What Is the Most Secure Mainstream Browser?

Total Page:16

File Type:pdf, Size:1020Kb

What Is the Most Secure Mainstream Browser? ! Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! What Is the Most Secure Mainstream Browser? Written by Philip Bates Published November 2017. Read the original article here: http://www.makeuseof.com/tag/most-secure-mainstream- browser/ This ebook is the intellectual property of MakeUseOf. It must only be published in its original form. Using parts or republishing altered parts of this ebook is prohibited without permission from MakeUseOf.com. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Table of contents What Is “Mainstream”? 4 Google Chrome 5 Sandboxing 5 A Proviso about Sandboxing 6 More Good Stuff 6 Reporting Exploitations 7 Are There Any Negatives? 8 Internet Explorer 9 Is There Anything Good? 9 This Doesn’t Sound Too Bad 10 Why Should You Avoid IE? 11 Firefox 12 Applauding Firefox’s Mission 12 The Sandboxing Problem 13 Other Security Features? 13 Any Problems? 14 Microsoft Edge 14 Does Its Newness Affect Security? 14 Does It Have the Edge? 15 Anything Bad to Consider? 15 Safari 16 Reasons to Use Safari 16 Why Safari’s 54-Day Update Program Isn’t a Problem 17 Reasons Not to Use Safari 19 Opera 20 The Link Between Opera and Chrome 20 Why Choose Opera Over Chrome? 21 Anything Bad You Should Know About? 22 A Final Word on Downloads 22 What Is the Most Secure Mainstream Browser? 23 Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! The battle for the best desktop browser will never be settled. There are those who will always swear by Google Chrome; others who hold Safari up as the clear winner; and even some who have stuck by Internet Explorer (IE) despite constant press negativity. Even defining the qualities for what constitutes as “The Best” is difficult, though it often simply comes down to user experience. But which is the most secure? Of course, all will boast having superior protection — but in 2017, which is the browser of choice for the security- and privacy-conscious? What Is “Mainstream”? Let’s set out some ground rules. If we were to open this up to all browsers, we’d be here forever and no conclusions would be made. For those not tech-savvy, we’re not rating operating systems (OS), mobile or otherwise. This isn’t about Linux or Mac or Windows desktop. We’re solely concentrating on which browser you’re using to explore the internet. This is designed for all levels of expertise — meaning we won’t cover VPN services like Tor because relatively few actually use that. Instead, we’re focusing on the most popular six. Those are, at the time of writing: Chrome (59.61% market share); Internet Explorer (14.18%); Firefox (12.85%); Edge (5.15%); Safari (5.08%); and Opera (1.27%). Again, we’re looking solely at desktop, but even if we include smartphone and tablet browsers, Chrome still comes out on top. However, Safari naturally sees a huge increase, thanks to it being the iPhone browser, putting it in second place. We’re going to look at each of these in turn, listing them in order of market share. This isn’t a popularity contest: let’s find out which is the most secure! Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Google Chrome Google is renowned for its solid security measures, which probably accounts for a considerable number of users downloading Chrome. It’s fair to say the rest just became used to it after dissatisfaction with IE. With an almost 60% market share, millions use Chrome. A wealth of those accessing the web through different gateways no doubt still use Google as a search engine too. All in all: the majority of people use, and therefore trust, Google. But are they right to? Sandboxing Let’s introduce you to a concept that we’re going to keep coming back to, but which Chrome arguably does best: sandboxing. Essentially, sandboxing is damage limitation. This is a safe space isolated from other areas of your computer: what happens in the sandbox stays in the sandbox — unless, that is, it’s something you’ve allowed to have wider effects. Image Credits: Gabriel Pu via Flickr. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Any page or tab opened on Chrome is sandboxed so it can’t adversely affect your OS or any other app you’re running. If one website is unresponsive, those loaded on other tabs should still carry on as normal. Equally, if you encounter an unsafe site, any potential viruses won’t impact the rest of your PC. Once you close the page, the unsafe site is gone too. The same goes for extensions. Flash, though flawed, is an extensively-used add-on, allowing you to watch videos and play games on the web. Because it’s popular, however, hackers aim to exploit it. Fortunately, Chrome sandboxes this too; any issue with Flash won’t trouble any other part of your OS. Think of it like television. No single channel affects another. Don’t like what you’re seeing on NBC? Just “close” the channel by turning over. Simple. We’re certainly not saying that Chrome is the only service to use the sandboxing method. Your smartphone does too, as long as you’re solely using the official app stores. Any browser that uses the open-source software provided by the Chromium Projects includes sandboxing. But Chrome is the browser that uses the original source code. A Proviso about Sandboxing If you use Chrome, you might be questioning why you’ve had viruses in the past. If everything’s sandboxed, you should be fine — right? Sadly not. Malware, including ransomware, is held back by the unique environment, but the second you download anything, you leave yourself open to any flaws. You allow something to make changes to your PC. This might be adding a PDF to your Documents, or it could be having malicious code running in the background. That’s why email providers let you view attachments online: that way, anything you view is contained. Downloading anything is only advisable if you know for sure that everything’s okay. More Good Stuff The sandboxing process is widely used, so that’s fortunately not the only edge Chrome has on other services. You’ve probably visited a site and seen a pop up, warning that the site could harm your computer. That’s Chrome’s Safe Browsing, which alerts you of anything it suspects contains malware or phishing. The same goes for Google Search: when listing results, unsecure options will be accompanied by a similar monitory. Chrome also defaults to the most secure settings without negatively impacting your experience. In the address bar, it’ll tell you whether a site is secure (i.e. if it has SSL or TLS certificates), and clicking on that padlock or “i” symbol will tell you more about your connection. It’ll advise you whether you can safely submit sensitive information, for example, followed by a list of general permissions. On default, it will allow the loading of images, JavaScript, and Background Sync. For all others, like accessing your webcam, microphone, and location, Chrome will ask you whether this is really something you want to do. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Image Credit: Alan Myers via Flickr. All of these are customizable, but rest assured that you don’t need to do anything to these settings to improve security or usability. The best thing about Chrome, however, is its updates. With major security patches issued every 15 days, Google is the fastest mainstream browser to respond to vulnerabilities. Any browser that checks whether fixes must be applied so regularly should be applauded. Furthermore, developers are always keen to push new Chrome extensions. While this isn’t the place to talk about those add-ons, taking 10 minutes out to personalize your browser can significantly tighten protection. Reporting Exploitations In the latest two-day hacking contest, Pwn2Own, hacking collectives attempted to exploit (and so expose) vulnerabilities in major browsers. In 2016 and 2017, Chrome came out on top, with no hackers able to crack it in the allotted time limit. It doesn’t mean that no one could eventually carry out a successful cyberattack, but it remains a good sign that Chrome is a very strong contender. Add to this the fact that the Chromium Projects has a Chrome Reward Program. Set up in 2010, Google offers monetary incentives to anyone who exposes a vulnerability and reports it to them, instead of exploiting the flaw. If a full report is made, the standing reward money is up to $15,000. That total is to anyone finding fault in the sandboxing process, though other prizes remain for smaller issues including bugs in third-party components. Copyright © 2017 MakeUseOf. All Rights Reserved ®. ! Patches for any problems would then be issued via updates. Are There Any Negatives? Naturally. Nothing is impervious. One of the things acting against Chrome is its popularity. You might question the logic of this argument, but because it’s used by so many, it’s the biggest target. In 2016, Chrome had the most discovered vulnerabilities (172, compared to Edge’s 135). The statistic doesn’t account for the severity of flaws, how fast they were patched, or, of course, how many remain undiscovered on other browsers. Image Credit: Eduardo Woo via Flickr. Similarly, a patch may be issued, but that doesn’t mean users are updating their settings. This is a problem shared by all mainstream browsers, and Chrome isn’t the worst affected. Still, around 50% don’t update. Yet it’s very easy to do! Just click on the vertical ellipses at the top right, then Help > About Google Chrome.
