Privacy Browsing

45 replies
0 attachments
Started >30d ago

Recommended browsers

GrapheneOS: Vanadium
Stock Android: Google Chrome
iOS: Safari
Windows 11: Microsoft Edge (the default and only browser with defense-in-depth)
macOS: Chrome or Safari
Secureblue: Trivalent

You should use the default browsers most of the time because installing additional browsers adds more parties to trust.

Avoid non-Chromium browsers and browsers which support Manifest V2.

Additional tips

Do not install any extensions. Instead of insecure, privacy-compromising adblockers (uBlock Origin), use the reader mode.
Replies: >>4376 >>4377 >>4379

[FR] [DATACENTER]

>>4375
Glowie alert


>>4375
JEW! JEW! JEW! JEW! JEW! JEW! JEW! JEW!
JEW ALERT!

[FR] [DATACENTER]

FUCK OFF FED
Replies: >>4380

[FR] [DATACENTER]

>>4375
microcock edging


>>4378
>2 posts in this thread
>FUCK OFF FED
>the aforementioned fed: Anonymous 2 posts in this thread
false flag operation


SUCK MICROCOCK

[DE] [DATACENTER]

micro di pi leaks its erection in high hd

[DE] [TOR]

Follow this guide written by an actual expert.

https://github.com/RKNF404/chromium-hardening-guide

Reasons to NEVER use extensions (not even "trusted" permission-less Manifest V3 ones like uBlock):
https://support.google.com/chrome/a/answer/9897812
https://mattfrisbie.substack.com/p/spy-chrome-extension
https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css
https://www.imperva.com/blog/the-ad-blocker-that-injects-ads/
https://palant.info/2020/02/25/mcafee-webadvisor-from-xss-in-a-sandboxed-browser-extension-to-administrator-privileges/
https://en.wikipedia.org/wiki/Device_fingerprint#Browser_extensions
https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/rilide-a-new-malicious-browser-extension-for-stealing-cryptocurrencies/
https://arxiv.org/pdf/2308.16321.pdf
https://www.bleepingcomputer.com/news/security/malicious-browser-extensions-are-the-next-frontier-for-identity-attacks/
https://palant.info/2025/01/13/chrome-web-store-is-a-mess/
Replies: >>4501 >>4502

[MY] [DATACENTER]

>>4498
>https://github.com/RKNF404/chromium-hardening-guide
>https://portswigger.net/research/ublock-i-exfiltrate-exploiting-ad-blockers-with-css
absolute gems, thanks for sharing these

>https://github.com/RKNF404/chromium-hardening-guide#popular-options
>Fedora disabled CFI again
The top goys at the Pentagon Red Hat keep it disabled (closed wontfix btw):
https://bugzilla.redhat.com/show_bug.cgi?id=2425338
https://src.fedoraproject.org/rpms/chromium/blob/rawhide/f/chromium.spec
Bonus:
Most distros compile firefox with many hardening options disabled or misconfigured (like CFG/CFI and LTO), check them
Bonus 2: Tor browser (from the torbrowser-launcher) doesn't use FORTIFY_SOURCE, stack clash protection, stack protector, uses an outdated rust version. Avoid tier.

TL;DR: "Privacy" (and secure) browsing is a spook.
Replies: >>4529

[NL]

>>4498
> actual expert
what makes that person more actually an expert?

[SE]

Chrome isn't a monopoly. It's a standard.
Avoiding it is like using gopher to avoid the http "monopoly" or plaintext to avoid the html "monopoly".

>>4501
For security reasons, you must avoid using Linux at all costs. People only use it because ideologies, to support the underdog, or Microsoft and Apple are the evil boogeymen.

