Firefox done?
guser39 It's a privacy focused browser. I think it is absolutely an alternative for people who want less Google, given that it has strong privacy protections in place, not just to protect from Google but any tracking company. Don't let the word "chromium" fool you into thinking it's somehow Google sponsored spyware. You're shooting yourself in the foot.
Every company has questionable management and design choices.
- Edited
I think they're best to be ignored. Nothing this person says will be substantiated with evidence, they're all about being bombastic. It's people like this that give privacy a bad name.
- Edited
From the official GOS account on Mastodon:
The only other browser [besides Vanadium] we can currently recommend is Brave. It preserves most of the security of mobile Chromium while adding more state partitioning, anti-fingerprinting and the most advanced content filtering engine. Vanadium is more secure but needs to catch up in those areas.
https://grapheneos.social/@GrapheneOS/111966180001152300
There are lots of reasons that some folks might dislike Brave.
Private company, runs an ad network, crypto, AI.
But there's no perfect browser out there. Brave is one of the least bad choices, per the GOS account:
If you rule out Brave then there's no mobile browser alternative to Chrome or Edge we can recommend due to lack of basic security.
https://grapheneos.social/@GrapheneOS/113948398641752397
Also, about Firefox and variants:
Firefox doesn't have a basic content sandbox on Android, let alone site isolation, and it has a lot of other security deficiencies.
The browsers referring to themselves as hardened Firefox variants only harden privacy, not security, and in fact most bring more security issues.
This applies to the Tor Browser too.
I tend to do a lot of browsing on vanadium, for security and privacy reasons. I don't think firefox is a secure browser. I stopped using it many years ago. When I do browse on my laptop, I use Brave. I hope to get the p10 fold, and that will decrease my laptop use even further.
Mozilla may also receive location-related keywords from your search (such as when you search for "Boston") and share this with our partners to provide recommended and sponsored content. Where this occurs, Mozilla cannot associate the keyword search with an individual user once the search suggestion has been served and partners are never able to associate search suggestions with an individual user. You can remove this functionality at any time by turning off Sponsored Suggestions—more information on how to do this is available in the relevant Firefox Support page.
lol
96397605 maybe because of this ?
Sweden want to impose encryption backdoor. If passed, the legislation could also be a problem for Sweden based VPNs such as Mullvad.
In the worst case, they could force mullvad to log user activity. However, they will probably move to a new country like Swiss rather than shutdown or stay in Sweden (speculation)
argante Still nothing there about 22-23% of Tor nodes being set up by government agencies. You're again providing links to old content that doesn't prove your claim. If you're unable to provide a relevant source and then quote the specific relevant parts from that source to support your claims, then my kindest interpretation of the way you're arguing in this thread is that you simply have no idea what you're talking about.
argante What's more, about 22-23% of Tor nodes are set up by government agencies to de-anomize users.
- Edited
It's not in any way about supporting the claim made here by argante "about 22-23% of Tor nodes being set up by government agencies", (and i don't want to deep-dive as i find the Tor node-discussion is slightly off topic to the OPs question) but the article I stumbled across is more recent than the ones cited here in the discussion and may still be of interest to some:
Citing the article with one addition in brackets by me:
Research by Panorama and STRG_F has now revealed that they (LEO) have apparently recently expanded their strategy to overcome Tor. This requires surveilling individual Tor nodes, sometimes for years.
argante KYC. It will be the same if you use a VPN with a service that can be linked to you (gmail).
Mullvad does not have a KYC requirement and offers plenty of pay options to avoid tying one's identity to an account.
I can understand if VPNs in general may not satisfy a particular threat model given these legitimate concerns, or that they may not offer a good enough value proposition for some. However, none of this suggests that Mullvad is somehow fraudulent. They have an outstanding reputation among VPN providers for good reason.
- Edited
Mullvad does not have a KYC requirement and offers plenty of pay options to avoid tying one's identity to an account.
That's true. You'll even pay less if you use Monero. By KYC I mean that if you use a bank account to make a payment, it's hard to talk about anonymity. The same goes for if you log in through a VPN to your gmail.
Mullvad (...) have an outstanding reputation among VPN providers for good reason.
This is also true. I have pointed out something that is rarely mentioned, that data centers, fingerprints, CDNs and Cloudflare completely undermine what VPN providers claim. Mullvad can therefore assure that it does not save any logs, but Cloudflare in M247 or DataPacket, where Mullvad has its servers, can already save and analyze such logs. Why does Mullvad not admit to this risk and only say that they provide wonderful privacy and anonymity?
argante U make a good point, i had this question spooking in my head recently. I do trust Mullvad as an entity, but for their vpn servers in other countries, like in europe, i assume they rent servers from M247. Can Mullvad guarantee for example that a server in France rented from M247 doesn't 'monitor' in any way? (For lack of a better term). If not, how would that work exactly?
Can Mullvad guarantee for example that a server in France rented from M247 doesn't 'monitor' in any way?
They can’t guarantee that, and they have full knowledge that the network is being monitored because that’s the data center policy they have to agree to. The problem is that VPN providers are a valuable target for such monitoring.
If not, how would that work exactly?
Watch this and pay attention to 6:05 where he says the VPN does not keep logs:
- Edited
argante Why does Mullvad not admit to this risk and only say that they provide wonderful privacy and anonymity?
If these risks are not addressed in any of their blog posts, then it wouldn't hurt to bring it up with them and perhaps they will elaborate to everyone's benefit. Multihop, DAITA, Mullvad browser, RAM only servers, etc.. ought to address some of these concerns... or perhaps they consider the risks beyond the scope of a VPN company to address? None of this strikes me as deserving of being labeled a scam.
Relating back to the OP concern, does the Mullvad fork of the Firefox browser address Mozilla's pivot to Surveillance Capitalism? That's definitely a question I'd like both Mullvad and the Tor Project to address.
- Edited
r134a Can Mullvad guarantee for example that a server in France rented from M247 doesn't 'monitor' in any way? (For lack of a better term). If not, how would that work exactly?
I've always assumed the answer to the first question is a flat no, but I'd rather shift my risk to M247 after exiting a VPN tunnel than to allow my ISP to do even worse, with full KYC. So it's not a question of are VPNs private and anonymous, it's a question of which VPN provides the best privacy and anonymity among all VPN providers.