Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Privacy

Tor Project's New Privacy-Focused Browser Doesn't Use the Tor Network (theverge.com) 24

The Tor Project, the organization behind the anonymous network and browser, is helping launch a privacy-focused browser that's made to connect to a VPN instead of a decentralized onion network. From a report: It's called the Mullvad browser, named after the Mullvad VPN company it's partnered with on the project, and it's available for Windows, Mac, or Linux. The Mullvad browser's main goal is to make it harder for advertisers and other companies to track you across the internet. It does this by working to reduce your browser's "fingerprint," a term that describes all the metadata that sites can collect to uniquely identify your device.
This discussion has been archived. No new comments can be posted.

Tor Project's New Privacy-Focused Browser Doesn't Use the Tor Network

Comments Filter:
  • Re: (Score:2, Interesting)

    Comment removed based on user account deletion
    • With this you are basically creating an illusion of safety similar to "incognito mode". This is significantly less safe than just using your OS or VPN provider's config.

      You misunderstand. The Mullvad browser is using the OS or VPN provider's config. It is merely a fingerprint resistant browser. However, for many people there's little point to running a fingerprint resistant browser without also using VPN, as their IP address makes for an excellent fingerprint all on its own. That's why they say you should use it in combination with a VPN. I'm sure they would like you to use their VPN, but any VPN will do.

      Perhaps one thing to be wary of is it uses DNS-over-HTTPS to Mullvad

      • Comment removed based on user account deletion
  • It’s useful for people who want to avoid casual monitoring by companies and governments, and it’s a nice big honeypot for criminals who are also stupid and ignorant. Top-tier law enforcement agencies and the good intelligence agencies penetrated Torr a long time ago.
    • by gweihir ( 88907 )

      There is actually not any indication of that. Quite the contrary. You also into flat-earth and anti-vaxx?

      • https://gizmodo.com/fbi-tor-ip... [gizmodo.com]

        And if there's a case like this in the public, you can be absolutely sure there are 100s of similar cases that never saw the light of day. US intelligence likes to go about it's business as quietly as possible, and they're pretty damn good at keeping things under wraps. If you believe Tor makes you immune to agencies like the FBI, I suspect that you're the one with flat-earth tendencies.
        • by gweihir ( 88907 )

          Oh, there are tons of cases where somebody hacked a server on the Tor network. It is really no mystery. People are slow to update security flaws, people use insecure configurations, people leak the real IP address of their server, people leak enough of the hardware details for it to be identified, and sometimes somebody may even use an expensive zero-day to compromise a Tor server by compromising, say, a web-shop or a forum software running on it. Same for attacks on clients: Whoever wants to de-anonymize c

    • > Top-tier law enforcement agencies and the good intelligence agencies penetrated Torr a long time ago.

      What does 'penetrated' mean in this sentence?

      • TOR entry and exit nodes can be run by anyone. Any group with control (even indirect) of enough of both can do correlation analysis to track any users unlucky enough to route through an entry and an exit under the same control.

        Also, there's no guarantee that an entry node hasn't been modified to ignore TOR's normal routing rules.

  • Looks like this is tor browser modified for VPN. The article refered to: https://mullvad.net/en/browser [mullvad.net] The download button refers to: https://mullvad.net/en/downloa... [mullvad.net] This refers to source at: https://github.com/mullvad/mul... [github.com] There is no source checked in the main branch. However, the page confirms firefox ESR as the version "Mullvad Browser 12.0.4 / mullvad-browser-102.9.0esr-12.0-2". However, it refers to a firefox mullvad browser extension: https://mullvad.net/en/downloa... [mullvad.net] The source link
  • >"It's called the Mullvad browser"

    Let me guess. It is yet another Chrom*?

    Wait, no? It isn't? You mean, there will actually be MORE than just two multiplatform browsers- Firefox and Chrom*?

    https://www.ghacks.net/2023/04... [ghacks.net]

    "Look, a new web browser that is not Chromium-based. Mullvad has just launched Mullvad Browser, a privacy-first web browser that is using the Firefox web browser as its base."

    Hmm. So, no, there are still only two browsers. But at least not another Chrom*.

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...