Why Incognito Mode Isn't Enough: The Case for True Client-Side Encryption
Why Incognito Mode Isn't Enough
Published on January 29, 2026 by Vizava.pro
A lot of people think that using a VPN or deleting their history means they are completely private. The truth is that you aren't really private if the tool has the encryption keys.
You open a window in Incognito mode. You connect to a VPN. You delete your browser history. You have followed all the advice in the privacy guides. But when you type that private document into Google Docs, upload files to Dropbox, or send a message through Slack, you are sending your data to servers that you don't control.
This is the main thing that people get wrong about digital privacy today. Privacy tools keep your connection safe. They don't keep the services from getting to your data. The encryption that keeps your data safe while it's in transit is not the same as the encryption that keeps your data safe when it's not being used.

The Privacy Myth

Incognito mode only does three things: it stops your browser from saving your history, cookies, and form data on your computer. That's all. Your ISP can still see what you're doing. Your boss can still see what you're doing. Websites you visit still keep track of your IP address. And most importantly, the cloud services you use still keep and scan everything you upload.
The Issue with Google Docs:

When you type in Google Docs, your keystrokes go over HTTPS. That TLS encryption keeps the hacker in the coffee shop from sniffing Wi-Fi. But as soon as your words reach Google's servers, they are decrypted, indexed, analyzed, and saved. Google has the keys. They can read everything.

In this case, VPNs don't help much either. A VPN encrypts the connection between you and the VPN service. It keeps your ISP from seeing your traffic. But when your data leaves the VPN server and goes to Google, Dropbox, or Slack, it is no longer protected by those services. The VPN provider can also see your traffic unless you use extra encryption layers.

Encrypted in Transit

HTTPS is used by all real services these days. This is encryption while it's moving. The padlock icon in your browser means that the data that is being sent between your device and the server is encrypted with TLS. This stops attacks that happen in the middle. It keeps people on your local network from seeing your passwords.
But here's the most important difference: the server on the other end has the keys to decrypt the data. Your data travels safely, gets there safely, and the service provider decrypts it right away. They can read your plaintext. Their algorithms look through your content. Their workers might be able to get to it. Their team that handles subpoenas will give it to the police if they ask for it.
Type of encryption: TLS / HTTPS
Who Has the Keys: The Service Provider
Protection Level only for transit.
Encryption in transit keeps network eavesdroppers from getting your information. It doesn't protect against the service itself. It doesn't keep the provider's data safe from breaches. It doesn't keep the government from asking for information. It doesn't stop the company's own AI training pipelines from taking your documents and using them to make language models.
Diagram showing encrypted in transit vs client-side encryption

Client-Side Encryption

To have real privacy, you need a different structure. With client-side encryption, your data is encrypted on your device before it ever leaves the network. The keys for encryption are made on the spot. You will always have them. The service provider only gets ciphertext, which looks like random noise without the key.
In this model, the service acts like a dumb pipe or a storage space. They can keep your encrypted blob safe. They can send it. But they can't read it. They can't put it in order. They can't use it to teach their AI. They can't give over useful data in response to a subpoena because they don't have the keys to decrypt it.

The Zero-Knowledge Architecture

The service provider has no idea what your data is about when they say "zero-knowledge." They know you saved a file. They know how big it is when it's encrypted. They know when you looked at it. But they can't see the payload itself because of math. This is the best example of a service that protects your privacy.
Encryption FlowConcept
On the Client Side: 1. User types plain text into the browser 2. The browser makes an AES-256 key 3. Data is encrypted on the computer (CPU/RAM) 4. The server only gets ciphertext Server-Side: 1. The server gets an encrypted blob 2. The server keeps the encrypted blob 3. The server CANNOT decrypt without the key 4. The key never leaves the client's device.
The trade-off is how well it works. The server can't do full-text search if it can't read your data. It can't make thumbnails of your pictures. It can't work together in real time with fine-grained permissions. There is a range between privacy and convenience. Client-side encryption puts privacy first.

The Vizava Approach

The idea behind Vizava was that you shouldn't have to trust us. Our architecture is based on compromise. If someone broke into our servers, if we were served with a subpoena, or if we turned evil overnight, your data would still be safe because we can't mathematically access it.
The Web Crypto API does all of the encryption work in the Vizava Suite right in your browser. Your device's memory makes the keys. Your CPU does the encryption. The only thing that affects our infrastructure is the ciphertext that comes out. We are not a custodian; we are a delivery service.
Client-side encryption flow diagram showing local encryption before network transmission

Three Modes of Operation

Artifacts: The Canvas API re-renders images. The client-side removes EXIF metadata. Local visual distortions are used. Your device never sends the original file in its raw form.
Bunker: Encrypting text and storing it temporarily. Before it is sent, the content is encrypted with AES-256. The server only keeps the ciphertext. Flash Burn mode deletes the ciphertext right after it is first decrypted. We can't get it back either.
Terminal: Works only when not connected to the internet. No need for a network connection. Encrypt files and text in a place that isn't connected to the internet. The logic for encryption is all in one place. You can unplug your internet cable and the Terminal will still work.

The Trust Test

If you don't trust anyone, the only way to know if a privacy tool works is to try it. The Offline Secret Encryption feature of Vizava is made just for this type of threat. You can open the Terminal, turn off your internet connection completely, encrypt your private files, and save the encrypted output to a USB drive. The math works the same way whether or not the network is there.
Check for Yourself:

Launch the developer tools in your browser. Keep an eye on the Network tab. To encrypt a message, use the Vizava Terminal. You won't see any network requests while the encryption is going on. Our claims don't have any proof. You can check the code and watch the packets.

This is the difference between privacy as a business strategy and privacy as a technology. Incognito mode is a way to market. Engineering is client-side encryption. When VPNs say they can protect your data from Google, they are just trying to sell you something. Engineering that really does client-side encryption.
When you fill out a web form with sensitive information, ask yourself, "Who has the keys?" If the answer is anyone other than you, you are not using a tool to protect your privacy. You are using a privacy theater tool that is also useful. You need to keep the keys yourself to have real privacy. That is true for encryption on the client side. That is how it is for Vizava.