{"id":1703,"date":"2013-04-23T10:00:31","date_gmt":"2013-04-23T14:00:31","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=1703"},"modified":"2020-02-26T18:56:41","modified_gmt":"2020-02-26T14:56:41","slug":"alternative-browsers","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/alternative-browsers\/1703\/","title":{"rendered":"Alternative Browsers"},"content":{"rendered":"<p>At this point, Internet Explorer, <a href=\"https:\/\/me-en.kaspersky.com\/blog\/browser-security-google-chrome\/\" target=\"_blank\" rel=\"noopener\">Google Chrome<\/a>, Safari, and <a href=\"https:\/\/me-en.kaspersky.com\/blog\/browser-security-features-mozilla-firefox\/\" target=\"_blank\" rel=\"noopener\">Mozilla Firefox<\/a> are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions, and plugins and each has a highly customizable settings page that should meet the needs of almost any user. Unfortunately though, nothing comes free, and the big four browsers are, by design, mechanisms used by Microsoft, Google, Apple, and the Mozilla Corporation respectively to track their users online and sell their browsing data to the big data brokerage firms. Nearly any built-in feature that curbs tracking is turned off by default and must be actively sought out and implemented by privacy conscious users.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113847\/browsers_blog_title.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1709 aligncenter\" alt=\"browser blog title\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113847\/browsers_blog_title.jpg\" width=\"640\" height=\"420\"><\/a><\/p>\n<p>Fortunately, there is a wealth of alternative browsers available online, with new ones popping up so often that it borders on the overwhelming. Many of these browsers are built on the idea of revolutionizing the Internet browsing experience, but some are specially tailored to better guard user privacy and security and those are the ones in which we are interested.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113853\/zipzaplogo.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1704 alignleft\" alt=\"zipzap\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113853\/zipzaplogo.png\" width=\"210\" height=\"59\"><\/a>The <a href=\"http:\/\/zipzaphome.com\/zipzap\/cgi-bin\/zzdownload.cgi\" target=\"_blank\" rel=\"noopener nofollow\">ZipZap browser<\/a> makes our list because of the unique niche it attempts to fill as the family friendly browser. It may not offer, by default, the most secure or private browsing experience, but it does give parents the opportunity to exert some serious control over their kids\u2019 Web-surfing activities. With ZipZap, every member of the family gets his or her own browsing account, over which the primary admin (mom and\/or dad) can implement a number of controls, among them: the ability to establish pre-set filters that prohibit access to various categories of perhaps inappropriate or even just distracting online content, trusted friends with whom the kids are automatically allowed to connect and interact (when you want them to), and easily accessible age and gender appropriate targeted activity links.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113852\/comodo-browser.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1705 alignleft\" alt=\"comodo\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113852\/comodo-browser.png\" width=\"210\" height=\"95\"><\/a><\/p>\n<p>Best known for their work as a digital certificate* authority, or maybe for a March 2011 incident in which <a href=\"https:\/\/threatpost.com\/en_us\/blogs\/phony-ssl-certificates-issued-google-yahoo-skype-others-032311\" target=\"_blank\" rel=\"noopener nofollow\">hackers managed to compromise their certificate holdings<\/a>, <a href=\"http:\/\/www.comodo.com\/home\/browsers-toolbars\/browser.php\" target=\"_blank\" rel=\"noopener nofollow\">Comodo\u2019s Dragon Internet browser<\/a> bills itself as the security-conscious browser. Like ZipZap, Comodo Dragon is based on the source-code of Google\u2019s open-source Chromium browser. The Dragon browser claims privacy enhancements that go above and beyond those implemented by default in Chromium, including domain validation technology that prioritizes more trusted certificates over less trusted ones and prevents cookies and spyware and all other browser tracking.<\/p>\n<p><a href=\"http:\/\/dooble.sourceforge.net\/\" target=\"_blank\" rel=\"noopener nofollow\">Dooble is another self-proclaimed privacy-centric browser<\/a> available on Linux, Mac, and Windows machines. It offers its users an allegedly easy-to-use cookie management and expiration system, which can be customized to automatically delete cookies in \u201ca timely fashion.\u201d Dooble also encrypts the user information it retains and gives them more control over unwanted and potentially harmful third-party content.<\/p>\n<div class=\"pullquote\">The big four browsers \u2013 Microsoft, Google, Apple, and the Mozilla Corporation respectively track their users online and sell their browsing data to big data brokerage firms.