Privacy Browsing
Recommended browsers
GrapheneOS: Vanadium
Stock Android: Google Chrome
iOS: Safari
Windows 11: Microsoft Edge (the default and only browser with defense-in-depth)
macOS: Chrome or Safari
Secureblue: Trivalent
You should use the default browsers most of the time because installing additional browsers adds more parties to trust.
Avoid non-Chromium browsers and browsers which support Manifest V2.
Additional tips
Do not install any extensions. Instead of insecure, privacy-compromising adblockers (uBlock Origin), use the reader mode.
GrapheneOS: Vanadium
Stock Android: Google Chrome
iOS: Safari
Windows 11: Microsoft Edge (the default and only browser with defense-in-depth)
macOS: Chrome or Safari
Secureblue: Trivalent
You should use the default browsers most of the time because installing additional browsers adds more parties to trust.
Avoid non-Chromium browsers and browsers which support Manifest V2.
Additional tips
Do not install any extensions. Instead of insecure, privacy-compromising adblockers (uBlock Origin), use the reader mode.
[FR]
[DATACENTER]
Glowie alert
JEW! JEW! JEW! JEW! JEW! JEW! JEW! JEW!
JEW ALERT!
[FR]
[DATACENTER]
microcock edging
>2 posts in this thread
>FUCK OFF FED
>the aforementioned fed: Anonymous 2 posts in this thread
false flag operation
SUCK MICROCOCK
[DE]
[DATACENTER]
micro di pi leaks its erection in high hd
[DE]
[TOR]
Follow this guide written by an actual expert.
https://github.com/RKNF404/chromium-hardening-guide
Reasons to NEVER use extensions (not even "trusted" permission-less Manifest V3 ones like uBlock):
https://support.google.com/chrome/a/answer/9897812
https://mattfrisbie.substack.com/p/spy-chrome-extension
https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css
https://www.imperva.com/blog/the-ad-blocker-that-injects-ads/
https://palant.info/2020/02/25/mcafee-webadvisor-from-xss-in-a-sandboxed-browser-extension-to-administrator-privileges/
https://en.wikipedia.org/wiki/Device_fingerprint#Browser_extensions
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rilide-a-new-malicious-browser-extension-for-stealing-cryptocurrencies/
https://arxiv.org/pdf/2308.16321.pdf
https://www.bleepingcomputer.com/news/security/malicious-browser-extensions-are-the-next-frontier-for-identity-attacks/
https://palant.info/2025/01/13/chrome-web-store-is-a-mess/
https://github.com/RKNF404/chromium-hardening-guide
Reasons to NEVER use extensions (not even "trusted" permission-less Manifest V3 ones like uBlock):
https://support.google.com/chrome/a/answer/9897812
https://mattfrisbie.substack.com/p/spy-chrome-extension
https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css
https://www.imperva.com/blog/the-ad-blocker-that-injects-ads/
https://palant.info/2020/02/25/mcafee-webadvisor-from-xss-in-a-sandboxed-browser-extension-to-administrator-privileges/
https://en.wikipedia.org/wiki/Device_fingerprint#Browser_extensions
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rilide-a-new-malicious-browser-extension-for-stealing-cryptocurrencies/
https://arxiv.org/pdf/2308.16321.pdf
https://www.bleepingcomputer.com/news/security/malicious-browser-extensions-are-the-next-frontier-for-identity-attacks/
https://palant.info/2025/01/13/chrome-web-store-is-a-mess/
[MY]
[DATACENTER]
>https://github.com/RKNF404/chromium-hardening-guide
>https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css
absolute gems, thanks for sharing these
>https://github.com/RKNF404/chromium-hardening-guide#popular-options
>Fedora disabled CFI again
The top goys at
https://bugzilla.redhat.com/show_bug.cgi?id=2425338
https://src.fedoraproject.org/rpms/chromium/blob/rawhide/f/chromium.spec
Bonus:
Most distros compile firefox with many hardening options disabled or misconfigured (like CFG/CFI and LTO), check them
Bonus 2: Tor browser (from the torbrowser-launcher) doesn't use FORTIFY_SOURCE, stack clash protection, stack protector, uses an outdated rust version. Avoid tier.
TL;DR: "Privacy" (and secure) browsing is a spook.
