The Mullvad Browser is a privacy-focused web browser developed in collaboration with Mullvad VPN and the Tor Project. It aims to eliminate data collection and provide user-centric browsing services, ensuring online activity remains private and secure. The browser has the same fingerprinting protection as the Tor Browser, but connects to the internet without Tor Network or VPN instead. The Mullvad Browser provides anti-fingerprinting protections.

The idea is to provide one more alternative – beside the Tor Network – to browse the internet with more privacy. To get as many people as possible to fight the big data gathering of today. To free the internet from mass surveillance.

Here: >> mullvad browser official <<

  • Pantherina@feddit.de
    link
    fedilink
    arrow-up
    1
    ·
    1 year ago

    No it makes no sense… they could simply preset the settings:

    • delete cache
    • delete cookies
    • delelte downloads
    • delete session

    And have the same thing, without the private browsing annoyance

    • jet@hackertalks.com
      link
      fedilink
      English
      arrow-up
      1
      ·
      1 year ago

      But then the data would be written to disk, and then it would be deleted from disk, which would leave a trace.

      I get this isn’t your threat model. But for the people whose threat model it is then that’s unacceptable.

      Deleting data on disk does not actually remove the data. It’s still persists especially on SSDs.

      • Pantherina@feddit.de
        link
        fedilink
        arrow-up
        0
        ·
        1 year ago

        In private browsing it would not be saved to disk? This is a real difference then.

        Its not about “my threat model”, its about if private browsing actually makes sense, or if it just restricts the browsers capabilities.

        So in PB everything is kept in RAM? And this cant be reproduced with a setting?