Ah! Sorry, I forgot about that. I haven’t tested it with a browser that actually returns a trust score in a while. It doesn’t even bother to load that section of the page if too much data is obfuscated. So with TOR, Brave, and Librewolf I’m not seeing anything at all.
There’s a lot of people that have done write-ups on how to use the data.
You know what - it looks like the dev removed that entirely.
The trust score and a counter used to be in the top-left, first box under the hashes at the top. it would start a timer for 30 days and tell you how many visits you had during that time.
It was handy because you could change your VPN location and still ping as a second visit if using the same browser. Change a few more things and location again, and it would still ping as a visit. If you used Tor, it would show like 80 visits in the last 30 days.
It looks like they removed it last month some time. I hadn’t used it in a while and totally blanked about that being a thing. It doesn’t render if you just block JS entirely, so I just sort of forgot about it.
Weird. I’m glad you mentioned that. I’m curious where the old code is, might as well try and fork it for myself on another git.
I forked the Github repo and reverted to an older version and it looks like when he removed the API access 3 weeks ago, the trust score thing went away. The whole section of code is gone, and if you just revert to an older version it doesn’t work anymore.
To be fair, a lot of what he was working on was ways to scrape sites and not get dinged by Cloudflare, and over the last 3 years, things have changed quite a bit. We’ll just have to wait and see what happens I guess.
TB (the better browser for general browsing), MB (sometimes), LibreWolf (for more personal use), Brave (for tab sharing functionality specifically, on desktop; I want to use Cromite instead but had issues). On Android just Ironfox + TB
For logins and payments - Brave and FF + Arkenfox FPP.
Main Driver - Mullvad, FF + Arkenfox RFP (to watch videos) and Librewolf (fallback)
Fun fact - Installed Zen Browser set as default and blocked internet access while links are accidentally clicked in other apps.
Medium number of profiles to test various with fingerprinting sites and experimenting.
Android: Brave and Ironfox. Sometimes Cromite.
All browser data cleared on exit. Bookmarks management is tough so after sorting all bookmarks created a main folder which has sub folders with browser and OS name.
Search engine: Only DDG. Brave as fallback. Startpage DDG after hearing that the former uses more trackers. The post request in DDG is mediocre whereas startpage and searxng are robust and brave doesn’t have such feature. Idk last time when I used Google. I always perform searches after visiting search site.
desktop: librewolf (with some tweaks* to make daily driving comfier) for recreation; firefox (hardened) for work. automatic containers for “aggressive” services (eg: youtube).
phone: ironfox for everything (i don’t browse much on phone). browser diversity is more important than using some flavour of chromium.
vpn: always on. i hole-punch a few services on my desktop via iptables rules, and a few banking apps on my phone. dns is currently a bit of a mess; normally i use a local pihole instance, but currently using whatever dns the vpn provides. probably better off this way, but whatever. would prefer to use pihole if i can
search: startpage always. /shrug if this is the best option, but i like it
*librewolf tweaks:
extra addons: firefox multi-account containers (to manage automatic site → container); history cleaner (purge history >14 days on startup); noscript (currently creating a ruleset im tentatively calling the “minimum viable bullshit”, the most restrictive permissions i can get away with)
enabling dark mode: this is perhaps a controversial one, but for me i need dark mode. dark reader sucks balls. i do this by setting up a user.js for librewolf with:
addendum: mullvad browser seems interesting, but the fact that it’s named after & maintained by mullvad makes me not use it (mullvad has a good track record, but purely just because it minimises any impact if mullvad goes rogue, as unlikely as that my be). my goal is to exceed the requirements by my threat model while being as comfortable as i am otherwise.
i would love progressive onion-ing on librewolf, ie i could connect to *.onion and it’d automagically route through tor, and anything else stay put. i might play around with implementing this myself.
Just Firefox with the Arkenfox user.js, uBlock, and uMatrix. DDG for search. I don’t really see the point of profiles since the browser starts afresh after being closed and does not keep any history or cookies.
