DEV Community

Cover image for Web Privacy Is Not Incognito Mode
Igor Giamoniano
Igor Giamoniano

Posted on

Web Privacy Is Not Incognito Mode

Introduction

For many users, web privacy still means opening an incognito window or installing an ad blocker.

In reality, that only addresses a small part of the problem.

Real privacy starts with browser architecture, design decisions, and how much the browser communicates with third parties, even when you’re not actively browsing.

In this article, I analyze five browsers that treat privacy as a technical requirement, not an optional feature.


You've gone incognito

Privacy ≠ Incognito Mode

Incognito mode:

  • Does not prevent fingerprinting
  • Does not block advanced trackers
  • Does not isolate the browser completely
  • Does not stop background communication

It only prevents local storage of history and cookies.

In other words, your activity can still be observed externally.


Browser Architecture and Threat Models

Before choosing a privacy-focused browser, you need to understand your threat model:

  • Do you want to reduce commercial tracking?
  • Avoid fingerprinting?
  • Minimize communication with big tech companies?
  • Achieve strong anonymity?

Each browser below solves a different problem.


Mulvad Browser

Mullvad Browser — Privacy by Default

Developed by Mullvad in partnership with the Tor Project, Mullvad Browser is built on Firefox/Tor Browser.

Key characteristics

  • Zero telemetry
  • Strong fingerprinting resistance
  • Aggressive privacy defaults
  • No accounts or sync

Best use case: users who want maximum privacy with zero configuration.


Librewolf Browser

LibreWolf — Full Control over Firefox

LibreWolf is a community-driven Firefox fork focused on control and transparency.

Key characteristics

  • Telemetry removed
  • Enhanced tracking protection
  • Full access to about:config
  • Gecko engine

Best use case: advanced users and developers who want privacy plus deep customization.


Ungoogled Chromium

Ungoogled Chromium — Chromium Without Google

Ungoogled Chromium removes Google integrations from the Chromium codebase.

Key characteristics

  • No automatic calls to Google servers
  • No account-based sync
  • Very close to upstream Chromium

Important limitations

Privacy here comes from removing Google, not from active protection.

Manual tuning and extensions are still recommended.


Tor Browser

Tor Browser — A Different Browsing Model

Tor Browser fundamentally changes the browsing paradigm.

Key characteristics

  • Onion routing
  • Session isolation
  • Aggressive fingerprinting resistance

Trade-offs

  • Reduced performance
  • Broken or limited websites
  • Less convenience

Best use case: journalists, activists, sensitive research, and strong anonymity needs.


Zen Browser

Zen Browser — Privacy with Modern UX

Zen Browser is a Firefox-based browser focused on:

  • Privacy
  • Usability
  • Clean, modern design

It avoids telemetry while keeping a smoother daily experience.

Best use case: users who want a balance between privacy and convenience.


FAQ

Is there a “best” browser for privacy?

No. There is only the browser that best fits your threat model.

Should I still use extensions?

In browsers like Tor or Mullvad, fewer extensions are usually better.

In others, extensions may still be helpful.

Does incognito mode help?

Only locally. It does not protect against external tracking.


Conclusion

Web privacy is not a toggle — it is the result of architectural choices, design decisions, and accepted trade-offs.

There is no perfect browser.

There is only the one that best matches your anonymity needs, compatibility requirements, and usability expectations.

Understanding these differences is the first step toward more conscious browsing.


References

Acknowledgment

This article was inspired by a discussion originally shared on Instagram by ZeroDay and Hacker01Girl.

While the original post introduced the topic in a short-form format, this article expands the idea into a deeper technical analysis focused on browser architecture, threat models, and real-world trade-offs.

Original inspiration:
https://www.instagram.com/p/DSM_pd1jwFh/

Top comments (1)

Some comments may only be visible to logged-in visitors. Sign in to view all comments.