Replies:
>>4529
[NL]
> actual expert
what makes that person more actually an expert?
[SE]
Chrome isn't a monopoly. It's a standard.
Avoiding it is like using gopher to avoid the http "monopoly" or plaintext to avoid the html "monopoly".
For security reasons, you must avoid using Linux at all costs. People only use it because ideologies, to support the underdog, or Microsoft and Apple are the evil boogeymen.
Avoiding it is like using gopher to avoid the http "monopoly" or plaintext to avoid the html "monopoly".
For security reasons, you must avoid using Linux at all costs. People only use it because ideologies, to support the underdog, or Microsoft and Apple are the evil boogeymen.
[US-VA]
[DATACENTER]
For PRIVACY I would say mullvad browser is probably the sanest anti-detect browser that is FOSS right now (it's pretty much tor browser bundle, literally it is tor browser bundle but it shoves shit up mullvad (or your own choice of proxy)
Now if you're going to roll your own, which you probably should, I would say run with https://github.com/enetx/surf
this is gonna get you past 99% of the cancer of the internet if you learn to use this fucking library. heavily depends on you learning it, though. this little nigger can spoof JA4/JA3 and spoof chrome pretty good, but you might need also some other libraries in whatever it is you are building a client for
ultimately your vision should be to replace websites with software clients written for your desktop and to remove the web browser from your workflow imho
to this end, maybe RSS can also be useful.
now, i will also say to the point of using surf there's probably one group of retarded faggots who i can forward you to, and they might just make you some money too
BlackHatWorld
these retards know everything there is to know about scraping
Now if you're going to roll your own, which you probably should, I would say run with https://github.com/enetx/surf
this is gonna get you past 99% of the cancer of the internet if you learn to use this fucking library. heavily depends on you learning it, though. this little nigger can spoof JA4/JA3 and spoof chrome pretty good, but you might need also some other libraries in whatever it is you are building a client for
ultimately your vision should be to replace websites with software clients written for your desktop and to remove the web browser from your workflow imho
to this end, maybe RSS can also be useful.
now, i will also say to the point of using surf there's probably one group of retarded faggots who i can forward you to, and they might just make you some money too
BlackHatWorld
these retards know everything there is to know about scraping
Replies:
>>4593
[US-NY]
[TOR]
Another /g/ verbatim repost
> For PRIVACY I would say mullvad browser is probably the sanest anti-detect browser that is FOSS right now
https://desuarchive.org/g/search/text/For%20PRIVACY%20I%20would%20say%20mullvad%20browser%20is%20probably%20the%20sanest%20anti-detect%20browser%20that%20is%20FOSS%20right%20now%20/
LMAO
Replies:
>>4595
[DE]
Fuck you and fuck /g/. The original posters are free to post here instead.
Replies:
>>4596
[PL]
[TOR]
>reposting from /g/ is fine but FUCK YOU if you notice it!
lol
[PL]
[TOR]
>What browser+plugin combination do you all use for safely browsing the web?
You have to decide whether you want functionality or safety. Modern web browsers are so insanely complex that there always will be a plethora of vulnerabilities. Even Tor Browser is too complex for its own good, and is only "private" or "anonymous", if you even grant it that, but certainly not "secure", because you cannot expect such a huge behemoth of a software to not have a million exploits for them.
If you want safety while browsing (disregarding functionality, privacy, and anonymity), you should use Links in graphical mode. Or dillo, Netsurf, lynx, or w3m, or just curl, but even curl is too complex, maybe don't use the web if you want to be secure...since I'm 100% sure Links in graphical mode is not what you are looking for, hence just accept that the modern web is inherently insecure, and every "security addon" and about:config change you do is just trying to do the impossible, which is to make millions of lines of code, which every web browser is this days, "more secure".
You have to decide whether you want functionality or safety. Modern web browsers are so insanely complex that there always will be a plethora of vulnerabilities. Even Tor Browser is too complex for its own good, and is only "private" or "anonymous", if you even grant it that, but certainly not "secure", because you cannot expect such a huge behemoth of a software to not have a million exploits for them.