Brave on macOS and use Mullvad Leta for everyday browsing. Tor browser when a website blocks me because I’m in the US and it requires ID verification of my age. And Firefox with Phoenix modifications to use Meta services, mostly Facebook, because most of my family uses it to communicate, and the Facebook container features are a nice touch. Running Mullvad at the network level with killswitch turned on my UDM-Pro.
I’ve certainly been aggressively pruning my accounts, and my aliases have nearly been halved. This whole endeavor has easily spanned over a week. But it’s been quite straightforward, really, since I just copied a segment from CrabClear’s message..
"Hey
Request the deletion of all personal data you may possess about me, in accordance with applicable privacy laws including:
California Consumer Privacy Act (CCPA) Section 1798.105
Article 17 of the General Data Protection Regulation (GDPR)
Virginia Consumer Data Protection Act (VCDPA) § 59.1-577
Colorado Privacy Act (CPA) § 6-1-1308
Connecticut Data Privacy Act (CTDPA) Sec. 11
Other applicable state and international privacy legislation
Best regards
XXXXX"
Truth be told, no one has really presented any challenges.
I’m not the one you asked, but if you’re running Tor Browser under a strict, well-maintained AppArmor or SELinux profile (receiving updates) in enforcing mode, that does add meaningful containment. That would be my focus if I was you.
If I’m not mistaken, doesn’t this kind of defeat the purpose of Mullvad browser. I was under the impression that Mullvad should be used for only browsing because when you use it to sign into accounts, you’re no longer part of the “crowd” that Mullvad was designed to make you a part of.
My browser set up looks extremely different depending on the operating system.
If I’m on Windows I have no problem using Edge so long as I harden it first and this would be two profiles one for ephemeral usage with DuckDuckGo as a search and the having my bookmarks as the search engine other for purely non-personal logins.
I haven’t used the Linux in a while but if I was to go back since I would be dead set using on something fedora based anyway, Trivalent. i’d probably use it in a similar way to how I use chromium based browsers on my daily driver macOS.
on macOS since Safari actually has very decent fingerprinting protections I do use it frequently search engine is DuckDuckGo.. Unfortunately Webkit does not support every standard web technology and so there are moments where I am dealing with audio and there is more latency that’s when I have to fall back on something chromium based and for now I am using Brave. However I have been slowly eyeing the hardening chromium project and hoping for their script to eventually be compatible with macOS to just apply this to Chrome instead.
I also just use my bookmarks as the search engine within the logged in profiles and any ephemeral profile would use brave search
On Android since unfortunately you can’t really use flags in policies the same way I’m kind of left with two approaches either Google Chrome with JavaScript disabled by default amd all the telemetry or way more likely Brave. It’s not ideal but it’s better than nothing. Still feel kind of salty that Mulch browser was discontinued before the chance for content blocking to be implemented because I’ve been so curious to see how Vanadium implements things through the sub resource filter but unfortunately won’t ever have access to grapheneOS since my pixel is forever carrier locked
On iOS I’m kind of the opinion that multiple browsers on there is kind of a distraction. Brave is really cool to use as a YouTube client since there is no direct competitor to NewPipe on iOS. Microsoft Edge is also a good runner-up for this in case you care about stuff like sponsorblock (these methods also work on android if you can’t sideload) and Orion is pretty cool for trying to have chromium and Firefox extensions being compatible but I can’t think of a use case where this is needed particularly because there is no guarantee that it’s going to be functional anyway so it’s more of like a fun technical experiment. it’s at least worth a shot because ALOT of extensions on iOS are paid. Safari with duckduckgo and 4 profiles
Obviously I use either the builtin ad block or uBlock Origin lite along side all of these setups
That’s correct because the goal with Mullvad is to blend in with the other users who use Mullvad. Any changes you make just end up making you stick out from the crowd.