28

cross-posted from: https://lemmy.dbzer0.com/post/52731585

I was reading around about private browsers and I came across mullvad's browser (only know them for the VPN), do you have experience using it? does it do anything different? I currently use librewolf and from what I can see the mullvad browser also is build from firefox. I generally prefer firefox-like browsers to chromium since i like way its set up and what it allows me to do. Its supposedly build by the same guys who made the tor browser (tbh i feel like thats just marketing). From their website it says its tor without tor but instead with a VPN. So technically I can accomplish the same thing with librewolf and a VPN?? Does the mullvad browser do anything new/different? One thing they do mention is browser fingerprinting does it do anything special to combat that? if i switch to mullvad instead but still have the same extensions is it more private?

top 12 comments
sorted by: hot top controversial new old
[-] swelter_spark@reddthat.com 3 points 1 day ago

I've heard nothing but good things about Mullvad. I currently use Librewolf and love it, but if I had to switch, Mullvad might be my #2 choice.

[-] ShyFae@piefed.blahaj.zone 4 points 1 day ago

I normally use Mullvad and a hardend Librewolf.

Mullvad seems funtionally the same as the tor browser. I believe the idea with the tor brower was that they would be difficult to distinguish for one person from the next. And same goes for Mullvad. The only differince being that Mullvad does't naturally go through the tor netwok, doesn't onionize sites, and uses mullvad's own search engin and DNS server by default. (Mullard's brower exists so that you have a tor browser without the tor network; And that's different topic of conversation)

Librewolf is closer the firefox experince, and I would happily recommend it to everyone. I personally enabled the sync funtion, switch the default search to ecosia, and hardend up some other settings. I haven't felt the need to add any plugins yet( that wern't installed by default).

In my tests, both have shown to be exellent privacy browsers. But as such, they both also stick out like a sore thumbs.

Overall, if you want the most privet browser, Mullvad seems hide more of my identity and fignerprint. But you will will look very suspicious.

I still recommend Librewolf over Mullvad, does everything I want and need it to do

[-] Sophocles@infosec.pub 4 points 1 day ago

In my opinion it does offer the best in class for anti-fingerprint features out of the box. Personally I don't use it because I need browser addons. Adding addons to mullvad kinda defeats the purpose, as they will make your browser extremely unique. Librewolf + addons is more fingerprintable, but still less so than Mullvad + addons imo. I feel like it is useful to have both; Librewolf + addons for your daily driver, and vanilla Mullvad for extra anonymous browsing, web searches, etc.

As a side note too, I have also heard that using Mullvad browser + Mullvad VPN is a bad idea, because it gives Mullvad as a company more information points that might potentially deanonymize you. Part of the reason why Mullvad is so great is that when an entity subpoenas your info, Mullvad can say "we don't know anything sorry." So the more information points you give, the more that defense weakens, even though Mullvad itself is trustworthy

[-] blurb@sh.itjust.works 2 points 1 day ago

Mullvad Browser doesn't collect your data, so the second paragraph is wrong. I completely agree with you on the first paragraph though. Also make sure not to change the window size in Mullvad Browser as that can also be used to track you. If you are using a tiling WM set a rule for it to make it floating at all times if possible. Also don't forget to disable Encrypted DNS if you're using a VPN.

[-] Sophocles@infosec.pub 2 points 1 day ago

I disagree; while Mullvad is very good with their no logs policies and collecting minimal info, it is generally good opsec not to centralize too many assets or data points into one company. Example: using android with chrome and google vpn, all your data is, from start to finish, in the hands of Google. Mullvad is miles better than Google of course, but I believe the same strategy applies

[-] blurb@sh.itjust.works 3 points 1 day ago

No, you're wrong in the sense that they literally collect 0 data on your Mullvad BROWSER usage. It can't be another data point because Mullvad likely doesn't even know if you're using Mullvad Browser, let alone what you're doing with it.

Your point is only valid in the case of internet services, which a browser isn't. A browser is a piece of software that can be replaced in a minute if let's say Mullvad's whole development team and CEO went full batshit crazy and placed backdoors in the public (and FOSS, so it can be forked) codebase, unlike e-mail etc. And your Google example is invalid because you can't compare something like Google Chrome to Mullvad Browser.

[-] Sophocles@infosec.pub 1 points 19 hours ago

I stand by what I said, and you're misunderstanding my point. I'm not comparing mullvad to google, it was an analogy. Plus a browser handles processes in the Application layer (layer 7) in the OSI model, and therefore is a very essential part of the chain of services required for telecommunication. This is a first year cybersecurity concept.

