{"id":377,"date":"2017-01-27T14:26:46","date_gmt":"2017-01-27T14:26:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/an-introduction-to-private-browsing\/"},"modified":"2019-05-29T12:28:51","modified_gmt":"2019-05-29T12:28:51","slug":"an-introduction-to-private-browsing","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/","title":{"rendered":"An introduction to private browsing"},"content":{"rendered":"<p class=\"wls-paragraph\">When we go online, we all leave a digital \u2018trace\u2019. Our IP addresses give us away and cookies collect our browsing habits. Our Internet Service Providers (ISPs) and&nbsp;employers theoretically have a log of what sites we visit and when. Even private browsing, otherwise known as incognito mode, is not totally safe from prying eyes.<\/p>\n<p class=\"wls-paragraph\">So, what is private browsing? In essence, it is about staying anonymous on the web with little to no trace of your online activities.<\/p>\n<p class=\"wls-paragraph\">The advantages are numerous; ranging from protecting you from targeted ads to enabling you to get around <a href=\"https:\/\/en.oxforddictionaries.com\/definition\/paywall\" target=\"_blank\" rel=\"noopener noreferrer\">website paywalls<\/a> or even buying \u2018surprise\u2019 presents for your friends and family. Furthermore, there are other, little-known benefits, such as saving you money.<\/p>\n<p class=\"wls-paragraph\">So with <a href=\"http:\/\/www.welivesecurity.com\/?s=Data+Privacy+Day\" target=\"_blank\" rel=\"noopener noreferrer\">Data Privacy Day<\/a> coming up on January 28th, we look at how you can stay anonymous online.<\/p>\n<h2><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88235\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_541018405-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_541018405-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_541018405-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_541018405-1-65x42.jpg 65w\" alt=\"Three anonymous people - data\" width=\"640\" height=\"410\"><\/b><\/h2>\n<h2><b>Stick with HTTPS<\/b><\/h2>\n<p class=\"wls-paragraph\">Whenever possible, use the HTTPS protocol when browsing the web. The \u2018s\u2019 on the end stands for security, which is made possible with SSL (Secure Sockets Layer). This helps to encrypt any data that is sent online.<\/p>\n<p><span class=\"block_quote_right\">\u201cHTTP is like writing things on a postcard, HTTPS is like writing things in a letter.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">Note that the HTTPS protocol does not mask your location at all, only the contents of your communication. Here\u2019s a great analogy ESET\u2019s from Aryeh Goretsky:<\/p>\n<p class=\"wls-paragraph\">\u201cHTTP is like writing things on a postcard, HTTPS is like writing things in a letter, and then putting it in an envelope and sealing it. The mailman\/ISP can still see where the letter is going, but can only read the contents of the HTTP\/postcard communication; all they know about the HTTPS\/envelope is where it came from and where it\u2019s going.\u201d<\/p>\n<h2><b>Ad blockers<\/b><\/h2>\n<p class=\"wls-paragraph\">Ad blocking, for many, is an absolute must for maintaining online privacy, and indeed staying secure from cybercriminals.<\/p>\n<p class=\"wls-paragraph\">A large number of websites track and collect the browsing habits of the users that visit them through cookies, but ad blockers stop these details being collected.<\/p>\n<p><span class=\"block_quote_right\">\u201cAd blocking, for many, is an absolute must for maintaining online privacy, and indeed staying secure from cybercriminals.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">It is recommended that you block advertisements and scripts on all websites except those that you trust, and then only allow what you need to support the functioning of that site.<\/p>\n<h2><b>Password managers<\/b><\/h2>\n<p class=\"wls-paragraph\">There are several password managers available, but sadly mainstream adoption is a constant struggle. This isn\u2019t helped by the fact that <a href=\"http:\/\/www.welivesecurity.com\/2015\/06\/16\/password-security-firm-lastpass-compromised\/\" target=\"_blank\" rel=\"noopener noreferrer\">some get compromised<\/a>, opening up all your passwords to cybercriminals.<\/p>\n<p class=\"wls-paragraph\">A password manager is, nevertheless, a good idea. It can save all your passwords, create new ones and save other details too \u2013 like your bank credentials. Note, the password you use to access your password manager \u2013 this needs to be \u2018super\u2019 complex. After all, with \u2018all your eggs in one basket\u2019, having a weak password is not ideal to say the least.<\/p>\n<h2><b>Use temporary email addresses<\/b><\/h2>\n<p class=\"wls-paragraph\">Disposable Email Addresses (DEAs) are anonymous and temporary. They allow users to&nbsp;create new email addresses quickly, as and when they\u2019re needed, after which they can&nbsp;be forgotten and never used again.