In spite of the fact that web browsers come with private browsing modes. Where they briefly end recording the users browsing history. It remains that any information got to amid such private browsing sessions can in any case end up in a PC’s memory. The cyber attacker could in any case figure out how to recover it. To conquer this, another security framework technology proposed.
New procedure for Private browsing?
The new framework, from the Massachusetts Institute of Technology, makes utilization of JavaScript decoding calculations. Then inserted in site pages and code jumbling with a specific end goal. To fix security openings left open by web programs’ private- browsing functions. The new framework called Veil.
Veil planned to make private browsing more private. Here Veil gives added insurances to any individual who utilizes a common PC, for example, in an office or lodging. The framework utilized as a part of conjunction with existing private-browsing frameworks. Either close by other obscurity systems like Tor (a technique intended to secure the personality of web clients living in nations with relatively less Internet opportunity utilize).
As per lead analyst Frank Wang, the engineers started by offering intelligent conversation starters: “We asked, ‘What is the major issue?’ And the crucial issue is that [the browser] gathers this data, and afterward the program does its best push to settle it. Be that as it may, toward the day’s end. Regardless of what the program’s best exertion is, despite everything it gathers it. We should not gather that data in any case.”
Veil browser Methodology

The framework veil guarantees that any information the program loads into its memory remains encoded until the point when it is really shown on-screen. A user rather than entering in a URL into the browser address bar. User goes to the Veil site and enters the URL address here. At that point an extraordinary server (a blinding server) transmits a version of the asked for page that has been converted into the Veil format.
The new framework shown at the Network and Distributed Systems Security Symposium, which occurred in February 2018 in San Diego. The meeting intended to encourage data trade among analysts and specialists of system and appropriated framework security.