Sunday, January 26, 2025
HomeChromeChrome’s Incognito Mode Loophole Let Sites to Detect People's Browsing Activities

Chrome’s Incognito Mode Loophole Let Sites to Detect People’s Browsing Activities

Published on

SIEM as a Service

Follow Us on Google News

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities.

Incognito Mode is an optional Chrome’s feature helps users to browse in private mode to stop sites track their activities on the web.

The new loophole uncovered in chrome FileSystem API that used by some of the sites to detect when people are browsing in Incognito Mode.

You may have noticed that sites such as the New York Times, Los Angeles Times preventing you from reading articles while using a browser’s private mode and requiring to log in to paid subscriber accounts.

Google statement ensures that the loophole will be fixed in Chrome 76 beta update and these sites will no longer detect whether the user’s browser is in private mode, but other browsers such as Safari for Mac, Firefox and Chrome 75 will not prevent these site’s activity when users private mode.

Incognito loophole in FileSystem API

By default, Chrome’s FileSystem API is disabled in Incognito Mode to avoid leaving browser activity tracing on someone’s device.

Sites can check the availability of FileSystem API if they detect it without any error and it learns that the users are accessing their site in normal mode, instead of that, if they receive an error message then they determine that the users are accessing via private mode.

According to Google Statement, “Based on these users activities, sites are giving the user a different experience, so the behavior of the FileSystem API will be modified to remedy this method of Incognito Mode detection in Chrome 76 that scheduled for July 30.”

This new update will complete the close the loophole and stop site to intercept Incognito Mode sessions with the use of FileSystem API.

“Unlike hard paywalls or registration walls, which require people to log in to view any content, meters offer a number of free articles before you must log in. This model is inherently porous, as it relies on a site’s ability to track the number of free articles someone has viewed, typically using cookies. Private browsing modes are one of several tactics people use to manage their cookies and thereby “reset” the meter count.”

Incognito Mode doesn’t mean that the users are completely under privacy protection. it helps only when “Some wish to protect their privacy on shared or borrowed devices or to exclude certain activities from their browsing histories.

“In situations such as political oppression or domestic abuse, people may have important safety reasons for concealing their Web activity and their use of private browsing features,” Google said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

Chrome and Firefox Browser Extensions Steals Browsing Web Histories From Over 4M Users

New Android Malware that Uses Chrome to Load Malicious websites through Notifications

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Supply Chain Attack Targeting Chrome Extensions to Inject Malicious Code

A sophisticated supply chain attack targeting Chrome browser extensions has come to light, potentially...

Chrome Security Update – Patch for Multiple Security Vulnerabilities

Google has released an update for its Chrome web browser, advancing to version 131.0.6778.264/.265...

PriveShield – Advanced Privacy Protection with Browser Profile Isolation

A browser extension named PRIVESHIELD automatically creates isolated profiles to group websites based on...