Mullvad does collect a very small amount of info; see their privacy policy., especially in regards to payment. Seeing that most users probably don't use Monero, Mullvad does have a small amount of info on them. However, this is not what my point is.

While this is a very mininal amount of data, my point is that consolidating more information points into 1 company is a bad idea, no matter the company, and no matter the degree of data collection. You cookies, browsing history, dns record, etc. are all now potentially linked to your payment info as well as http requests, tls encrypted traffic, and network activity via the same company via both browser and VPN.

Side note: a similar opsec strategy to prevent this is defederation, which denies complete control to any 1 entity. (Lemmy!)

If mullvad ever became unhinged (which I doubt would happen, but let's entertain the thought), your entire internet access would be compromised at the browser and the network level, rather than just one or the other. You can break this up over multiple trustworthy applications to fix this. Another analogy would be to use librewolf on linux with Mullvad VPN, which are all tustworthy and come with a degree of separation as well. Now if mullvad were to go crazy, it would not affect your OS or your browser, since you were using librewolf and linux. There are less information points to work with.

[-] Dequei@piefed.social 6 points 1 day ago
[-] machiavellian@lemmy.ml 6 points 1 day ago

As far as I know, no it isn't.
My recommendation is that if you want better browser privacy than Librewolf, look into Pale Moon or GNU IceCat which are independently maintained older forks of Firefox (and thus untouched by the plague that is Mozilla). Use uMatrix and JShelter. You can also read these articles on browser privacy. Although many of these articles haven't been updated in a while, most are still relevant.

[-] blurb@sh.itjust.works 4 points 1 day ago

It literally is? LibreWolf and other such "privacy browsers" only work to fool naive scripts, while Mullvad Browser works to completely mix you in with the crowd.

CreepJS has removed its Visits feature (Visits would show how many browsers with the exact same fingerprint had accessed the site) for some unknown reason so I can't really post a screenshot, but at least while I was using it around a year ago when it did have that my Mullvad Browser tests would always come up with the Visits value in the thousands, and LibreWolf only with 1.

Mullvad Browser by itself isn't foolproof though as you also need a VPN (preferably one that is usually coupled with Mullvad Browser) to actually mix in. Your IP could still theoretically be revealed this way by a state-level actor though, and if you're engaging in illegal activity (doesn't need to be drugs or anything, political activism is also illegal in many places) just use TailsOS with a WebTunnel bridge at that point, and preferably set Tor Browser's security level to "Safest" (you have to do this everytime you restart if you're using TailsOS).

Some tips for Tor enjoyers: Pin NoScript to the browser toolbar so you can bypass the security level restrictions when you need to (not recommended for most cases, use at your own discretion). And if you're having issues with the assigned IP address, you can request new Tor circuits via the sandwich menu on the top right.

[-] machiavellian@lemmy.ml 1 points 1 hour ago

It appears that I was mistaken. After looking through Mullvad's documentation, it truly appears that it has really good fingerprinting protection.

The downsides I see with Mullvad Browser:

  1. it makes a lot of automatic connections on startup (which Pale Moon does not (with some caveats));
  2. the choice of uBlock Origin and NoScript over the superior uMatrix is also a bit of a disappointment;
  3. it forces pointless DoH when the same privacy effect could be achieved for cheaper (resource wise) with just configuring your local resolver.

Sure, you could argue that these automatic connections are necessary and they are to trusted sites but you are still dealing with telemetry which should be disabled by default.

Nevertheless thank you for enlightening me. I will definetly now try out Mullvad Browser to replace Arkened Firefox.

[-] otter@lemmy.ca 4 points 1 day ago* (last edited 1 day ago)

The last time I did a comparison, it was much better about fingerprinting. The EFF has this test for example:

https://coveryourtracks.eff.org/

Personally I don't use it as my daily default browser, and I feel that I'd have to change the default privacy-focussed settings in order to do so. Rather I keep it installed/updated for if I need it someday

this post was submitted on 06 Sep 2025
28 points (100.0% liked)

Privacy

3740 readers
11 users here now

Welcome! This is a community for all those who are interested in protecting their privacy.

Rules

PS: Don't be a smartass and try to game the system, we'll know if you're breaking the rules when we see it!

  1. Be civil and no prejudice
  2. Don't promote big-tech software
  3. No apathy and defeatism for privacy (i.e. "They already have my data, why bother?")
  4. No reposting of news that was already posted
  5. No crypto, blockchain, NFTs
  6. No Xitter links (if absolutely necessary, use xcancel)

Related communities:

Some of these are only vaguely related, but great communities.

founded 10 months ago
MODERATORS