Protect your privacy while you browse

Firefox's Private Browsing

Firefox's Private Browsing

It once sounded like paranoia; now it's more like common sense. Steve asked for safe and secure ways to access the Internet without being tracked by crooks, corporations, and governments.

There's no such thing as complete, 100-percent perfect privacy or security. The Heartbleed vulnerability made that patently clear. But you can lock down your Internet access, making a security breach much less likely.

[Have a tech question? Ask PCWorld Contributing Editor Lincoln Spector. Send your query to]

I've already discussed email privacy, so I'll concentrate here on secure web surfing.

Your browser's privacy mode

Most browsers have a mode that allows you to visit sites without being tracked. There's no history, and no cookies.

But you need to know these modes' limits. The sites you visit will still see your router's IP address. And your ISP still knows who you're visiting. And what your ISP knows, the government can find out.

Firefox's Private Browsing

Here's how to enter privacy modes:

Internet Explorer: Select Safety>InPrivate Browsing.

Chrome: Click the menu icon in upper-right corner and select New incognito window.

Firefox: Tap Alt to bring up the browser's menu. Select File>New Private Window.

Browser add-ins

The right tools can add layers of protection to your browser. Here are two free ones I recommend.

Ever hesitate to enter your real email address into a webform? WithMaskMe installed in Firefox or Chrome, you can click on an email address field and have it provide a random, disposable address. Mail sent to that address will be forwarded automatically to your real address...until you tell MaskMe to stop forwarding it. If you're willing to pay $5 a month or $45 a year for the premium service, MaskMe can also provide temporary credit card numbers.

Another add-in, Ghostery, protects you from commercial spies who work in the background. Every time you load a webpage, it displays an annoying but revealing pop-up showing all the advertising and tracking services using that site. You can block services you don't want.

I should mention that Ghostery's parent company, Evidon, takes money from advertisers, creating a possible conflict of interest.

More complete disguises

All of these solutions still allow websites to see your IP address and allow your ISP to track your surfing habits. You can use a virtual private network (VPN), among other option, to hide your IP address.

Or you can use the Tor Browser. This special browser, which always runs in privacy mode, routes its signal through a complex series of servers to hide where you're really coming from. It's about as safe as you can get on the web.

With these precautions, you should be reasonably safe.

Join the CSO newsletter!

Error: Please check your email address.

Tags applicationssecuritybrowserssoftwareprivacy

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lincoln Spector

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts