Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

The best 8 secure browsers 2016
TechWorld ^ | 25 February 2016 | John E Dunn

Posted on 03/08/2016 6:10:51 PM PST by ShadowAce

Browse the web with privacy and security with these best secure browsers. Protect your privacy online with the eight best secure browsers you can use in 2016.

What does the idea of a secure browser mean in 2016? The world is now more complex than it was in 2010 when we last looked at the contenders. People are more oriented to mobile devices running under very different conditions while a range of security features such as URL filtering, download protection and do not track have transformed mainstream desktop browsers such as Chrome, IE and Firefox. In a sense all browsers could now plausibly claim to be ‘secure’ browsers.

If that’s the case, what has happened to what were once considered secure browsers? One answer is the specialised products are now more focused on the issue of user privacy, of handing back control to the user and opting out of data collection systems of the sort that underpin firms such as Google.

It is perfectly possible to tweak Chrome, Firefox or IE, fine tuning them for security and privacy if that’s important. Each now has a privacy mode – which might or might not convince the sceptic of course. But the philosophy behind the true secure browser is to eschew the notion of platforms and plug-ins, stripping back every non-essential feature to create a more minimalist experience.
The following five (OK, plus one plug-in) achieve this is in different ways. This list is not intended to be exhaustive, merely an indication of what’s on offer from ones that caught our eye. Privacy usually requires compromises so they won't be for everyone.

Best Secure Browser: Epic privacy browser

Based on Chromium, Epic is the perfect example of a browser that strips out every conceivable feature to maximise privacy. It’s rather like using a minimalist Google Chrome with the Google. Cookies and trackers are eliminated after each session, all searches  are proxied through the firm’s own servers (which means there is no way to connect an IP address to a search), and it attempt to  prioritise SSL connections wherever possible., useful for open Wi-Fi connections. It does not collect data about its users and comes with excellent built-in ad blocking.

For a fully-encrypted connection, it includes a one-button proxying feature that does slow down browsing but will appeal to some users (it can’t necessarily be used as a regional bypass proxy because Epic’s servers are based in the US). Despite eschewing plug-ins a handful are available to make life a bit easier, for example password manager LastPass.

Downsides? Epic doesn’t seem to include the malware or anti-phishing protection now found on popular browsers.

Best Secure Browser: Comodo Dragon/Ice Dragon

Comodo has continued to improve its Dragon secure browser, forking it into two version based on Chromium (Dragon) and Firefox (Ice Dragon), sort of remixed versions of the standard browsers that add features while removing some potentially undesirable ones. Which one you choose would depend on your current investment in either Chrome or Firefox because each aims to maintain compatibility with thing like plug-ins, stored passwords, and favourites if desired.

Features? Probably the first one is the ability to choose whether to use Comodo’s SecureDNS servers for either Dragon or all applications (or not at all), which potentially offers privacy and security compared to a user wanting to bypass their ISP’s infrastructure.  This incorporates a domain filtering system designed to limit exposure to problem domains of the sort used by malware       

Probably the most intriguing feature is the browser’s ‘virtualised mode that isolates it from the host system. This is a free feature but requires the user to install Comodo Internet Security (CIS), a free version of the company’s anti-virus software. Not everyone will want to do that but the added security of this approach is worth considering.

Comodo also includes SiteInspector, a system for filtering suspect URLs as they are accessed.

Downsides? Comodo is set up as a parallel world to Chrome or Firefox minus some of the tracking and with some extra added layers of security. Impressive as this sounds it’s almost the polar opposite of Epic’s minimalism - worth experimenting with perhaps.

We should also mention that the recent controversy that engulfed Comodo over its promotion of tools such as PrivDog does not, according to the company, affect Dragon.

‘Chromodo’

Comodo also now offers something called Chromodo. As far as we can tell it is identical to Dragon but with a more standard (i.e. non-Comodo branded) look and feel.

The Tor browser has become the watchword for the anti-surveillance because it is built on an entire infrastructure of ‘hidden’ relay servers. Built atop a modified Firefox, it can be installed on a Windows, Mac or Linux PC but also on a USB stick if that’s preferable.

The important thing to remember about Tor is that it is really an advanced privacy browser rather than a secure one in that it includes no anti-malware technology and blocks plug-ins by design. It is designed to anonymise a user within certain constraints such as the requirement to use only HTTPS connections (enforced by HTTPS Everywhere – see entry below).  The Tor Project offers a list of do and don’t for using it securely, including being very careful about downloading and opening documents which require external applications. Tor is a privacy browser not a secure environment.

Downsides? Using Tor will be slower than with other browsers and it can be demanding to use to its full privacy potential.  Some people think that anyone who uses Tor is trying to hide something. Of course they are right. If privacy is that important, let them think what they want.

Hornet

As an aside, in 2015 a system called Hornet was proposed fir the future that would speed up Tor’s Onion routing by minimising the system’s network overhead. Today, Tor browsing is slower than conventional browsing but this might not always be the case.

