache. If a knowledgeable person got access to your machine, they could exploit this vulnerability to figure out what sites you’ve visited. “It’s not very hard actually,” he says.



That’s because just closing your browser after private browsing doesn’t clear that cache, he notes. “The browser doesn’t have enough privilege or access to do that,” Wang says.



Another vulnerability is that your operating system could write information to your hard drive while you’re browsing in private mode to help manage memory efficiently. That happens, Wang says, when your machine starts running out of memory. The result is that images or HTML code from the sites you were visiting could wind up on your hard drive, which the browser would not delete later. The issue in both of these cases is that your browser doesn’t have access to these parts of the operating system to clean up after itself. “Chrome doesn’t have control over how Windows works, or how my macOS X works,” he notes—nor would you necessarily want to give an application that kind of control.



So Wang is proposing a new system, called Veil, that would address these problems. The idea is that instead of going straight to the website you want to visit, or even launching an Incognito window, you’d first navigate to a special Veil website, and then access the other sites you wanted to visit through that one. From there, the system “sends a request to what we call ‘blinding servers,’” which would be hosted by volunteers, Wang says.



The service is currently theoretical, but it would mean that your internet service provider wouldn’t know what website you’re actually visiting—it would only see the connection to the blinding server, which hosts the actual content. The idea, which also makes use of encryption, has additional appeal because it means not using a Google-made service to shield your browsing history. “We don’t want to rely on Chrome for private browsing,” he says.


Hana Habib, a doctoral student in the societal computing program at Carnegie Mellon University, points out another potential flaw in the way private browsing works: If a browser crashes in the middle of a private session, that could interrupt a process that some browsers use in which they only delete information after the session has been properly closed, she says. She also recommends a way that the private browsing feature could be improved: a “time-out function” to auto-close a window that was accidentally left open, just like the way your bank logs you out if you haven’t been active in that tab for a while.



Don’t forget that with private browsing, your internet service provider still knows what sites you’ve connected to, she points out, and if you’re using a machine at work, your employer probably will, too.



But even though private browsing isn’t perfect, it all depends on what your goal for using it is. “A lot of people use private browsing just to hide their activity from other people who might use their computer later,” she says. “And for that, private browsing does a pretty good job of protecting users against that particular threat.”




[ad_2]

Written By Rob Verger

Comments

Popular posts from this blog

Ice technicians are the secret stars of the Winter Olympics

[ad_1] The emphasis of this year's two-week-long Winter Olympic Games has been placed squarely on the Olympians themselves. After all, the stated purpose of the international competition is to bring together the world’s greatest athletes in a nail-biting competition across fifteen different winter sports. But before the curlers, skiers, and skaters even arrived in Pyeongchang, South Korea, the Olympians of the ice technician world were already a few weeks deep in a competition of their own. Mark Callan of the World Curling Federation and Markus Aschauer of the International Bobsleigh and Skeleton Federation both say they’re hoping to make the best ice the Winter Olympics have ever seen. To transform the barren concrete jungle of existing tracks and arenas into an ice- and snow-covered wonderland is an enormous undertaking. And it takes a keen understanding of the physics and chemistry that keeps frozen precipitation pristine. Curling Callan has been making and maintaining ic...

With Operation Popeye, the U.S. government made weather an instrument of war

[ad_1] It was a seasonably chilly afternoon in 1974 when Senators Claiborne Pell, a Democrat from Rhode Island, and Clifford Case, a Republican from New Jersey, strode into the chambers of the Senate Committee on Foreign Relations for a classified briefing. While the meeting was labeled “top secret,” the topic at hand was rather mundane: They were there to discuss the weather. More specifically, Pell, the chairman of the now-defunct subcommittee for Oceans and International Environment, and his colleague were about to learn the true extent of a secret five-year-old cloud seeding operation meant to lengthen the monsoon season in Vietnam, destabilize the enemy, and allow the United States to win the war. Though it cycled through several names in its history, "Operation Popeye" stuck. Its stated objectives—to ensure Americans won the Vietnam War—were never realized, the revelation that the U.S. government played God with weather-altering warfare changed history. The...

The fate of future endangered species could hinge on a semantic argument

[ad_1] Everyone agrees that the Pacific walrus is stressed. The large, tusked pinnipeds depend on floating sea ice to rest and give birth in the spring and summers, when the Goldilocks-sized not-too-thin, not-too-thick ice floes they require are becoming increasingly rare. But coming to a consensus on how the large marine mammals will react to that stress is less straightforward. “While the Pacific walrus will experience a future reduction in availability of sea ice ... we are unable to reliably predict the magnitude of the effect,” read the official Fish and Wildlife service finding in October 2017, explaining the decision not to list the species under the Endangered Species Act despite the service’s own 2011 assessment that it was threatened by climate change. The text continued: “We do not have reliable information showing that the magnitude of this change could be sufficient to put the subspecies in danger of extinction now or in the foreseeable future....