1.  Critical Safety Notice

This guide is intended for individuals seeking to strengthen their online privacy. Before modifying any browser settings, carefully read this section if you believe your device may be monitored by another person.

⚠  Warning: Device Monitoring RisksIf another person routinely monitors your device or accounts, altering browser privacy settings may alert them to your actions. They may reverse your changes, escalate controlling behaviour, or use modifications as a pretext for conflict. Certain changes may also inadvertently destroy evidence relevant to legal proceedings. There is no universally safe approach — always prioritise personal safety over technical privacy measures.

Recommended precautions for at-risk individuals:

  • Use a secure, independent device — such as a public library computer, a trusted friend’s phone, or a work device — that the monitoring individual cannot access and has never previously accessed.
  • Access browser accounts (e.g., a Google Account linked to Chrome, or a Microsoft Account linked to Edge) from that secure device. Changes synced through these accounts will propagate across all signed-in sessions.
  • Sign out of all browser accounts immediately after making changes on a shared or borrowed device.
  • Contact a national helpline or domestic violence advocacy organisation for personalised safety planning before taking technical action.
ℹ  Regarding StalkerwareNo browser-level privacy setting provides protection against stalkerware — commercially available spyware installed directly on a device. Stalkerware operates at the operating system level and can record keystrokes, capture screens, and transmit data regardless of browser configuration. For advice tailored to survivors, consult Safety Net’s Survivor Resources Toolkit (nnedv.org/resources-library/safety-net).

2.  Scope of This Guide

This guide covers privacy configuration for the browsers most widely used in the United States, across both desktop and mobile platforms.

Desktop Platforms (Windows and macOS)

  • Google Chrome
  • Mozilla Firefox
  • Microsoft Edge
  • Apple Safari (macOS only)
  • Maxthon

Mobile Platforms (Android and iOS)

  • Google Chrome
  • Mozilla Firefox (Android)
  • Samsung Internet (Android)
  • Apple Safari (iOS)
  • Android WebView

Note: macOS and iOS implement certain private browsing protections differently from their Windows and Android counterparts. Where behaviour diverges meaningfully, platform-specific guidance is noted inline.

3.  Core Browser Privacy Technologies

Modern browsers expose several distinct mechanisms for privacy management. Understanding what each tool does — and what it does not do — is essential before configuring any settings.

3.1  Private Browsing and Incognito Mode

Private browsing (referred to as Incognito Mode in Chrome, Private Window in Firefox and Safari, and InPrivate in Edge) launches an isolated browser session that discards locally stored data upon closure.

What private browsing does:

  • Prevents the browser from saving browsing history, search queries, and session cookies to the local device.
  • Disables most browser extensions by default, reducing the risk of third-party tracking within the session.
  • Deletes session cookies and site data automatically when the private window is closed.
  • Keeps private session activity isolated from activity in standard browser windows.
⚠  What Private Browsing Does Not DoPrivate browsing does not anonymise your network traffic. Your Internet Service Provider (ISP), network administrator, employer, school, or router owner can still observe which websites you visit. Websites you log into can still identify and track you. Downloaded files and bookmarks created during a private session are retained on the device.

Enabling Private/Incognito Mode by Browser

BrowserMode NameKeyboard Shortcut
Google ChromeIncognito ModeCtrl+Shift+N (Windows) / Cmd+Shift+N (macOS)
Mozilla FirefoxPrivate WindowCtrl+Shift+P (Windows) / Cmd+Shift+P (macOS)
Microsoft EdgeInPrivate WindowCtrl+Shift+N (Windows) / Cmd+Shift+N (macOS)
Apple SafariPrivate WindowCmd+Shift+N (macOS) / Tap tab icon (iOS)
Samsung InternetSecret ModeTap tab icon > Enable Secret Mode
MaxthonIncognito ModeMenu > New Incognito Window

3.2  Virtual Private Networks (VPNs)

A Virtual Private Network (VPN) encrypts all network traffic between your device and a VPN server operated by the VPN provider, then forwards that traffic to its final destination on your behalf. Unlike incognito mode, a VPN does affect traffic visibility at the network level.