Best Secure Browser: Dooble

Dooble is a lean Chromium-based multi-platform (Windows, Linux, OS X) browser that won’t be for everyone despite its privacy features. In its default state it disables insecure interfaces such as Flash and Javascript which will make it difficult to use with a lot of sites but might be worth it for its stripped-down approach. The browser assumes the user wants to travel incognito from the off, while HTTPS can be enforced and third-party session cookies in iFrames blocked. The handling of cookies is unusually granular.

An innovative feature is that all user content (bookmarks, browsing preferences and history) can be encrypted using various ciphers and a passphrase. Another interesting feature is to set privacy, for example private browsing, for each tab using the right-click option.

Reviewers haven’t taken to Dooble because it lacks refinement in places but we found it fast and in some of its ideas clever.

Downsides? As stated.

Best Secure Browser: Maxthon Cloud Browser

Maxthon is not so much a secure browser as a totally new type of HTML5-compatible browser that wants to act as a straight replacement.  With origins in China, and designed around synchronisation between PC and mobile and builds in features often enabled in other browsers using plug-ins.

Although not a security browser per se, it embeds claimed protection from AdBlock Plus including the (for some) contentious ‘Acceptable Ads’ technology,  AES256 encrypted synchronisation  of files to its cloud services, and says it limits employee access at its end to customer data. That probably gives most people the collywobbles but it’s worth pointing out that exactly the same issues exist for any cloud service, including Google.

Downsides? Despite the interesting aspect of cloud integration we couldn’t see how Maxthon was inherently more secure than running a branded browser with the security settings turned up. In places poorly explained and documented, it’s also unclear whether it has features such as download protection that would come as standard elsewhere.

Best Secure Browser: HTTPS Everywhere

A browser plug-in rather than a browser as such, HTTPS Everywhere is an EFF/Tor project that enforces SSL security wherever that’s possible in Chrome, Firefox and Opera. Its promise is to make what would otherwise be a complex and uncertain process much simpler because it is easy to start out using HTTPS on a website and be sent back to non-HTTPS pages without realising it.
Downsides? It’s another plug-on of course but it’s worth it. A boon for café surfers everywhere.

Best Secure Browser: Cocoon browsing

When we first looked at Cocoon in 2014 we were put off by the fact that it didn’t seem to have been much recommended since its first appearance around 2011-2012. More recently the firm seems to have re-launched itself as an ad-supported free product (a more advanced Cocoon+ is ad-free but costs $19.99 per annum) as a “military-grade” product offering a range of alluring security features –anonymous browsing, anti-Facebook tracking, better W-Fi security on open hotspots, and an encrypted end-to-end connection.

Based on a plug-in design (Firefox, Chrome, Safari and IE), Cocoon is really a proxy VPN-like service in which the user logs into its server using a created account, and logs out after conducting any browsing. In theory, this makes it ideal when using unsecured PCs away from home.

We have yet to properly test the browser’s security for this review (that is imminent) but the paid version does advertise some interesting additional features such as ‘mailslots’, basically disposable email addresses that hide the real address (webmail services also offer this through aliases although the underlying service such as Gmail or Yahoo is always apparent). Deleting the temporary email address effectively unsubscribes you from anything signed up for.

Best Secure Browser: IceBrowser (Cocoon)

Based on the Cocoon platform, Icebrowser is a Firefox-only plug-in that offers exactly the same security features as Cocoon but routes traffic via servers in Iceland. The advantage? Browsing data is logged in that country, far from the prying eyes of the NSA and others, or at least we assume that’s the benefit.

Using the service requires the user to sign up to the possibility of a $9.95 per annum charge on the basis of the following:

“You will not be charged at this time. Providing your billing information ensures your service will continue uninterrupted at the end of your free trial and limits one free trial per person to avoid fraud.” Make of that what you will.

Best secure browser: Avira Scout

Currently still in beta, the philosophy behind Scout from German anti-virus firm Avira is to bundle a range of third-party security plug-ins inside a dedicated Chromium-based browser with a few additional tricks up its own sleeve.

Integrated security on offer includes Avira Safe Browsing (blocks known phishing websites), Avira Safe Search, Secure Wi-Fi, which enforces HTTPS (based on https Everywhere) when connecting to sites across insecure Wi-Fi, and anti-tracking (the excellent Privacy Badger plug-in).

None of these features are unique to Scout and can be loaded as add-ons in other supported browsers. Putting them in one place is really a convenience. The browser also leads on the idea of usability although we’re not convinced it has reached its ambition yet. Users can choose between a ‘comfort’ mode and a ‘secure’ mode that confusingly appears to enable fewer security layers.

Scout does appear to be ‘hardened’ with a few tweaks, however and additional ones are also possible in future. A script is included to check extensions against an allowed list. The extensions mentioned above are also implemented with the browser itself and cannot be removed, a protection of sorts. Near-term releases will add Avira’s AV scanning, including at some point the firm’s cloud-scanning facility.