If you want safety while browsing (disregarding functionality, privacy, and anonymity), you should use Links in graphical mode. Or dillo, Netsurf, lynx, or w3m, or just curl, but even curl is too complex, maybe don't use the web if you want to be secure...since I'm 100% sure Links in graphical mode is not what you are looking for, hence just accept that the modern web is inherently insecure, and every "security addon" and about:config change you do is just trying to do the impossible, which is to make millions of lines of code, which every web browser is this days, "more secure".
[DE]
A lot of psy-opping and cargo culting in this thread.
I know that I can't be 100% private/secure/anonymous on the internet or on the web, but my comfy setup is Librewolf + a bunch of add-ons (including uMatrix with JS disabled by default) + Tor routing. I also have another Librewolf profile running that has less add-ons and is not routed through Tor (goes through a VPN) for websites that block Tor. Also using Linux, of course.
Some people fearmonger about fingerprinting and that using the Tor network is of little use if you're not using Tor Browser with no add-ons, but I don't like that idea because it sounds like "you vill ovn nothing and you vill be happy". I'm using the opposite strategy which I've heard from DigDeeper where I try to make my fingerprint unique but I rapidly switch it on purpose (I use an add-on which randomizes my user agent every few minutes), instead of keeping a generic one for as long as possible (the good goy Tor Browser way).
But still, I don't feel entirely confident, and maybe I'm still less anonymous than using vanilla Goy Browser. But at the same time, I like my setup, and my goal is not having the perfect schizo setup because as I said earlier you can't truly achieve that. I guess for general corporate/government spying my setup is fine enough, and I can live knowing that the Mossad or some Russian superhacker could get me if they really wanted to, since that's an unlikely scenario.
However, I'd like to look into Palemoon again (partly due to contrarianism). I tried it in the past and then returned to Librewolf, but maybe the next time I'll enjoy it more. Can any Palemoon user tell me why I should use Palemoon?
I know that I can't be 100% private/secure/anonymous on the internet or on the web, but my comfy setup is Librewolf + a bunch of add-ons (including uMatrix with JS disabled by default) + Tor routing. I also have another Librewolf profile running that has less add-ons and is not routed through Tor (goes through a VPN) for websites that block Tor. Also using Linux, of course.
Some people fearmonger about fingerprinting and that using the Tor network is of little use if you're not using Tor Browser with no add-ons, but I don't like that idea because it sounds like "you vill ovn nothing and you vill be happy". I'm using the opposite strategy which I've heard from DigDeeper where I try to make my fingerprint unique but I rapidly switch it on purpose (I use an add-on which randomizes my user agent every few minutes), instead of keeping a generic one for as long as possible (the good goy Tor Browser way).
But still, I don't feel entirely confident, and maybe I'm still less anonymous than using vanilla Goy Browser. But at the same time, I like my setup, and my goal is not having the perfect schizo setup because as I said earlier you can't truly achieve that. I guess for general corporate/government spying my setup is fine enough, and I can live knowing that the Mossad or some Russian superhacker could get me if they really wanted to, since that's an unlikely scenario.
However, I'd like to look into Palemoon again (partly due to contrarianism). I tried it in the past and then returned to Librewolf, but maybe the next time I'll enjoy it more. Can any Palemoon user tell me why I should use Palemoon?
Replies:
>>10567
[DE]
[TOR]
>Whenever I have to inevitably use YouTube, I prefer to use the Ikatube project, since it lets me watch videos without ads and without having to deal with YTs horrible and slow interface :annoyed:
>https://chino-chan.gitlab.io/programs.html
Where's the source code? Why would a random guy make a niche software and make it proprietary? Malware much?
[DE]
[TOR]
>What browser+plugin combination do you all use for safely browsing the web?
No matter if you disabled jewscript and have 17 poxies behind the Browser, There's no secure way to browse the web, specially if you're using trannyfox or chromium. want security? do it offline.
But when I want to browse the web, I use Hardened Firefox+ublock on Arch Linux inside Virtualbox running on FreeBSD.
No matter if you disabled jewscript and have 17 poxies behind the Browser, There's no secure way to browse the web, specially if you're using trannyfox or chromium. want security? do it offline.
But when I want to browse the web, I use Hardened Firefox+ublock on Arch Linux inside Virtualbox running on FreeBSD.
[SE]
Don't forget about the TCP/IP and HTTP/2 fingerprint
[SE]