Recommended publications
  • Opera Mini Application for Android
    Opera Mini Application For Android Wat theologized his eternities goggling deathy, but quick-frozen Mohammed never hammer so unshakably. Fain and neverfringillid headline Tyrone sonever lambently. reapplied his proles! Tracie meows his bibulousness underdevelop someplace, but unrimed Ephrayim This application lies in early on this one knows of applications stored securely for example by that? Viber account to provide only be deactivated since then. Opera Mini is a super lightweight browser that loads web pages faster than what every other browser available. Opera Mini Browser Latest News Photos Videos on Opera. The Opera Mini for Android lets you do everything you any to online without wasting your fireplace plan It's stand fast safe mobile web browser that saves you tons of. Analysis of tomorrow with a few other. The mini application for opera android open multiple devices. Just with our site on a view flash drives against sim swap scammers? Thanks for better alternative software included in multitasking is passionate about how do you can browse, including sms charges may not part of mail and features. Other download option for opera mini Hospedajes Mirta. Activating it for you are you want. Opera mini 16 beta android app has a now released and before downloading the read or full review covering all the features here. It only you sign into your web page title is better your computer. The Opera Mini works the tender as tide original Opera for Android This app update features a similar appearance and functionality but thrive now displays Facebook. With google pixel exclusive skin smoothing makeover tool uses of your computer in total, control a light.
    [Show full text]
  • Telenor Takes the Mobile Internet to the Masses
    Telenor takes the mobile Internet to the masses The Mobile Internet Asia project hit the ground running this spring. Telenor is on its way to bringing the Web to the masses on both feature phones and smartphones. Today Asia is experiencing the world’s most rapid growth when it comes to mobile Internet usage. In the past two years alone, mobile Web traffic has tripled on the continent, making Asia the source of 18 percent of the world’s mobile Web browsing (source: Statcounter, Pingdom). In order to play a central role in capturing a share of this growth, Telenor Digital Services kicked off the Mobile Internet Asia (MIA) project in April this year. A mobile Internet leader in Asia “Telenor Group and its Business Units have, for several years now, focused on the importance of mobile Internet in Asia, and we have run pilot projects in this area to find the best solutions that meet the needs of our customers,” says Sissel Henriette Larsen, Vice President and Head of Services, Telenor Asia. “By starting the MIA project now, we are making a formal move to become leaders in mobile Internet in Asia. We want to tap into this explosive growth and the best Internet experience to customers.” The MIA project, under the Telenor Digital Services umbrella, includes two main focus areas: “Build the Base” and “Smartphone”. Each focus area shares the goal of establishing Telenor as a leader in providing mobile Internet. However, the two work streams differ in terms of who is targeted and how. Accelerating smartphone growth in Asia The Smartphone work stream within in MIA project is newly headed by Mark (Amarit) Sukhavanij, effective July 1, 2012.
    [Show full text]
  • Technical Intelligence ISSUE: 19.04.21
    Technical Intelligence ISSUE: 19.04.21 The CyberScotland Technical Threat Intelligence Bulletin is designed to provide you with information about updates, exploits and countermeasures. We hope that you benefit from this resource and we ask that you circulate this information to your networks, adapting where you see fit. Jump To TECHNICAL THREAT AWARENESS AND HUNTING Microsoft Patch Tuesday (April 2021) Adobe Patches Slew of Critical Security Bugs Patch Chrome to Remediated In-The-Wild 0-Day Exploits F5 urges customers to patch critical BIG-IP pre-auth RCE bug Wordpress Privilege-Escalation and Authentication Bypass Apple rushes to patch zero‑day flaw in iOS, iPadOS Cisco Will Not Patch Critical RCE Flaw Affecting End-of-Life Business Routers Threat Intelligence Bulletin Technical Threat Awareness and Hunting Microsoft Patch Tuesday (April 2021) Microsoft released its monthly security update Tuesday 13th April 2021, disclosing 114 vulnerabilities across its suite of products1. Four new remote code execution vulnerabilities in Microsoft Exchange Server are included, beyond those that were release out-of-band last month. The detection of the vulnerabilities which led to these patches has been attributed to the US’s National Security Agency (NSA)2. Given the recent focus on Microsoft Exchange by varying threat actors, NCSC has produced an alert encouraging organisations to install the critical updates immediately3. More patches are likely to follow for Microsoft’s Exchange servers as, at a recent hacking contest called pwn2own a team called DEVCORE combined an authentication bypass and a local privilege escalation to complete take over the Exchange server. As a result they won $200,000.4 In all, there are 20 critical vulnerabilities as part of this release and one considered of “moderate” severity.
