Did you notice Incognito mode’s improved privacy?

If you’ve ever used Incognito mode in Chrome, you probably already know what it’s for: a quick way to browse without saving your history, cookies, or autofill data.

But here’s the thing — it wasn’t quite as private as most people assumed.

Until recently, if you copied something — a password, a link, a message — from an Incognito window, Windows could still keep that data in your clipboard history. And if you had clipboard syncing turned on, it might even show up on another device.

Not exactly the level of privacy most people are expecting.

Fortunately, Microsoft just patched that.

Now, when you’re using Incognito mode in Chrome (or InPrivate in Edge), Windows will no longer save copied content to your clipboard history or sync it across devices. So if you’re copying anything sensitive — login info, client notes, private messages — it’s no longer hanging around afterward.

This change, while quiet, is a big win for anyone who uses private browsing for real reasons, like:

  • Checking travel prices without triggering tracking-based price hikes
  • Logging into multiple accounts without switching back and forth
  • Browsing on a shared or public device without leaving a trail

Another solid privacy improvement: media previews are now hidden when you’re in Incognito. So if you’re watching a video (business-related or otherwise), your lock screen won’t broadcast the title and thumbnail to the room. Instead, it just says “A site is playing media.” Simple and discreet.

That said, it’s important to keep expectations in check: Incognito mode helps with local privacy — meaning your browser won’t save your activity on that device. But it doesn’t hide what you’re doing from your internet provider, employer, or the sites you’re visiting.

Still, if you’re relying on Incognito to keep certain tasks private, it’s now doing a better job than it used to — especially behind the scenes.

And if privacy is a serious concern for your business — whether it’s protecting internal documents, client communications, or credentials — this is just the tip of the iceberg. Let’s talk about how to get real protections in place.