<\/div>\n<p><a href=\"http:\/\/www.omnigroup.com\/products\/omniweb\/\" target=\"_blank\" rel=\"noopener nofollow\">OmniWeb is a Mac alternative<\/a> to Apple\u2019s Safari browser. It caught our attention because, in addition to the standard ad blocking, it lets users block any and all content coming from known ad servers. OmniWeb also lets users block content that requires Flash, which is nice because Adobe\u2019s Flash player is, like Java, one of those software platforms that is just constantly hindered by security problems.<\/p>\n<p>\u00a0<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113851\/camino.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1706 alignleft\" alt=\"camino\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113851\/camino.png\" width=\"181\" height=\"73\"><\/a><\/p>\n<p><a href=\"http:\/\/caminobrowser.org\/features\/\" target=\"_blank\" rel=\"noopener nofollow\">Camino<\/a> is another Safari browser-alternative, but its creators seem slightly more interested in its security features than OmniWeb\u2019s. The Camino browser offers the same default phishing and malware protection services built into Safari, Chrome, and Firefox. There is also an \u201cAnnoyance Blocking\u201d feature that blocks pop-ups and automatic Flash animations. Users that want Flash to run automatically on certain sites can seamlessly add an exception to allow Flash or even pop-ups on specified websites.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113850\/srware.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1707 alignleft\" alt=\"srware\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113850\/srware.png\" width=\"186\" height=\"102\"><\/a><\/p>\n<p><a href=\"http:\/\/www.srware.net\/en\/software_srware_iron.php\" target=\"_blank\" rel=\"noopener nofollow\">SRWare Iron<\/a> is another Chromium-based browser that touts itself as the Chrome browser without many of Google\u2019s privacy-violating features, like search suggestions, error reporting, URL tracking, and other features that require Google to track user behavior online. SRWare Iron contains a default ad blocker that is not enabled in the standard Chrome build.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113850\/duckduckgo.png\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1708 alignleft\" alt=\"duck duck go\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2013\/04\/05113850\/duckduckgo.png\" width=\"194\" height=\"160\"><\/a><\/p>\n<p>The alternative search engine,<a href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\" rel=\"noopener nofollow\"> DuckDuckGo<\/a>, is also worthy of mention. While it is not a full browser, it does offer solid search results without tracking user behavior and it does not deploy a filter bubble based on user browsing behavior. In other words, unlike Google\u2019s search where the same searches yield different results for different users, identical searches on DuckDuckGo will always yield the same results without user tracking bias.<\/p>\n<p>\u00a0<\/p>\n<p>*<i>Digital certificates are online signatures that go along with browsing traffic and downloads. The digital certificate system is based primarily on user-vendor trust and, very, very simply put, it exists as a means of ensuring that downloads are coming from who they claim to come from and outgoing traffic is going to where it is supposed to go.<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At this point, Internet Explorer, Google Chrome, Safari, and Mozilla Firefox are all modern, functional, and perfectly serviceable Web browsers. They each offer a robust set of interesting features, extensions,<\/p>\n","protected":false},"author":42,"featured_media":1710,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[134,75],"class_list":{"0":"post-1703","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-browser","9":"tag-browser-security"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/alternative-browsers\/1703\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/alternative-browsers\/1703\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/alternative-browsers\/1703\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/alternative-browsers\/1703\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/alternative-browsers\/1703\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/alternative-browsers\/688\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/alternative-browsers\/1703\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/alternative-browsers\/1703\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/browser\/","name":"browser"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/42"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1703"}],"version-history":[{"count":2,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1703\/revisions"}],"predecessor-version":[{"id":15517,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1703\/revisions\/15517"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/1710"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}