    [Show full text]
  • Opera Software the Best Browsing Experience on Any Device
    Opera Software The best browsing experience on any device The best Internet experience on any device Web Standards for the Future – Bruce Lawson, Opera.com • Web Evangelist, Opera • Tech lead, Law Society & Solicitors Regulation Authority (2004-8) • Author 2 books on Web Standards, edited 2 • Committee member for British Standards Institution (BSI) for the new standard for accessible websites • Member of Web Standards Project: Accessibility Task Force • Member of W3C Mobile Best Practices Working Group Web Standards for the Future – Bruce Lawson, Opera.com B.A., Honours English Literature and Language with Drama Theresa is blind But she can use the Web if made with standards The big picture WWW The big picture Western Western Web A web (pre)history • 1989 TBL proposes a project • 1992 <img> in Mosaic beta. Now 99.57% (MAMA) • 1994 W3C started at MIT • 1996 The Browser Wars • 1999 WAP, Web Content Accessibility Guidelines (WCAG) • 2000 Flash Modern web history • 2000-ish .com Crash - Time to grow up... • 2002 Opera Mobile with Small Screen Rendering • 2005 WHAT-WG founded, W3C Mobile Web Initiative starts • 2007 W3C adopts WHAT-WG spec as basis for HTML 5 • January 22, 2008 First public working draft of HTML 5 Standards at Opera • 25 employees work on standards • Mostly at W3C - a big player • Working on many standards • Bringing new work to W3C • Implementing Standards properly (us and you!) (Web Standards Curriculum www.opera.com/wsc) Why standards? The Web works everywhere - The Web is the platform • Good standards help developers: validate; separate content and presentation - means specialisation and maintainability.
    [Show full text]
  • Private Browsing
    Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor, Carnegie Mellon University https://www.usenix.org/conference/soups2018/presentation/habib-prying This paper is included in the Proceedings of the Fourteenth Symposium on Usable Privacy and Security. August 12–14, 2018 • Baltimore, MD, USA ISBN 978-1-939133-10-6 Open access to the Proceedings of the Fourteenth Symposium on Usable Privacy and Security is sponsored by USENIX. Away From Prying Eyes: Analyzing Usage and Understanding of Private Browsing Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, Lorrie Faith Cranor Carnegie Mellon University {htq, jcolnago, vidyag, spearman, thomasjm, acquisti, nicolasc, lorrie}@andrew.cmu.edu ABSTRACT Prior user studies have examined different aspects of private Previous research has suggested that people use the private browsing, including contexts for using private browsing [4, browsing mode of their web browsers to conduct privacy- 10, 16, 28, 41], general misconceptions of how private brows- sensitive activities online, but have misconceptions about ing technically functions and the protections it offers [10,16], how it works and are likely to overestimate the protections and usability issues with private browsing interfaces [41,44]. it provides. To better understand how private browsing is A major limitation of much prior work is that it is based used and whether users are at risk, we analyzed browsing on self-reported survey data, which may not always be reli- data collected from over 450 participants of the Security able.
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • 'Inside Track' Mobile App Beta Testing
    PITTSBURGHOPERA page 1 Pittsburgh Opera ‘Inside Track’ Mobile App beta testing Thank you for being a beta tester for our new ‘Inside Track’ functionality within the Pittsburgh Opera Mobile App. Background on Pittsburgh Opera Mobile App The Pittsburgh Opera Mobile App launched in 2016. It was built using a platform called Instant Encore, which is the leading software provider of performing arts mobile apps in North America. The app, which is free and available for both iOS and Android devices, features a plethora of opera content. Examples include performance and event schedules, bios on our Resident Artists, ticket purchasing, video excerpts, and more. Instant Encore has recently added functionality which enables patrons in the theater to receive content during an actual performance. The content, which is all visual (photos/text), is meant to enhance the patron’s experience during the performance, by providing context, background information about the composer or piece being performed, etc. Pittsburgh Opera has installed this software in our app, and is testing it during the fall performances at the Benedum. Over the winter we will be rolling out new, custom-built functionality which allow us to include audio content as well. We are calling the combined product ‘Inside Track’. We want to make sure that we have worked out any kinks with the ‘phase 1’ software (i.e. visual content only) prior to launching phase 2 (audio content.) How to download the app The Pittsburgh Opera mobile app is available for free download in the App Store for iOS devices and Google Play for Android devices.
    [Show full text]
  • $Hell on Earth: from Browser to System Compromise
    $hell on Earth: From Browser to System Compromise Matt Molinyawe, Abdul-Aziz Hariri, and Jasiel Spelman A Zero Day Initiative Research Paper TREND MICRO LEGAL DISCLAIMER The information provided herein is for general information Contents and educational purposes only. It is not intended and should not be construed to constitute legal advice. The information contained herein may not be applicable to all situations and may not reflect the most current situation. 3 Nothing contained herein should be relied on or acted upon without the benefit of legal advice based on the particular facts and circumstances presented and nothing Introduction herein should be construed otherwise. Trend Micro reserves the right to modify the contents of this document at any time without prior notice. Translations of any material into other languages are 4 intended solely as a convenience. Translation accuracy is not guaranteed nor implied. If any questions arise related to the accuracy of a translation, please refer to Mitigation Evolution the original language official version of the document. Any discrepancies or differences created in the translation are not binding and have no legal effect for compliance or enforcement purposes. 6 Although Trend Micro uses reasonable efforts to include accurate and up-to-date information herein, Trend Micro History and Anatomy makes no warranties or representations of any kind as to its accuracy, currency, or completeness. You agree of Pwn2Own Remote that access to and use of and reliance on this document and the content thereof is at your own risk. Trend Micro Browser to Super-User disclaims all warranties of any kind, express or implied.
    [Show full text]
  • Opera Mini Opera Mobile Shipments Pre-Installed in 4Q08: 7.3 Million
    Opera Software Fourth quarter 2008 A note from our lawyers 2 This presentation contains and is, i.a., based on forward-looking statements. These statements involve known and unknown risks, uncertainties and other factors which may cause our actual results, performance or achievements to be materially different from any future results, performances or achievements expressed or implied by the forward-looking statements . Forward-looking statements may in some cases be identified by terminology such as “may”, “will”, “could”, “should”, “expect”, “plan”, “intend”, “anticipate”, “believe”, “estimate”, “predict”, “pp,gpgyotential” or “continue”, the negative of such terms or other comparable terminology. These statements are only predictions. Actual events or results may differ materially, and a number of factors may cause our actual results to differ materially from any such statement. Although we believe that the expectations and assumptions reflected in the statements are reasonable, we cannot guarantee future results, levels of activity, performance or achievement. Opera Software ASA makes no representation or warranty (express or implied) as to the correctness or completeness of the presentation, and neither Opera Software ASA nor any of its direc tors or emp loyees assumes any lia bility resu lting from use. Excep t as requ ire d by law, we undertake no obligation to update publicly any forward-looking statements for any reason after the date of this presentation to conform these statements to actual results or to changes in our expectations. You are advised, however, to consult any further public disclosures made by us, su ch as filings made w ith the OSE or press releases .
