⚠️ Problems with common browsers
Mainstream browsers likeChrome, Edge, Operathey collect extensive data and sell it to third parties. This leads to unauthorized profiling and fingerprinting via hardware specifications, fonts and plugins.
Threat 2025:AI-powered fingerprinting analyzes behavior (mouse movements, typing) for accurate profiling.
Pay attention to:
- • Auto-update introducing telemetry
- • Extensions causing data leaks
- • Side-channel attacks bypassing the VPN
Low Threat (Ads)
Basic settings adjustments are enough to protect against ad tracking.
High threat (monitoring)
A complete abandonment of mainstream browsers is necessary. Use Tor + TAILS.
🔒 Warning about Mozilla browsers
Firefox and its forks have limitations, especially on Android:
For high threat:Test thoroughly or use Tor + TAILS
For low risk:Usable with hardening
Desktop browsers
Firefox
🟠 Requires hardening Open SourceFirefox is an independent browser, but it collects telemetry by default. Requires manual configuration for privacy.
Mandatory settings:
- •
about:preferences#privacy→ Disable all data sharing - • Enable HTTPS-Only Mode + Strict tracking
- •
about:config→privacy.resistFingerprinting = true - • Disable auto-sync (leaking bookmarks)
- •
datareporting.healthreport.uploadEnabled = false
LibreWolf
🟢 Recommended Open Source Firefox ForkA fork of Firefox with telemetry removed and anti-fingerprinting enabled by default.
Advantages
It may break some pages (aggressive blocking). Updates delayed compared to Firefox.
Mullvad Browser
🟢 Recommended Open Source High anonymityHigh anonymity without Tor overhead. A uniform fingerprint to blend in with the crowd.
Advantages
Tor Browser
🟢 Recommended Open Source Maximum anonymityUltimate anonymity via onion routing. Routes traffic through 3+ nodes for maximum identity protection.
Important
- • Disable JavaScript globally
- • Never log into personal accounts
- • Slower speeds (3+ hops)
- • NSA/FBI monitor nodes - use bridges
- • Combine with TAILS OS
Android browsers
Chromium on Android Info🛡️ Why consider Chromium on Android?
Best for:GrapheneOS / hardened ROMs
Risk of:Stock Android (Google Telemetry)
IronFox
🟢 Recommended Open Source Firefox ForkA privacy-focused Firefox fork for Android. Removes proprietary blobs, pre-configured privacy settings.
Advantages
- • Removed proprietary blobs
- • Lightweight for older devices
- • Preconfigured privacy
Disadvantages
- • Restricted community
- • Manual updates
Vanadium
🟢 Recommended GrapheneOS OnlyHardened Chromium fork for GrapheneOS. Google services removed, verified boot.
Advantages
Only for GrapheneOS - not available on other systems.
Brave
🔴 Not recommended Open Source ChromiumChromium browser with built-in ad blocking. However, it has a long history of controversial practices and credibility issues.
A history of controversy
- 2016:They promised to replace banner ads on websites with their own ads - an effort to monetize content without the consent of website owners
- 2016:CEO Brendan Eich unilaterally added Infogalactic (a pay-to-win Wikipedia clone) to the default list of search engines
- 2018:Tom Scott and other creators discovered that Brave was collecting donations on their behalf without their knowledge or consent
- 2020:Brave was caught injecting affiliate codes into URLs (Binance, Coinbase, Ledger...)
- 2023:Brave installed a paid VPN service on users' computers without their consent
⚠️ Don't use Tor over Brave!
Brave has built-in "Tor windows", butDO NOT USE THEMfor anonymity:
- • Another fingerprint– Brave Tor has a unique fingerprint, you don't blend in with other Tor users
- • No hardening– Tor Browser has special protections that Brave does not have
- • WebRTC leaks– Brave can reveal your real IP
- • No insulation– Shares profile with regular browsing
- • DNS leaks– Possible leaks of DNS queries outside of Tor
Use for anonymityTor Browser onlyorTAILS OS.
Other issues:BAT rewards create a unique fingerprint. Brave News collects interest data.
If you still have to use Brave:
- • Disable BAT rewards completely
- • Disable Brave News and Brave Wallet
- • Enable aggressive blocking
- • NEVERdon't use Tor bookmarks - use Tor Browser
Browser configuration
Firefox Hardening
1. Disable telemetry
# about:preferences#privacy → Uncheck all data sharing
# about:config:
datareporting.healthreport.uploadEnabled =false
2. HTTPS-Only Mode
Settings → Privacy & Security → Enable HTTPS-Only Mode
3. Resist Fingerprinting
# about:config:
privacy.resistFingerprinting =true
# Randomizes canvas, fonts, blocks audio fingerprinting
4. WebRTC Protection
# about:config:
media.peerconnection.enabled =false
5. Block third-party cookies
Strict tracking protection or custom block everything
Extension
Rule:Max 2-3 extensions! More = unique fingerprint. Each extension has a unique ID that can be exposed.
uBlock Origin
Blocks ads, trackers and malware domains. Essential for clean browsing.
Settings:
- • Enable Medium mode (blocks 3rd-party)
- • Add custom filters
- • Enable "I am an advanced user"
⚠️ Beware of fake versions - verify the source!
GitHub →AdNauseam
uBlock Origin based, obfuscates data by clicking on hidden ads, confuses trackers.
Visit →🔑 Never save passwords in the browser!
- • Single point of failure
- • Vulnerable to malware
- • Weak encryption
Use itKeePassXC or Bitwardeninstead.
Search engines
🟢 They do not collect data
SearXNG: Self-hosted metasearch, full control. Heexy: New metasearch + custom index (under development).
🟡 They can collect (unless you block)
🟠 They can collect data
DuckDuckGo: Uses analytics, Bing based. Aggregated data may be de-anonymized.
🔴 100% Tracking
Compartmentalization
Use separate browsers for different purposes:
Personal
Social networks
Work
Professional
Finance
Banking
Anonymous
Tor Browser
Advantages:
- • Reduces correlation attacks
- • Limits damage from compromise
- • Separates identities
Threats 2025
AI Keystroke Dynamics
AI analyzes typing patterns and mouse movements for identification.
Defense:
- • Tor Browser (uniform timing)
- • Cloak on Qubes OS
- • Random delays
Extension ID Leaks
Each extension has a unique ID that is exposed.
Defense:
- • Minimize extensions
- • Use regular (uBlock)
- • Audit with Extension Source Viewer
Traffic Correlation
ISP correlates traffic for de-anonymization.
Defense:
- • Tor Bridges
- • TAILS OS
- • Never Tor + VPN in wrong order