词条 | Private browsing | ||||||||||||||||||||||||
释义 |
HistoryThe earliest reference to private browsing was in May 2005, and was used to discuss the privacy features in the Safari browser bundled with Mac OS X Tiger.[3] The feature has since been adopted in other browsers, and led to popularization of the term in 2008 by mainstream news outlets and computing websites when discussing beta versions of Internet Explorer 8.[4][5][6] However, privacy modes operate as shields because browsers typically do not remove all data from the cache after the session. Plug-ins, like Silverlight, are able to set cookies that will not be removed after the session. The common web browser plugin Adobe Flash Player began supporting privacy mode in Chrome, Firefox, Internet Explorer, and Safari with the release of version 10.1 in June 2010.[7]. Some browsers (like Internet Explorer 8) allow users to select the privacy mode for single tabs, whereas others create a more isolated environment protected by password and cryptography. UsesPrivate browsing has multiple uses, including:[8][9][10]
The Mozilla Foundation performed a study about the user behavior when the feature is switched on and how long the session lasts. The results were that most sessions last only about 10 minutes, though there are periods where activation increases; usually around 11 a.m. to 2 p.m., 5 p.m., between 9 p.m. and 10 p.m., and a minor peak about an hour or two after midnight.[11] Support in popular browsersPrivate browsing is known by different names in different browsers.[12]
SecurityIn 2012, Brazilian researchers published the results of a research project[17] where they applied forensic techniques (namely the Foremost data carving tool and Strings program) to extract information about the users browsing activities on Internet Explorer and Firefox browsers with their private mode enabled. They were able to collect enough data to identify pages visited and even partially reconstruct them. This research was later extended[18] to include Chrome and Safari browsers. The gathered data proved that browsers' private mode implementations are not able to fully hide users' browsing activities and that browsers in private mode leave traces of activities in caching structures and files related to the paging process of the operating system. Another independent security analysis, performed by a group of researchers at Newcastle University in 2014, shows a range of security vulnerabilities in the implementation of the private mode across four major browsers (IE, Firefox, Chrome and Safari).[19] The results are summarized below.
In 2010, professors at Stanford University found that while Firefox won't record your history during a private browsing session, it still records the sites on which you've installed SSL certificates (which enable secure, encrypted information exchange indicated by the "https" in front of the URL) and allows specific permissions. If you download an SSL certificate from a website or told that site specifically to stop displaying pop-ups and downloading cookies, all of that information is still stored on Firefox.{{cn|date=June 2018}} In 2015, researchers from Pennsylvania State University found that a considerable amount of extensions on Firefox violated the private browsing policy based on an investigation of the top 2,000 extensions.[20] Many extensions maintain their own profile folders on the local machine, and most of them will not wipe the browsing data after the private browsing session ends. This violation even happens on some most popular extensions with millions of users on Firefox. References1. ^{{cite news |last1=Verger |first1=Rob |title=Your private browsing isn’t as incognito as you want it to be |url=https://www.popsci.com/private-browsing |accessdate=15 September 2018 |date=26 February 2018}} 2. ^{{cite web|url=http://www.howtogeek.com/117776/htg-explains-how-private-browsing-works-and-why-it-doesnt-offer-complete-privacy/|title=HTG Explains: How Private Browsing Works and Why It Doesn't Offer Complete Privacy|publisher=How-To Geek}} 3. ^{{cite web|url=http://lifehacker.com/software/mac-os-x/safaris-private-porn-browsing-mode-102146.php|title=Safari's private (porn) browsing mode|last=Trapani|first=Gina|authorlink=Gina Trapani|date=May 4, 2005|publisher=Lifehacker|accessdate=2010-04-11}} 4. ^{{cite web|url=http://blogs.zdnet.com/microsoft/?p=1550|title=Microsoft to roll out more granular 'porn mode' with IE 8|first=Mary Jo|last=Foley|publisher=ZDNet|accessdate=2008-10-04}} 5. ^{{cite web|url=http://www.redherring.com/Home/24763|title=Microsoft's Internet Explorer 8 Goes 'Porn Mode'|first=Lalee|last=Sadighi|publisher=Red Herring|accessdate=2008-10-04|deadurl=yes|archiveurl=https://web.archive.org/web/20080912040417/http://www.redherring.com/Home/24763|archivedate=2008-09-12|df=}} 6. ^{{cite web|url=http://apcmag.com/microsoft_releases_ie8_beta_2.htm|title=Microsoft releases IE8 beta 2: MS porn mode included|first=Angus|last=Kidman|publisher=APC|accessdate=2008-10-04}} 7. ^{{cite web|last1=Xu|first1=Jimson|last2=Nguyen|first2=Tom|title=Private browsing in Flash Player 10.1 |url=http://www.adobe.com/devnet/flashplayer/articles/privacy_mode_fp10_1.html|publisher=Adobe Systems|accessdate=14 January 2011|date=30 June 2010}} 8. ^{{cite web|url=http://www.apartmenttherapy.com/7-situations-where-you-should-use-private-browsing-mode-179175|title=7 Great Uses for Your Browser's Private Browsing Mode|first=Taryn|last=Fiol|date=23 October 2012|publisher=Apartment Therapy}} 9. ^{{cite web|url=http://null-byte.wonderhowto.com/how-to/5-great-reasons-why-you-should-use-private-browsing-online-0140619/|title=5 Great Reasons Why You Should Use Private Browsing Online|first=Osas|last=Obaiza|publisher=Null Byte}} 10. ^{{cite web|url=http://lifehacker.com/5620502/nine-great-uses-for-private-browsing-that-dont-involve-porn|title=Nine Great Uses for Private Browsing that Don't Involve Porn|first=Adam|last=Pash|publisher=Lifehacker|date=25 August 2010}} 11. ^{{cite web|last=Ulmer|first=Hamilton|title=Understanding Private Browsing|url=http://blog.mozilla.com/metrics/2010/08/23/understanding-private-browsing/|work=Blog of Metrics|publisher=Mozilla Foundation|accessdate=24 August 2010|date=23 August 2010}} 12. ^{{cite news|url=https://www.digitalcitizen.life/how-browse-web-incognito-all-big-browsers|title=How to go incognito in all web browsers: Chrome, Firefox, Opera, Edge, and Internet Explorer|date=November 9, 2018|work=Digital Citizen|last=Parchisanu|first=Daniel|access-date=January 9, 2019}} 13. ^{{Cite press release|url=http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/03-19-2009/0004991142|publisher=Microsoft|title=Microsoft Announces Availability of Internet Explorer 8|accessdate=16 December 2011|date=19 March 2009|deadurl=yes|archiveurl=https://web.archive.org/web/20090322090328/http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=%2Fwww%2Fstory%2F03-19-2009%2F0004991142|archivedate=22 March 2009|df=}} 14. ^{{cite web|url=https://mxr.mozilla.org/mozilla1.9.1/source/browser/locales/en-US/chrome/browser/aboutPrivateBrowsing.dtd#1|title=Mozilla Cross-Reference mozilla1.9.1|publisher=Mozilla Foundation|accessdate=2009-05-26}} 15. ^{{cite web|url=http://labs.opera.com/news/2009/12/22/|title=Opera 10.5 pre-alpha for Labs|publisher=Opera Software|accessdate=2009-12-22|first=Roberto|last=Mateu|deadurl=yes|archiveurl=https://www.webcitation.org/61DUAFSVw?url=http://labs.opera.com/news/2009/12/22/|archivedate=2011-08-26|df=}} 16. ^{{cite web|url=https://amazonsilk.wordpress.com/2014/11/18/private-browsing-for-amazon-silk/|title=Private Browsing for Amazon Silk|publisher=Amazon Inc.|accessdate=2014-11-18|deadurl=yes|archiveurl=https://web.archive.org/web/20141222053804/https://amazonsilk.wordpress.com/2014/11/18/private-browsing-for-amazon-silk/|archivedate=2014-12-22|df=}} 17. ^R. Ruiz, F. P. Amatte, K. J. B. Park, [https://www.researchgate.net/publication/258491690_Making_the_In_Private_Navigation_as_Public_%28Tornando_Pblica_a_Navegao_In_Private%29_Portuguese Tornando Pública a Navegação “In Private”]. Proceedings of the Seventh International Conference on Forensic Computer Science – ICoFCS 2012, Available online Sep 2012. 18. ^R. Ruiz, F. P. Amatte, K. J. B. Park, [https://www.researchgate.net/publication/271497300_Opening_the__Private_Browsing__Data__Acquiring_Evidence_of_Browsing_Activities Opening the “Private Browsing” Data – Acquiring Evidence of Browsing Activities]. Proceedings of the International Conference on Information Security and Cyber Forensics (InfoSec2014), Available online Oct 2014. 19. ^{{Cite journal |doi = 10.1016/j.jisa.2014.02.002|title = On the privacy of private browsing – A forensic approach|journal = Journal of Information Security and Applications|volume = 19|pages = 88–100|year = 2014|last1 = Satvat|first1 = Kiavash|last2 = Forshaw|first2 = Matthew|last3 = Hao|first3 = Feng|last4 = Toreini|first4 = Ehsan}} 20. ^B. Zhao, P. Liu, Private Browsing Mode Not Really That Private: Dealing with Privacy Breaches Caused by Browser Extensions. In Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2015), Rio de Janeiro, Brazil, Available online June 2015. External links
3 : Web browsers|Privacy|2005 introductions |
||||||||||||||||||||||||
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。