The Mullvad Browser is a privacy-focused web browser developed in collaboration with Mullvad VPN and the Tor Project. It aims to eliminate data collection and provide user-centric browsing services, ensuring online activity remains private and secure. The browser has the same fingerprinting protection as the Tor Browser, but connects to the internet without Tor Network or VPN instead. The Mullvad Browser provides anti-fingerprinting protections.
The idea is to provide one more alternative – beside the Tor Network – to browse the internet with more privacy. To get as many people as possible to fight the big data gathering of today. To free the internet from mass surveillance.
Here: >> mullvad browser official <<
Yes. And private Browsing is useless.
Okay, it seems its not clear what I mean.
The purpose of private browsing:
But the thing is:
I asked the Mullvad devs about this, but they dont care. Private browsing also restricts the browser, for example containers dont work, temporary containers for instant cookie cleaning for example. And it has no purpose! These can be individual settings, and simply enabling Session or reven downloads saving will NOT leak data to the web.
This “leave no trace locally” simply does not work for most people. Its your PC, you are the one accessing it. This keeps people away from the browser, even though Firefox with Arkenfox or Librewolf or Mull are perfectly usable, I use them daily.
And that’s all totally fine. Mullvad is definitely going for the leave no trace local browsing people.
If you need to browser with persistence, you have the options that you outlined.
For people who want a daily driver with no persistence it’s perfect
No it makes no sense… they could simply preset the settings:
And have the same thing, without the private browsing annoyance
But then the data would be written to disk, and then it would be deleted from disk, which would leave a trace.
I get this isn’t your threat model. But for the people whose threat model it is then that’s unacceptable.
Deleting data on disk does not actually remove the data. It’s still persists especially on SSDs.
In private browsing it would not be saved to disk? This is a real difference then.
Its not about “my threat model”, its about if private browsing actually makes sense, or if it just restricts the browsers capabilities.
So in PB everything is kept in RAM? And this cant be reproduced with a setting?
https://2019.www.torproject.org/projects/torbrowser/design/#disk-avoidance
If you’re saying private browsing mode doesn’t make sense for anybody, I’m going to disagree with you. If it doesn’t work for you that’s fine. But it is something for other people
I will check if there are other settings to avoid writing to disk. If there are none, valid point and this cant be changed. If there are some, I stay with my point.