<\/p>\n<p class=\"wls-paragraph\">This is particularly useful to avoid spam one might receive after filling in forms on potentially dodgy websites that require an email address in order to be able to complete (and submit) the form. All that said, if you have to put in an email address in a form on a website that you don\u2019t consider truly legit, you are playing with fire.<\/p>\n<h2><b>VPNs<\/b><\/h2>\n<p class=\"wls-paragraph\"><a href=\"http:\/\/www.welivesecurity.com\/videos\/vpn-beginners\/\" target=\"_blank\" rel=\"noopener noreferrer\">Virtual Private Networks<\/a> (VPNs) are an effective way of guarding your online privacy, as they hide your IP address \u2013 your unique online identifier \u2013 and run all your online data via a secure and encrypted virtual tunnel, which can keep websites from tracking your online activity, or even knowing which country you\u2019re browsing from.<\/p>\n<p class=\"wls-paragraph\">VPN works by using proxy servers across the world, so your identity \u2013 or location \u2013 can never be fully known (well, to a degree \u2013 technically speaking,&nbsp;it\u2019s not theoretically impossible).<\/p>\n<h2><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88233\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_549403459-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_549403459-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_549403459-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_549403459-1-65x42.jpg 65w\" alt=\"Data privacy\" width=\"640\" height=\"410\"><\/b><\/h2>\n<h2><b>Tor<\/b><\/h2>\n<p class=\"wls-paragraph\">If you\u2019re particularly concerned about being tracked, you could use the Tor anonymizer network, which hides your IP address, making you less likely to be identified and targeted by advertisers or cybercriminals. There are other alternatives to Tor, but this is perhaps the best known.<\/p>\n<p class=\"wls-paragraph\"><a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tor<\/a> is a network of \u201c<a href=\"https:\/\/www.torproject.org\/about\/overview\" target=\"_blank\" rel=\"noopener noreferrer\">virtual tunnels<\/a> that allows people and groups to improve their privacy and security on the Internet.\u201d Tor\u2019s anonymity network allows access to the \u2018deep\u2019 web, where websites can be created anonymously and individuals can communicate privately with one another.<\/p>\n<p><span class=\"block_quote_right\">\u201cThe Tor anonymizer network hides your IP address, making you less likely to be identified and targeted by advertisers or cybercriminals.\u201d<\/span><\/p>\n<h2><b>Private browsing mode<\/b><\/h2>\n<p class=\"wls-paragraph\">Most modern browsers have private browsing modes you can use to make sure the websites you visit don\u2019t appear in your browsing history (note, this does not \u2018erase your footprints\u2019 on the internet itself \u2013 just the records on machine you\u2019re using).<\/p>\n<p class=\"wls-paragraph\">Browsers typically log each website you visit, storing information about what information you entered. With private mode, you are basically telling your browser not to record which websites you\u2019re visiting, and telling it not to use or download any cookies.<\/p>\n<p class=\"wls-paragraph\">These aren\u2019t perfect though. For example, in 2010, <a href=\"http:\/\/crypto.stanford.edu\/%7Edabo\/pubs\/papers\/privatebrowsing.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">professors at Stanford University found<\/a> that while Firefox won\u2019t record your history during a private browsing session, it still records the sites on which you\u2019ve installed SSL certificates.<\/p>\n<h2><b><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88234\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_381805258-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_381805258-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_381805258-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_381805258-1-65x42.jpg 65w\" alt=\"Software development. Software source code. Programming code. Writing programming code on laptop. \" width=\"640\" height=\"410\">Encrypt your web chats<\/b><\/h2>\n<p class=\"wls-paragraph\">WhatsApp and Apple\u2019s iMessage are end-to-end encrypted, but there are some other options available&nbsp;too, especially for desktop communications.<\/p>\n<p class=\"wls-paragraph\"><a href=\"http:\/\/download.cnet.com\/TorChat\/3000-2144_4-10780400.html\">TOR chat<\/a> is a lightweight and easy to use chat client that uses Tor\u2019s location hiding services. It uses <a href=\"http:\/\/info.ssl.com\/article.aspx?id=10241\" target=\"_blank\" rel=\"noopener noreferrer\">SSL\/TLS encryption<\/a>.<\/p>\n<p class=\"wls-paragraph\"><a href=\"https:\/\/crypto.cat\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cryptocat<\/a> is a web-based chat client that uses the <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/Advanced-Encryption-Standard\" target=\"_blank\" rel=\"noopener noreferrer\">AES-256 encryption standard<\/a>, which is extremely hard to break. It also supports group chats.<\/p>\n<h2><strong>So, there you have it<\/strong><\/h2>\n<p class=\"wls-paragraph\">These are some of the tools and techniques you can use the better to protect your anonymity and privacy on the internet. Keep an eye on WeLiveSecurity for future posts on more details and newer options.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/27\/introduction-private-browsing\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>When we go online, we all leave a digital \u2018trace\u2019. Our IP addresses give us away and cookies collect our browsing habits. Our Internet Service Providers (ISPs) and&nbsp;employers theoretically have a log of what sites we visit and when. Even private browsing, otherwise known as incognito mode, is not totally safe from prying eyes. So,<\/p>\n","protected":false},"author":5,"featured_media":1737,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[161,164,167],"tags":[],"class_list":["post-377","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","category-password","category-privacy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>An introduction to private browsing - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An introduction to private browsing\" \/>\n<meta property=\"og:description\" content=\"When we go online, we all leave a digital \u2018trace\u2019. Our IP addresses give us away and cookies collect our browsing habits. Our Internet Service Providers (ISPs) and&nbsp;employers theoretically have a log of what sites we visit and when. Even private browsing, otherwise known as incognito mode, is not totally safe from prying eyes. So,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-27T14:26:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:28:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"An introduction to private browsing\",\"datePublished\":\"2017-01-27T14:26:46+00:00\",\"dateModified\":\"2019-05-29T12:28:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/\"},\"wordCount\":1026,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_290648414-1-623x410.jpg\",\"articleSection\":[\"mobile security\",\"password\",\"privacy\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/\",\"name\":\"An introduction to private browsing - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_290648414-1-623x410.jpg\",\"datePublished\":\"2017-01-27T14:26:46+00:00\",\"dateModified\":\"2019-05-29T12:28:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_290648414-1-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_290648414-1-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"An introduction to private browsing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/27\\\/an-introduction-to-private-browsing\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"An introduction to private browsing - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/","og_locale":"en_US","og_type":"article","og_title":"An introduction to private browsing","og_description":"When we go online, we all leave a digital \u2018trace\u2019. Our IP addresses give us away and cookies collect our browsing habits. Our Internet Service Providers (ISPs) and&nbsp;employers theoretically have a log of what sites we visit and when. Even private browsing, otherwise known as incognito mode, is not totally safe from prying eyes. So,","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-27T14:26:46+00:00","article_modified_time":"2019-05-29T12:28:51+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"An introduction to private browsing","datePublished":"2017-01-27T14:26:46+00:00","dateModified":"2019-05-29T12:28:51+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/"},"wordCount":1026,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg","articleSection":["mobile security","password","privacy"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/","name":"An introduction to private browsing - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg","datePublished":"2017-01-27T14:26:46+00:00","dateModified":"2019-05-29T12:28:51+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_290648414-1-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"An introduction to private browsing"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/27\/an-introduction-to-private-browsing\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/377","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=377"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/377\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1737"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=377"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=377"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=377"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}