Friday, September 13, 2024
HomeChromeChrome’s Incognito Mode Loophole Let Sites to Detect People's Browsing Activities

Chrome’s Incognito Mode Loophole Let Sites to Detect People’s Browsing Activities

Published on

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities.

Incognito Mode is an optional Chrome’s feature helps users to browse in private mode to stop sites track their activities on the web.

The new loophole uncovered in chrome FileSystem API that used by some of the sites to detect when people are browsing in Incognito Mode.

- Advertisement - EHA

You may have noticed that sites such as the New York Times, Los Angeles Times preventing you from reading articles while using a browser’s private mode and requiring to log in to paid subscriber accounts.

Google statement ensures that the loophole will be fixed in Chrome 76 beta update and these sites will no longer detect whether the user’s browser is in private mode, but other browsers such as Safari for Mac, Firefox and Chrome 75 will not prevent these site’s activity when users private mode.

Incognito loophole in FileSystem API

By default, Chrome’s FileSystem API is disabled in Incognito Mode to avoid leaving browser activity tracing on someone’s device.

Sites can check the availability of FileSystem API if they detect it without any error and it learns that the users are accessing their site in normal mode, instead of that, if they receive an error message then they determine that the users are accessing via private mode.

According to Google Statement, “Based on these users activities, sites are giving the user a different experience, so the behavior of the FileSystem API will be modified to remedy this method of Incognito Mode detection in Chrome 76 that scheduled for July 30.”

This new update will complete the close the loophole and stop site to intercept Incognito Mode sessions with the use of FileSystem API.

“Unlike hard paywalls or registration walls, which require people to log in to view any content, meters offer a number of free articles before you must log in. This model is inherently porous, as it relies on a site’s ability to track the number of free articles someone has viewed, typically using cookies. Private browsing modes are one of several tactics people use to manage their cookies and thereby “reset” the meter count.”

Incognito Mode doesn’t mean that the users are completely under privacy protection. it helps only when “Some wish to protect their privacy on shared or borrowed devices or to exclude certain activities from their browsing histories.

“In situations such as political oppression or domestic abuse, people may have important safety reasons for concealing their Web activity and their use of private browsing features,” Google said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

Chrome and Firefox Browser Extensions Steals Browsing Web Histories From Over 4M Users

New Android Malware that Uses Chrome to Load Malicious websites through Notifications

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hacker Tricks ChatGPT to Get Details for Making Homemade Bombs

A hacker known as Amadon has reportedly managed to bypass the safety protocols of...

Citrix Workspace App Vulnerable to Privilege Escalation Attacks

Citrix released a security bulletin (CTX691485) detailing two critical vulnerabilities in the Citrix Workspace...

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign...

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild

A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers....

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Chrome Vulnerability Let Attackers Execute Arbitrary Code Remotely

The stable channel for desktops has been updated to version 128.0.6613.119/.120 for Windows and...

Hackers Repeatedly Using Same iOS & Chrome Exploits to Attack Government Websites

Hackers have been exploiting vulnerabilities in iOS and Google Chrome to target government websites,...

Chrome Zero-day Vulnerability Actively Exploited in the Wild

Google has announced the release of Chrome 128 to the stable channel for Windows,...