Conclusion: the idea of taking established tools and bundling them in a browser is in many ways an advance of the other browsers here, some of which use technology of their own making. The other advantage is that Avira offers Scout as a loss leader and isn’t therefore (it says) trying to track or monetise its users. This appears to be a tool to promote the company’s wider expertise.

The final judgment will have to wait until Scout reaches a stable version 1.0.


TOPICS: Computers/Internet
KEYWORDS: browser; browsers; linux; security; windows
Navigation: use the links below to view more comments.
first previous 1-2021-35 last
To: ShadowAce

Thank you for the very good options.

I use Safari for work and Epic for all other browsing. Options:

Epic. https://epicsearch.in/

Comodo. https://www.comodo.com/\

Cuil. http://cuil.pt/

Dogpile. http://www.dogpile.com/


21 posted on 03/08/2016 7:37:22 PM PST by Falconspeed ("Keep your fears to yourself, but share your courage with others." Robert Louis Stevenson (1850-94))
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thanks for the ping.


22 posted on 03/08/2016 8:06:20 PM PST by GOPJ (Republican elites have turned into " race-baiting bigots" - feeding on PC mob evils.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

checkout later


23 posted on 03/08/2016 8:08:42 PM PST by plsjr (<>< Mankind "knows" by trial and error; Only the CREATOR really knows His creation.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I’ve only tried the Comodo Dragon and the Maxthon. Both seemed to work fine.


24 posted on 03/08/2016 8:20:00 PM PST by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: smokingfrog

And where does Safari stack up in this biased article?


25 posted on 03/08/2016 8:32:29 PM PST by aviator (Armored Pest Control)
[ Post Reply | Private Reply | To 24 | View Replies]

To: aviator

Why is it biased?


26 posted on 03/08/2016 8:47:49 PM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 25 | View Replies]

To: ShadowAce

there’s a fella online on youtube that talks about TOR and how it actually sends up red flags to the f bi when they see it beign used- and they can break into it and know who’s using it-

There is no security online-


27 posted on 03/08/2016 9:09:55 PM PST by Bob434
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

[[I thought the NSA likes people to use Tor.]]

they do- people think it’s veiling their identity, but it doesn’t- it’s just like a big red sign that says’ ‘hey, I’m trying to evade detection’


28 posted on 03/08/2016 9:12:05 PM PST by Bob434
[ Post Reply | Private Reply | To 11 | View Replies]

To: ShadowAce

BFL


29 posted on 03/08/2016 9:25:27 PM PST by super7man (Madam Defarge, knitting , knitting, always knitting.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bfl


30 posted on 03/08/2016 9:31:33 PM PST by Kush (Insert your own witty, patriotic, or sarcastic remark here.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bob434
there’s a fella online on youtube that talks about TOR and how it actually sends up red flags to the f bi when they see it beign used- and they can break into it and know who’s using it-

Part of your problem is that you believe everything you read/see online.

The use of TOR is NOT a red flag. If, however, your IP address pops up on a TOR egress point for a kiddie porn site or some al Qaeda affiliate, THEN you might get a call.

TOR was developed by the government for secure communications, and it's an excellent tool. A majority of web traffic is filtered through fewer than a dozen sites (e.g. Google, Facebook, Twitter). Seeing the Internet in all of its glory, warts and all, is what TOR does for an average user.

The way I like to tell the story is that there are 65535 TCP/UDP ports available on every computer in the world. The grand majority of traffic is on ports under 1000. Anything over 1000 is generally used for port randomization in domain/enterprise environments. MOST of the world's Internet traffic travels over ports 80 (HTTP) and 443 (HTTPS). There are literally thousands of other protocols in use (e.g. NNTP, XMPP, IRC, FTP) still very much in use around the world. To think that the Internet you all know through your web browser is the extent of it is foolish.

31 posted on 03/09/2016 4:53:31 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: ShadowAce

BFL


32 posted on 03/09/2016 5:05:29 AM PST by antidisestablishment (If Washington was judged with the same standard as Sodom, it would not exist.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bkmk


33 posted on 03/09/2016 6:18:10 AM PST by AllAmericanGirl44
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

[[THEN you might get a call.]]

So basically you are saying it is a red flag tool- The fella explained it very well on youtube- you can check it out yourself if you wish- Tor is designed to flag users who are trying to hide their identity- while it may be a fine tool for other purposes, it’s also used to determine if folks are trying to evade detection


34 posted on 03/09/2016 8:51:45 AM PST by Bob434
[ Post Reply | Private Reply | To 31 | View Replies]

To: Bob434

Problem with that statement is that your identity isn’t hidden, per se. It’s a way to mask your habits, no completely obscure your identity. All it takes is compromising an endpoint, and everything you’re doing is easy to track.

If you want anonymity, use VPN.


35 posted on 03/09/2016 9:36:37 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-35 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson