Tuesday, April 15, 2025
HomeChromeChrome’s Incognito Mode Loophole Let Sites to Detect People's Browsing Activities

Chrome’s Incognito Mode Loophole Let Sites to Detect People’s Browsing Activities

Published on

SIEM as a Service

Follow Us on Google News

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities.

Incognito Mode is an optional Chrome’s feature helps users to browse in private mode to stop sites track their activities on the web.

The new loophole uncovered in chrome FileSystem API that used by some of the sites to detect when people are browsing in Incognito Mode.

- Advertisement - Google News

You may have noticed that sites such as the New York Times, Los Angeles Times preventing you from reading articles while using a browser’s private mode and requiring to log in to paid subscriber accounts.

Google statement ensures that the loophole will be fixed in Chrome 76 beta update and these sites will no longer detect whether the user’s browser is in private mode, but other browsers such as Safari for Mac, Firefox and Chrome 75 will not prevent these site’s activity when users private mode.

Incognito loophole in FileSystem API

By default, Chrome’s FileSystem API is disabled in Incognito Mode to avoid leaving browser activity tracing on someone’s device.

Sites can check the availability of FileSystem API if they detect it without any error and it learns that the users are accessing their site in normal mode, instead of that, if they receive an error message then they determine that the users are accessing via private mode.

According to Google Statement, “Based on these users activities, sites are giving the user a different experience, so the behavior of the FileSystem API will be modified to remedy this method of Incognito Mode detection in Chrome 76 that scheduled for July 30.”

This new update will complete the close the loophole and stop site to intercept Incognito Mode sessions with the use of FileSystem API.

“Unlike hard paywalls or registration walls, which require people to log in to view any content, meters offer a number of free articles before you must log in. This model is inherently porous, as it relies on a site’s ability to track the number of free articles someone has viewed, typically using cookies. Private browsing modes are one of several tactics people use to manage their cookies and thereby “reset” the meter count.”

Incognito Mode doesn’t mean that the users are completely under privacy protection. it helps only when “Some wish to protect their privacy on shared or borrowed devices or to exclude certain activities from their browsing histories.

“In situations such as political oppression or domestic abuse, people may have important safety reasons for concealing their Web activity and their use of private browsing features,” Google said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

Chrome and Firefox Browser Extensions Steals Browsing Web Histories From Over 4M Users

New Android Malware that Uses Chrome to Load Malicious websites through Notifications

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Microsoft Teams File Sharing Unavailable Due to Unexpected Outage

Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due...

Cloud Misconfigurations – A Leading Cause of Data Breaches

Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost...

Security Awareness Metrics That Matter to the CISO

Security awareness has become a critical component of organizational defense strategies, particularly as companies...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Chrome Use-After-Free Vulnerability Enables Remote Code Attacks

Google has rolled out a critical update for its Chrome browser, addressing a high-severity...