Incognito Mode

AnonymousAlternatively referred to as Private Browsing, InPrivate Browsing, and Private Window and informally as porn mode, Incognito is a setting that prevents any Internet history information from being stored locally. For example, when you visit any web page any data loaded on it is stored on your computer. Additionally, any searches or forms that are filled out are stored in Autocomplete fields.

How safe is private mode?

Private browsing is not meant as a way to be completely anonymous on the Internet. As mentioned earlier it is an easy and quick way to not log your browsing history or save (cache) any web pages, images, or cookies as you are browsing. Below are some additional considerations to think about while in private mode.

Other monitoring software

If your computer has any other monitoring software (e.g. parental control programs or keyloggers), they can still capture and monitor everything you are doing on the computer even if are in private mode. Monitoring can also be done at the network level, which means any school or corporate monitoring that may be running on the network could also capture any private browsing.

Your IP address

Although nothing is stored on your computer in private mode, you are still not anonymous on the Internet. Each page that you visit still recognizes your IP address. If someone had the ability to view your IP address history for legal purposes, an ISP, website, and even a search engine server log could be used to track you.

Add-ons and Plugins

Any Add-on or Plugin you have installed in the browser could be storing information on your browsing habits. For example, early versions of the Adobe Flash plugin allowed cookies to be saved in Adobe Flash even when in private mode.

People standing behind you

It may seem obvious, but anyone shoulder surfing is going to be able to watch what you are viewing in private mode.

Additional security concerns

A paper from Rodrigo Ruiz entitled "Opening the ' Private Browsing ' Data – Acquiring Evidence of Browsing Activities" demonstrated how it was possible for someone who had access to a computer to acquire text and graphical data from computers browsing in private mode.

Related pages

Also see: Security terms