So, first off, to make it for daily browsing use I did some basic alterations to the browser by allowing it to keep history, caches, cookies, disabling always-on incognito, and so on. I also installed my favorite addons (Dark Reader, Sponsorblock, I try to be as minimalistic in my choices as possible). This of course harms the privacy, but you can just ctrl+shift+p to basically turn all of that shit off when you decide you need to get serious. I kept the letterboxing on, its hard to get used to initially but after about a month of using Mullvad as a daily driver I got used to it. It seems most sites aren’t able to detect my alterations to the browser.

I don’t think any other privacy browser spin (Librewolf, Waterfox, Brave, Tor Browser etc) comes anywhere close to the snappiness and privacy intersection of Mullvad Browser. I’m able to skirt bans due to using anonymity services trivially and the captchas are short and quick and not a never-ending slug fest. Its good enough at faking a unique identity out of the box that most things cannot tell that its fake. I’m in such love that I’m going to swap away from my current vpn (IVPN, sub should end in November) to Mullvad due to how well polished this project is. I’m really interested if their multihop service can get around VPN IP bans better than Tor can.

Kudos to the Mullvad team 🥂 I hope you make an android version soon!

  • RockLobstore@lemmy.ml
    link
    fedilink
    arrow-up
    1
    ·
    edit-2
    4 hours ago

    Neat. Never heard of it. I’ll take a look. One thing I read about was how Tor/Tails actually made itself more identifiable in some ways by having a “set” kind of user profile fingerprint (blank), and specific screen size/resolution and keyboard used. To actually pose as a real user, then spoofing a bunch of different hardware each time you turn on the OS/Browser seems like it would make you appear more authentic? That was a long time ago, maybe it’s being done already, or there is a reason they don’t that I do not understand. It seems like something they would obviously have thought of. At least in the US we aren’t using those kind of low resolutions as often anymore. When you say it’s based on tor, does it connect to the tor network? That always felt like a red flag for ISPs and spies to look deeper when connecting from say, a residential WiFi connection.

    • marcie (she/her)@lemmy.mlOP
      link
      fedilink
      arrow-up
      1
      ·
      3 hours ago

      Realistically you can only spoof specific things, spoofing hardware is actually a bad idea oftentimes because its possible to tell that you’re doing that. Spoofing certain things like audio readings do make sense tho.

      Its based on Tor but its meant to be used with a VPN