Thursday, April 18, 2024

Chrome’s Incognito Mode Loophole Let Sites to Detect People’s Browsing Activities

Google announced a release of Chrome 76 beta version on July 30, in which Chrome will remedy an Incognito loophole that has allowed sites to detect people’s browsing activities.

Incognito Mode is an optional Chrome’s feature helps users to browse in private mode to stop sites track their activities on the web.

The new loophole uncovered in chrome FileSystem API that used by some of the sites to detect when people are browsing in Incognito Mode.

You may have noticed that sites such as the New York Times, Los Angeles Times preventing you from reading articles while using a browser’s private mode and requiring to log in to paid subscriber accounts.

Google statement ensures that the loophole will be fixed in Chrome 76 beta update and these sites will no longer detect whether the user’s browser is in private mode, but other browsers such as Safari for Mac, Firefox and Chrome 75 will not prevent these site’s activity when users private mode.

Incognito loophole in FileSystem API

By default, Chrome’s FileSystem API is disabled in Incognito Mode to avoid leaving browser activity tracing on someone’s device.

Sites can check the availability of FileSystem API if they detect it without any error and it learns that the users are accessing their site in normal mode, instead of that, if they receive an error message then they determine that the users are accessing via private mode.

According to Google Statement, “Based on these users activities, sites are giving the user a different experience, so the behavior of the FileSystem API will be modified to remedy this method of Incognito Mode detection in Chrome 76 that scheduled for July 30.”

This new update will complete the close the loophole and stop site to intercept Incognito Mode sessions with the use of FileSystem API.

“Unlike hard paywalls or registration walls, which require people to log in to view any content, meters offer a number of free articles before you must log in. This model is inherently porous, as it relies on a site’s ability to track the number of free articles someone has viewed, typically using cookies. Private browsing modes are one of several tactics people use to manage their cookies and thereby “reset” the meter count.”

Incognito Mode doesn’t mean that the users are completely under privacy protection. it helps only when “Some wish to protect their privacy on shared or borrowed devices or to exclude certain activities from their browsing histories.

“In situations such as political oppression or domestic abuse, people may have important safety reasons for concealing their Web activity and their use of private browsing features,” Google said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Also Read:

Hackers Tricks You With Advanced Phishing Attack using Fake Address Bar on Chrome for Android

Chrome and Firefox Browser Extensions Steals Browsing Web Histories From Over 4M Users

New Android Malware that Uses Chrome to Load Malicious websites through Notifications


Latest articles

Xiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)

In the wake of the recent disclosure of a critical vulnerability (CVE-2024-3400) affecting a...

Cerber Linux Ransomware Exploits Atlassian Servers to Take Full Control

Security researchers at Cado Security Labs have uncovered a new variant of the Cerber...

FGVulDet – New Vulnerability Detector to Analyze Source Code

Detecting source code vulnerabilities aims to protect software systems from attacks by identifying inherent...

North Korean Hackers Abuse DMARC To Legitimize Their Emails

DMARC is targeted by hackers as this serves to act as a preventative measure...

L00KUPRU Ransomware Attackers discovered in the wild

A new variant of the Xorist ransomware, dubbed L00KUPRU, has been discovered in the...

Oracle Releases Biggest Security Update in 2024 – 372 Vulnerabilities Are Fixed – Update Now!

Oracle has released its April 2024 Critical Patch Update (CPU), addressing 372 security vulnerabilities...

Outlook Login Panel Themed Phishing Attack Evaded All Antivirus Detections

Cybersecurity researchers have uncovered a new phishing attack that has bypassed all antivirus detections.The...
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.


Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles