The Mullvad Browser is a privacy-focused web browser developed in collaboration with Mullvad VPN and the Tor Project. It aims to eliminate data collection and provide user-centric browsing services, ensuring online activity remains private and secure. The browser has the same fingerprinting protection as the Tor Browser, but connects to the internet without Tor Network or VPN instead. The Mullvad Browser provides anti-fingerprinting protections.

The idea is to provide one more alternative – beside the Tor Network – to browse the internet with more privacy. To get as many people as possible to fight the big data gathering of today. To free the internet from mass surveillance.

Here: >> mullvad browser official <<

  • jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    1
    ·
    1 year ago

    And that’s all totally fine. Mullvad is definitely going for the leave no trace local browsing people.

    If you need to browser with persistence, you have the options that you outlined.

    For people who want a daily driver with no persistence it’s perfect

    • Pantherina@feddit.de
      link
      fedilink
      arrow-up
      1
      ·
      1 year ago

      No it makes no sense… they could simply preset the settings:

      • delete cache
      • delete cookies
      • delelte downloads
      • delete session

      And have the same thing, without the private browsing annoyance

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        1
        ·
        1 year ago

        But then the data would be written to disk, and then it would be deleted from disk, which would leave a trace.

        I get this isn’t your threat model. But for the people whose threat model it is then that’s unacceptable.

        Deleting data on disk does not actually remove the data. It’s still persists especially on SSDs.

        • Pantherina@feddit.de
          link
          fedilink
          arrow-up
          0
          ·
          1 year ago

          In private browsing it would not be saved to disk? This is a real difference then.

          Its not about “my threat model”, its about if private browsing actually makes sense, or if it just restricts the browsers capabilities.

          So in PB everything is kept in RAM? And this cant be reproduced with a setting?