    [Show full text]
  • Tracking Users Across the Web Via TLS Session Resumption
    Tracking Users across the Web via TLS Session Resumption Erik Sy Christian Burkert University of Hamburg University of Hamburg Hannes Federrath Mathias Fischer University of Hamburg University of Hamburg ABSTRACT modes, and browser extensions to restrict tracking practices such as User tracking on the Internet can come in various forms, e.g., via HTTP cookies. Browser fingerprinting got more difficult, as trackers cookies or by fingerprinting web browsers. A technique that got can hardly distinguish the fingerprints of mobile browsers. They are less attention so far is user tracking based on TLS and specifically often not as unique as their counterparts on desktop systems [4, 12]. based on the TLS session resumption mechanism. To the best of Tracking based on IP addresses is restricted because of NAT that our knowledge, we are the first that investigate the applicability of causes users to share public IP addresses and it cannot track devices TLS session resumption for user tracking. For that, we evaluated across different networks. As a result, trackers have an increased the configuration of 48 popular browsers and one million of the interest in additional methods for regaining the visibility on the most popular websites. Moreover, we present a so-called prolon- browsing habits of users. The result is a race of arms between gation attack, which allows extending the tracking period beyond trackers as well as privacy-aware users and browser vendors. the lifetime of the session resumption mechanism. To show that One novel tracking technique could be based on TLS session re- under the observed browser configurations tracking via TLS session sumption, which allows abbreviating TLS handshakes by leveraging resumptions is feasible, we also looked into DNS data to understand key material exchanged in an earlier TLS session.
    [Show full text]
  • Forensic Investigation of User's Web Activity on Google Chrome Using
    IJCSNS International Journal of Computer Science and Network Security, VOL.16 No.9, September 2016 123 Forensic Investigation of User’s Web Activity on Google Chrome using various Forensic Tools Narmeen Shafqat, NUST, Pakistan Summary acknowledged browsers like Internet Explorer, Google Cyber Crimes are increasing day by day, ranging from Chrome, Mozilla Firefox, Safari, Opera etc. but should confidentiality violation to identity theft and much more. The also have hands on experience of less popular web web activity of the suspect, whether carried out on computer or browsers like Erwise, Arena, Cello, Netscape, iCab, smart device, is hence of particular interest to the forensics Cyberdog etc. Not only this, the forensic experts should investigator. Browser forensics i.e forensics of suspect’s browser also know how to find artifacts of interest from older history, saved passwords, cache, recent tabs opened etc. , therefore supply ample amount of information to the forensic versions of well-known web browsers; Internet Explorer, experts in case of any illegal involvement of the culprit in any Chrome and Mozilla Firefox atleast, because he might activity done on web browsers. Owing to the growing popularity experience a case where the suspected person is using and widespread use of the Google Chrome web browser, this older versions of these browsers. paper will forensically analyse the said browser in windows 8 According to StatCounter Global market share for the web environment, using various forensics tools and techniques, with browsers (2015), Google Chrome, Mozilla Firefox and the aim to reconstruct the web browsing activities of the suspect. Microsoft’s Internet Explorer make up 90% of the browser The working of Google Chrome in regular mode, private usage.
    [Show full text]
  • Incognito (Private Browsing) for AHA Online Testing
    Incognito (private browsing) for AHA Online Testing Go Incognito on Google Chrome 1. Open Google Chrome and click the wrench icon in the top right corner. 2. Click ‘new incognito window’. 3. Alternatively, you can press Ctrl + Shift + N. *You can also open a link in a web page in Incognito Mode. 1. Right-click on the link you want to open in an Incognito window. 2. Click ’Open in new incognito window’ from the context menu. **You can tell if you’re browsing privately by looking for the logo of the person in disguise in the top-left corner of the window. He’s wearing sunglasses, a hat and a raincoat. Go Incognito on Mozilla Firefox 1. Open Firefox and click the hamburger Menu button – it looks like three parallel lines. 2. Click ‘New private window’. *You can also open a link in a web page in a private window. 1. Right-click on the link you want to open in a private window. 2. Click ’Open in New Private Window’ from the context menu. **You can tell if you’re browsing privately by looking for an icon of a purple mask in the top-right corner of the window. Go Incognito on Safari on the Mac 1. In Yosemite and later, open Safari and click on ‘File’. 2. Click ‘New Private Window’. 3. Alternatively, click Command + Shift + N. 4. In Mavericks 10.9 or older, open Safari and click Safari in the browser’s Menu bar and select ‘Private Browsing’. **Private browsing tabs in Safari are separated from non-private tabs.
    [Show full text]