Most people set up a browser once and never think about it again. You download Chrome or stick with whatever came pre-installed, maybe add a few bookmarks, and get on with your life. The default settings feel fine because nothing obviously goes wrong. Pages load, searches work, videos play. What’s there to change?
Quite a lot, it turns out. Browser defaults are not designed with your privacy in mind. They’re designed for convenience, compatibility, and — depending on who makes the browser — data collection. The settings that would genuinely protect your privacy tend to be buried several menus deep, turned off by default, or described in language vague enough that most people skip past them without understanding what they’re actually agreeing to.
This isn’t a guide for people who want to become anonymous online or disappear from the internet entirely. That’s a different project. This is for the much larger group of people who would simply prefer that their browser wasn’t quietly working against them every time they open a tab.
The Default Browser Problem
Before getting into specific settings, it’s worth understanding why defaults matter so much. Research on user behavior consistently shows that the overwhelming majority of people never change default settings on software — any software. Developers know this, which means defaults are a policy decision as much as a technical one. When a browser ships with a setting turned on, it’s because the people who built it want that setting to be on for most users.
Chrome is the most widely used browser in the world and is made by Google, a company whose primary business is advertising. Firefox is made by Mozilla, a nonprofit with a different set of incentives. Safari is made by Apple, which has made privacy a marketing differentiator. Edge is made by Microsoft. Each of these browsers reflects the interests and priorities of the organization behind it, and those interests don’t always align with yours.
None of this means you need to abandon whatever browser you currently use. It means the defaults deserve scrutiny regardless of which one you’re on.
Third-Party Cookies: Turn Them Off Completely
Cookies are small files that websites store in your browser to remember things about you — your login status, your shopping cart, your preferences. First-party cookies, set by the website you’re actually visiting, are largely benign and often necessary for sites to function properly.
Third-party cookies are different. These are set by domains other than the one you’re visiting — advertising networks, analytics companies, social media platforms — and they follow you across the web, building a profile of your browsing behavior that can be used to target you with ads and sold to data brokers.
Chrome spent years promising to phase out third-party cookies and has repeatedly delayed doing so, leaving the default behavior in place while the industry negotiates over what comes next. Firefox blocks third-party cookies by default. Safari does too, through a system called Intelligent Tracking Prevention.
If you’re on Chrome, you can disable third-party cookies manually. Go to Settings, then Privacy and Security, then Cookies and Other Site Data, and select the option to block third-party cookies. It’s not the default, but it takes about thirty seconds to change and reduces the amount of cross-site tracking your browser participates in considerably.
DNS Over HTTPS: The Setting Most People Have Never Heard Of
Every time you type a web address into your browser, your device sends a request to a DNS server to translate that human-readable address into the numerical IP address of the actual server. By default, this request travels unencrypted, which means your ISP — and anyone else monitoring your network traffic — can see every domain you visit even if the actual content of your browsing is encrypted via HTTPS.
DNS over HTTPS solves this by encrypting those lookup requests. It’s a meaningful privacy improvement that most people have never enabled because it’s buried in browser settings and described in technical language that doesn’t convey how significant it is.
In Chrome, it’s under Settings, Privacy and Security, Security, and then Advanced. Look for “Use secure DNS” and make sure it’s turned on. In Firefox it’s under Settings, General, Network Settings, where you’ll find an option to enable DNS over HTTPS. In Edge, it’s under Privacy, Search and Services, Security, and then Use Secure DNS.
The difference this makes is real. Your ISP can still see that you’re using a VPN if you have one running, or that you’re connected to the internet generally, but they lose visibility into the specific domains you’re visiting. That’s a meaningful reduction in the data available to them.
Location, Camera, and Microphone Permissions
Browsers ask for permission before accessing your location, camera, and microphone — in theory. In practice, a lot of people click through permission prompts without thinking about them, and over time end up with a long list of websites that have been granted access to sensitive hardware they have no business touching.
Every major browser has a permissions management section where you can review and revoke these access grants. In Chrome it’s under Settings, Privacy and Security, Site Settings. In Firefox it’s under Settings, Privacy and Security, Permissions. In Safari it’s under Preferences, Websites.
Go through the list. You’ll likely find websites that have location access you don’t remember granting, or that have microphone permissions for reasons that aren’t obvious. Revoking these takes a few clicks and in most cases won’t break anything — sites that legitimately need location access will simply ask again the next time you visit.
The habit worth building is paying attention to permission prompts when they appear rather than reflexively clicking allow. A news website asking for your location to show local weather is a reasonable request. A random e-commerce site asking for microphone access is not.
Sync Settings and What Gets Sent to the Cloud
Most browsers offer a sync feature that keeps your bookmarks, history, passwords, and settings consistent across multiple devices. It’s genuinely convenient. It also means your browsing data is being stored on servers controlled by whoever makes your browser.
This isn’t necessarily a reason to turn sync off entirely — the convenience trade-off is real, and for many people it’s worth it. But it is a reason to think about what you’re syncing and whether you need to sync everything.
Chrome’s sync sends your browsing history to Google’s servers by default. If that bothers you, you can either turn off history sync specifically while keeping other sync features, turn off sync entirely, or use a Google account with a strong privacy configuration. Firefox Sync is end-to-end encrypted, which means Mozilla technically cannot read your synced data even though it passes through their servers — a meaningfully better arrangement. If privacy is a priority, checking whether your browser’s sync is end-to-end encrypted is worth the two minutes it takes.
Password sync deserves particular attention. Using a browser’s built-in password manager is better than reusing passwords, but dedicated password managers like Bitwarden or 1Password offer better security, more control, and more transparency about how your data is stored. If you’re storing sensitive passwords in your browser’s sync, consider whether a dedicated tool would serve you better.
Fingerprinting Protection: The Tracking You Can’t See
Browser fingerprinting was mentioned in an earlier post on this site in the context of VPN limitations, but it deserves more attention as a standalone issue because most people have no idea it’s happening.
When you visit a website, your browser exposes a surprising amount of information: your screen resolution, operating system, installed fonts, browser version, time zone, language settings, hardware specifications, and dozens of other data points. Individually, none of these are identifying. Combined, they form a fingerprint that can identify you with high accuracy across different browsing sessions, even if you clear your cookies, use incognito mode, or change your IP address with a VPN.
Firefox has built-in fingerprinting protection that can be enabled under Enhanced Tracking Protection settings — switch from Standard to Strict mode. Brave browser, which is worth considering as an alternative to Chrome for privacy-conscious users, has fingerprinting protection enabled by default and goes further than most browsers in the measures it takes.
Chrome has limited fingerprinting protection. If you’re on Chrome and fingerprinting concerns you, the Privacy Badger extension from the Electronic Frontier Foundation adds some protection, as does uBlock Origin in its advanced configuration mode. Neither is a complete solution, but both reduce the surface area meaningfully.
Incognito and Private Browsing: What It Actually Does
This one comes up constantly and is worth addressing directly because the misconception is so widespread. Incognito mode — or private browsing, or whatever your browser calls it — does not make you anonymous online and does not hide your browsing from your ISP, employer, or the websites you visit.
What it does is prevent your browser from saving your browsing history, cookies, and form data locally on your device. That’s useful if you share a computer and don’t want your browsing visible to other users of that device. It’s not useful as a privacy tool in any broader sense.
Google settled a lawsuit in 2024 related to Chrome tracking users in incognito mode, which illustrated how far the gap between user expectations and technical reality had grown. If you’re using incognito mode because you believe it’s protecting your privacy from advertisers or your ISP, it isn’t. Use it for what it’s actually good at, and use other tools for the things it can’t do.
Small Changes, Real Differences
None of the settings described here require technical expertise or significant time investment. Most of them can be configured in under ten minutes across any major browser. The cumulative effect — third-party cookies blocked, DNS encrypted, permissions reviewed, fingerprinting resistance improved — is a meaningfully more private browsing experience than the defaults provide.
Privacy online isn’t binary. You don’t have to choose between doing nothing and building an elaborate technical fortress. There’s a lot of useful ground between those two extremes, and browser settings are some of the most accessible improvements available to anyone willing to spend a few minutes on them.
→ Related: Does a VPN Really Keep You Anonymous Online? The Truth in 2026
→ Also worth reading: How Data Brokers Are Selling Your Personal Info Right Now (And How to Stop Them)
If there’s a specific browser setting you’ve been confused about or a privacy question related to your browser, drop it in the comments. We’ll give you a straight answer without the technical jargon.