What a VPN does:

  • Encrypts outbound traffic between your device and the VPN server, preventing your ISP, router owner, or local network observer from reading the content of your connections.
  • Masks your real IP address from the websites you visit, which instead see the IP address of the VPN server.
  • Allows you to appear to be browsing from a different geographic location, which can bypass region-based content restrictions.
  • Provides meaningful protection on untrusted networks, such as public Wi-Fi at coffee shops, airports, or hotels.
⚠  What a VPN Does Not DoA VPN does not make you anonymous. The VPN provider itself can see your traffic and logs may be retained depending on the provider’s policy. A VPN does not prevent tracking via browser cookies, fingerprinting, or account-based identification. It does not protect against stalkerware or monitoring software installed on the device itself.

Selection criteria for a trustworthy VPN:

  • Verified no-logs policy, ideally confirmed by independent third-party audit.
  • Jurisdiction in a country outside major intelligence-sharing alliances (e.g., outside the Five Eyes, Nine Eyes, or Fourteen Eyes agreements).
  • Open-source client applications, enabling community code review.
  • Support for modern, audited protocols such as WireGuard or OpenVPN.
  • Kill switch functionality, which blocks all internet traffic if the VPN connection drops unexpectedly.

Reputable VPN providers include Mullvad, ProtonVPN, and IVPN, all of which have undergone independent security audits and publish transparent privacy policies. Free VPN services should be avoided, as they frequently monetise user data.

ℹ  Browser-Based vs. System-Level VPNsSome browsers (notably Opera and Brave) offer built-in “VPN” or proxy features. These apply only to traffic routed through that specific browser and are generally operated as proxies rather than true encrypted VPN tunnels. For comprehensive network-level protection, a dedicated system-wide VPN application is recommended.

3.3  Do Not Track (DNT)

Do Not Track (DNT) is a browser-level HTTP header that signals to websites that the user prefers not to be tracked across sites for behavioural advertising or analytics purposes.

How DNT works:

  • When enabled, the browser appends a DNT: 1 header to every outbound HTTP request.
  • Websites that have adopted the DNT standard are expected to honour this preference by disabling cross-site tracking for that user.
⚠  Significant LimitationCompliance with Do Not Track is entirely voluntary. There is no legal requirement for websites to honour the signal in most jurisdictions. Major advertising networks and many large platforms do not respect DNT. The W3C working group that maintained the DNT specification closed in 2019 due to lack of industry adoption. DNT should therefore be treated as a supplementary measure rather than a reliable privacy control.

Enabling Do Not Track by browser:

  • Chrome: Settings > Privacy and security > Cookies and other site data > Send a Do Not Track request
  • Firefox: Settings > Privacy & Security > Send websites a Do Not Track signal
  • Edge: Settings > Privacy, search, and services > Send Do Not Track requests
  • Safari: Preferences > Privacy > Website tracking (Prevent cross-site tracking is more effective)
  • Maxthon: Settings > Privacy > Enable Do Not Track
ℹ  More Effective Alternatives to DNTFor more robust tracking prevention, consider dedicated browser extensions such as uBlock Origin (content and tracker blocking), Privacy Badger (heuristic tracker blocking), or ClearURLs (removal of tracking parameters from URLs). Firefox’s Enhanced Tracking Protection (set to Strict mode) and Safari’s Intelligent Tracking Prevention offer built-in equivalents that do not rely on website cooperation.

3.4  Browser History and Cookies

Browsing History

Browsers maintain a local record of every URL visited. This log can be accessed by anyone with physical or remote access to the device. Regular history management reduces the risk of exposing sensitive browsing activity.

ℹ  Note on Sudden History DeletionIf clearing browsing history is not a routine practice on your device, an abusive individual who monitors your activity may become suspicious of its sudden absence. In such circumstances, using private browsing mode proactively — so that no history is generated — may be preferable to deleting history after the fact.

Cookies

Cookies are small data files that websites store in your browser to retain state information such as login sessions, preferences, and shopping cart contents. Third-party cookies, in particular, are set by domains other than the site you are visiting and are the primary mechanism by which advertising networks track users across multiple websites.

Deleting cookies:

  • Terminates active login sessions on affected websites, requiring re-authentication.
  • Resets site preferences and personalisation settings.
  • Disrupts cross-site tracking tied to existing cookie identifiers.

Most major browsers now block third-party cookies by default or offer enhanced tracking protection modes. Firefox and Safari block third-party cookies by default; Chrome began a phased deprecation of third-party cookies but has since modified its timeline. Check your browser’s current default settings under Privacy or Cookies settings.