[US-VA] [DATACENTER]

For PRIVACY I would say mullvad browser is probably the sanest anti-detect browser that is FOSS right now (it's pretty much tor browser bundle, literally it is tor browser bundle but it shoves shit up mullvad (or your own choice of proxy)

Now if you're going to roll your own, which you probably should, I would say run with https://github.com/enetx/surf

this is gonna get you past 99% of the cancer of the internet if you learn to use this fucking library. heavily depends on you learning it, though. this little nigger can spoof JA4/JA3 and spoof chrome pretty good, but you might need also some other libraries in whatever it is you are building a client for

ultimately your vision should be to replace websites with software clients written for your desktop and to remove the web browser from your workflow imho

to this end, maybe RSS can also be useful.

now, i will also say to the point of using surf there's probably one group of retarded faggots who i can forward you to, and they might just make you some money too

BlackHatWorld

these retards know everything there is to know about scraping
Replies: >>4593

[US-NY] [TOR]

>>4587
Another /g/ verbatim repost
> For PRIVACY I would say mullvad browser is probably the sanest anti-detect browser that is FOSS right now
https://desuarchive.org/g/search/text/For%20PRIVACY%20I%20would%20say%20mullvad%20browser%20is%20probably%20the%20sanest%20anti-detect%20browser%20that%20is%20FOSS%20right%20now%20/

LMAO
Replies: >>4595

[DE]

>>4593
Fuck you and fuck /g/. The original posters are free to post here instead.
Replies: >>4596

[PL] [TOR]

>>4595
>reposting from /g/ is fine but FUCK YOU if you notice it!
lol

[PL] [TOR]

>What browser+plugin combination do you all use for safely browsing the web?
You have to decide whether you want functionality or safety. Modern web browsers are so insanely complex that there always will be a plethora of vulnerabilities. Even Tor Browser is too complex for its own good, and is only "private" or "anonymous", if you even grant it that, but certainly not "secure", because you cannot expect such a huge behemoth of a software to not have a million exploits for them.

If you want safety while browsing (disregarding functionality, privacy, and anonymity), you should use Links in graphical mode. Or dillo, Netsurf, lynx, or w3m, or just curl, but even curl is too complex, maybe don't use the web if you want to be secure...since I'm 100% sure Links in graphical mode is not what you are looking for, hence just accept that the modern web is inherently insecure, and every "security addon" and about:config change you do is just trying to do the impossible, which is to make millions of lines of code, which every web browser is this days, "more secure".

[DE]

A lot of psy-opping and cargo culting in this thread.

I know that I can't be 100% private/secure/anonymous on the internet or on the web, but my comfy setup is Librewolf + a bunch of add-ons (including uMatrix with JS disabled by default) + Tor routing. I also have another Librewolf profile running that has less add-ons and is not routed through Tor (goes through a VPN) for websites that block Tor. Also using Linux, of course.

Some people fearmonger about fingerprinting and that using the Tor network is of little use if you're not using Tor Browser with no add-ons, but I don't like that idea because it sounds like "you vill ovn nothing and you vill be happy". I'm using the opposite strategy which I've heard from DigDeeper where I try to make my fingerprint unique but I rapidly switch it on purpose (I use an add-on which randomizes my user agent every few minutes), instead of keeping a generic one for as long as possible (the good goy Tor Browser way).

But still, I don't feel entirely confident, and maybe I'm still less anonymous than using vanilla Goy Browser. But at the same time, I like my setup, and my goal is not having the perfect schizo setup because as I said earlier you can't truly achieve that. I guess for general corporate/government spying my setup is fine enough, and I can live knowing that the Mossad or some Russian superhacker could get me if they really wanted to, since that's an unlikely scenario.

However, I'd like to look into Palemoon again (partly due to contrarianism). I tried it in the past and then returned to Librewolf, but maybe the next time I'll enjoy it more. Can any Palemoon user tell me why I should use Palemoon?
Replies: >>10567

[DE] [TOR]

>>214
>Whenever I have to inevitably use YouTube, I prefer to use the Ikatube project, since it lets me watch videos without ads and without having to deal with YTs horrible and slow interface :annoyed:
>https://chino-chan.gitlab.io/programs.html
Where's the source code? Why would a random guy make a niche software and make it proprietary? Malware much?

[DE] [TOR]

>What browser+plugin combination do you all use for safely browsing the web?
No matter if you disabled jewscript and have 17 poxies behind the Browser, There's no secure way to browse the web, specially if you're using trannyfox or chromium. want security? do it offline.

But when I want to browse the web, I use Hardened Firefox+ublock on Arch Linux inside Virtualbox running on FreeBSD.

[SE]

>>10321
Don't forget about the TCP/IP and HTTP/2 fingerprint

[SE]

Reply

Posting anonymously. Your IP address will be recorded for rate limiting purposes.





Max 10MB per file. Allowed: images, videos, audio, PDF, text, zip