Privacy mode or "private browsing" or "incognito mode", is a privacy feature in some web browsers to disable browsing history and the web cache. This allows a person to browse the Web without storing local data that could be retrieved at a later date. Privacy mode will also disable the storage of data in cookies and Flash cookies. This privacy protection is only on the local computing device as it is still possible to identify frequented websites by associating the IP address at the web server.
The earliest reference to privacy mode was in May 2005 and used to discuss the privacy features in the Safari browser bundled with Mac OS X Tiger. The feature has since been adopted in other browsers, and led to popularisation of the term in 2008 by mainstream news outlets and computing websites when discussing beta versions of Internet Explorer 8. However, privacy modes operate as shields because browsers typically do not remove all data from the cache after the session. Plugins, like Silverlight, are able to set cookies that will not be removed after the session. Internet Explorer 8 also contains a feature called InPrivate Subscriptions, an RSS web feed with sites approved for use with InPrivate browsing.
- reducing history, including autofill, browsing, and personal information;
- performing "pure searches" that are not influenced by prior browsing history or networks or friends' recommendations, which may weight and more highly rank certain results than others;
- preventing accidental saving of log-in credentials to accounts;
- signing into multiple accounts simultaneously, via multiple tabs; and,
- testing websites.
The Mozilla Foundation performed a study about the user behavior when the feature is switched on and how long the session lasts. The results were that most sessions last only about 10 minutes, though there are periods where activation increases; usually around 11 a.m. to 2 p.m., 5 p.m., between 9 p.m. and 10 p.m., and a minor peak about an hour or two after midnight.
Support in popular browsers
Privacy mode is known by different names in different browsers.
|April 29, 2005||Safari 2.0||Private Browsing|
|December 11, 2008||Google Chrome 1.0||Incognito|
|March 19, 2009||Internet Explorer 8||InPrivate Browsing|
|June 30, 2009||Mozilla Firefox 3.5||Private Browsing|
|March 2, 2010||Opera 10.50||Private Tab / Private Window|
|November 18, 2014||Amazon Silk||Private Browsing|
An independent security analysis, performed by a group of researchers at Newcastle University in 2014, shows a range of security vulnerabilities in the implementation of the private mode across four major browsers (IE, Firefox, Chrome and Safari). The results are summarized below.
- Browser extensions are potential threats to the user privacy. By design, existing browsers (e.g., Firefox, Safari) commonly choose to enable extensions in the private mode by default. This however allows an installed extension to secretly record the visited websites without the user's awareness. Newer versions of Chrome disable extensions in the private mode by default, but allow the private and the normal modes to run in parallel. This makes it possible for an installed extension in the normal mode to learn the user activities in the private mode by measuring the usage of shared computing resources.
- Data erasure by the browser alone is found to be insufficient. For example, the records of visited websites during the private session can be retained in memory for a long time even after the private session is closed. In addition, the visited website records are usually kept by the operating system in the local DNS cache. Furthermore, the modified time stamps of certain profile files saved on the disk may reveal if the private mode was previously turned on and when it was turned on.
- Software bugs present in some browsers are found to seriously degrade the security of the private mode. For example, in some earlier versions of Safari, the browser retained private browsing history records if the browser program was not closed normally (e.g., as a result of program crash), or if the user acted to add a bookmark within the private mode.
- Depending on whether the session is in the private or the normal mode, web browsers typically exhibit different user interfaces and traffic characteristics. This allows a remote website to tell if the user is currently in the private mode, for example, by checking the color of the hyperlinks or measuring the time of writing cookies. (The fact that the user is using the private mode should be considered protected information as well.)
- Trapani, Gina (May 4, 2005). "Safari's private (porn) browsing mode". Lifehacker. Retrieved 2010-04-11.
- "HTG Explains: How Private Browsing Works and Why It Doesn't Offer Complete Privacy". How-To Geek.
- Foley, Mary Jo. "Microsoft to roll out more granular 'porn mode' with IE 8". ZDNet. Retrieved 2008-10-04.
- Sadighi, Lalee. "Microsoft's Internet Explorer 8 Goes 'Porn Mode'". Red Herring. Retrieved 2008-10-04.
- Kidman, Angus. "Microsoft releases IE8 beta 2: MS porn mode included". APC. Retrieved 2008-10-04.
- "IE8 and Privacy". Microsoft Developer Network. Microsoft. 2008-08-25. Retrieved 2009-07-06.
- Xu, Jimson; Nguyen, Tom (30 June 2010). "Private browsing in Flash Player 10.1". Adobe Systems. Retrieved 14 January 2011.
- Fiol, Taryn (23 October 2012). "7 Great Uses for Your Browser's Private Browsing Mode". Apartment Therapy.
- Obaiza, Osas. "5 Great Reasons Why You Should Use Private Browsing Online". Null Byte.
- Pash, Adam (25 August 2010). "Nine Great Uses for Private Browsing that Don't Involve Porn". Lifehacker.
- Ulmer, Hamilton (23 August 2010). "Understanding Private Browsing". Blog of Metrics. Mozilla Foundation. Retrieved 24 August 2010.
- "Microsoft Announces Availability of Internet Explorer 8" (Press release). Microsoft. 19 March 2009. Retrieved 16 December 2011.
- "Mozilla Cross-Reference mozilla1.9.1". Mozilla Foundation. Retrieved 2009-05-26.
- Mateu, Roberto. "Opera 10.5 pre-alpha for Labs". Opera Software. Retrieved 2009-12-22.
- "Private Browsing for Amazon Silk". Amazon Inc. Retrieved 2014-11-18.
- K. Satvat, M. Forshaw, F. Hao, E. Toreini, On the privacy of private browsing – A forensic approach. Journal of Information Security and Applications, In Press, Available online 3 April 2014.