4.  Maxthon Browser: Step-by-Step Privacy Configuration

The following procedures apply to the current stable release of Maxthon (version 7.x). Ensure the browser is updated before proceeding: Menu > Help > Check for Updates.

4.1  Clearing Browsing History and Cookies

  1. Open Maxthon and click the Menu icon (☰) in the upper-right corner of the window.
  2. Select Settings from the dropdown menu.
  3. In the left sidebar, navigate to Privacy.
  4. Click Clear Browsing Data.
  5. In the dialogue that appears, check the boxes for Browsing History and Cookies and Site Data.
  6. Select a time range from the dropdown: Last hour, Last 24 hours, Last 7 days, Last 4 weeks, or All time.
  7. Click Clear Data and confirm any secondary prompts.
  8. Close the Settings panel. Optionally restart Maxthon to ensure all in-memory session data is flushed.

4.2  Enabling Incognito Mode

  1. Click the Menu icon (☰) in the upper-right corner.
  2. Select New Incognito Window. A new browser window will open with a distinct visual indicator (typically a darker theme or incognito icon) confirming the mode is active.
  3. Conduct your browsing within this window. No history, cookies, or form data will be saved to the device when the window is closed.
  4. When finished, close the incognito window entirely. Minimising the window does not end the private session.
ℹ  ReminderIncognito mode in Maxthon does not conceal activity from your ISP, network administrator, or any monitoring software installed on the device. It only prevents local storage of session data.

4.3  Enabling Do Not Track

  1. Click the Menu icon (☰) and select Settings.
  2. Navigate to the Privacy section in the left sidebar.
  3. Locate the Do Not Track toggle and set it to enabled (on).
  4. Click Save or Apply if prompted.
  5. To verify, visit a DNT testing tool such as the EFF’s Cover Your Tracks (coveryourtracks.eff.org), which reports whether the DNT signal is being transmitted and whether tracking protection is effective.

4.4  Additional Privacy Settings (Advanced)

  1. Click the Menu icon (☰) and select Settings.
  2. Scroll to the bottom of the Settings panel and click Show Advanced Settings.
  3. Review and configure the following options according to your threat model:
  • Phishing and malware protection: Keep enabled. This feature cross-references visited URLs against known threat databases.
  • Prediction service (URL and search autocomplete): Disable if you do not want visited URLs or search terms transmitted to Maxthon’s servers for autocomplete suggestions.
  • Save passwords: Disable if another person may access your browser profile. If this is not a concern, the password manager can assist in generating and storing unique, strong credentials. Third-party password managers (e.g., Bitwarden, 1Password) provide greater portability and audited security.
  • Autofill for web forms: Disable if another person may access your device, as saved addresses and payment details are accessible without authentication in most browser autofill implementations.

5.  Privacy Tool Summary

The following table summarises the capabilities and limitations of each privacy tool covered in this guide.

ToolPrevents Local StorageHides Traffic from ISPBlocks Cross-Site Tracking
Incognito / Private ModeYesNoPartial (session only)
VPNNoYes (from ISP)No
Do Not Track (DNT)NoNoVoluntary only
Clear History & CookiesYes (retroactive)NoPartial
Tracker-blocking extensionsNoNoYes (effective)
Browser Enhanced Tracking ProtectionNoNoYes (built-in)

6.  Ongoing Maintenance Recommendations

Privacy settings are not a one-time configuration. The following practices are recommended on a recurring basis:

  • Keep all browsers updated to the latest stable release. Security patches are released frequently; outdated browsers may contain exploitable vulnerabilities.
  • Periodically review installed browser extensions. Remove any extensions that are no longer actively maintained or whose permissions are broader than necessary.
  • Review saved passwords and autofill data semi-annually, removing credentials for accounts that are no longer in use.
  • Audit privacy settings after each major browser update, as new releases may introduce changed defaults or new privacy-relevant features.
  • For Google Account users: use Google’s Privacy Checkup (myaccount.google.com/privacycheckup) to review data collection and sharing settings across all Google services.
  • For Apple users: review Privacy settings in System Settings (macOS) or Settings > Privacy & Security (iOS) to manage per-application data access permissions.

End of Document