{"id":24638,"date":"2025-09-11T19:04:35","date_gmt":"2025-09-11T15:04:35","guid":{"rendered":"https:\/\/me-en.kaspersky.com\/blog\/?p=24638"},"modified":"2025-09-11T19:04:35","modified_gmt":"2025-09-11T15:04:35","slug":"ai-browser-security-privacy-risks","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/24638\/","title":{"rendered":"The pros and cons of AI-powered browsers"},"content":{"rendered":"<p>Whether superintelligent AI arrives by 2027 is anyone\u2019s guess. However, the forecast for 2026 is already clear: the year will be defined by easily accessible AI agents\u00a0\u2014 large multimodal models capable of building and executing a chain of actions based on user commands. Agentic features are already available on the ChatGPT website and from other providers, but achieving maximum performance requires these agents to execute actions directly on the user\u2019s computer rather than in the cloud. The ideal solution would probably be an AI-powered OS, but creating a new operating system is a challenge. Because of this, all minds are focused on a user-friendly and effective alternative: the AI browser. And by that we mean a regular web-browsing application with a deeply integrated LLM. The AI model can view all open web pages, process information from them, and issue the same commands a user typically would, such as opening, clicking, entering data, saving, and downloading.<\/p>\n<p>The market leaders all see the value of this solution. For instance, Perplexity has <a href=\"https:\/\/www.pcmag.com\/opinions\/i-switched-to-perplexitys-ai-comet-browser-for-a-week-is-it-the-future\" target=\"_blank\" rel=\"nofollow noopener\">released its own Comet Browser<\/a> and recently made a <a href=\"https:\/\/www.cnbc.com\/2025\/08\/12\/perplexity-google-chrome-ai.html\" target=\"_blank\" rel=\"nofollow noopener\">multi-billion-dollar bid<\/a> to buy Chrome, while OpenAI has <a href=\"https:\/\/www.reuters.com\/business\/media-telecom\/openai-release-web-browser-challenge-google-chrome-2025-07-09\/\" target=\"_blank\" rel=\"nofollow noopener\">started developing its own browser<\/a>. Google and Microsoft are in a better position, integrating Gemini and Copilot into their existing Chrome and Edge browsers, respectively. Meanwhile, Mozilla is approaching the same goal from a different angle: <a href=\"https:\/\/blog.mozilla.org\/en\/firefox\/firefox-ai\/ai-browser-features\/\" target=\"_blank\" rel=\"nofollow noopener\">gradually integrating AI features<\/a> deeply into its Firefox browser.<\/p>\n<p>As a result, you\u2019re already seeing ads encouraging you to \u201cupgrade your browser\u201d by either downloading the latest version, or activating \u201csmart features\u201d in your current one. Next year, they\u2019ll be wall to wall. The only thing left to decide will be why you need all this, and whether the benefits are worth the emerging risks.<\/p>\n<h2>Why you might need an AI browser<\/h2>\n<p>An AI assistant perfectly integrated into your browser can free you from many tedious tasks. With the press of a button, you can get a quick summary of a long article or a two-hour video; or instead of reading a lengthy document, you can ask a question about its content. All of this happens quickly and naturally, without the need to copy and paste links or text into a chatbot tab.<\/p>\n<p>But the real breakthrough will come with agentic features: the ability to perform specific actions rather than just process data. For example, you could open your favorite marketplace and tell the assistant to add everything you need for a three-day backpacking trip in August to your cart.<\/p>\n<p>Unlike similar features already available on AI provider websites, this agentic activity takes place directly on your computer. Online services recognize you since you\u2019re already logged in, and operations occur much faster than they would on a cloud virtual machine \u2014 though better results aren\u2019t guaranteed.<\/p>\n<p>Information retrieval features can also provide more relevant results in an AI browser running on your device because bots like ChatGPT, Claude, and Perplexity are blocked from many websites. This prevents LLMs from considering many up-to-date sources in their answers. With these features running from within the browser, the problem will be significantly alleviated as the AI assistant will access websites on your behalf. Additionally, if you\u2019re subscribed to any restricted data sources, such as scientific journals or stock market reports, the AI agent will be able to use them as needed.<\/p>\n<h2>Why AI companies need such a browser<\/h2>\n<p>Some AI solution providers\u2019 motivations they state themselves, while others require educated guesses based on the business models of Big Tech.<\/p>\n<p><strong>Billions of users.<\/strong> Successful entry into the browser market is a ticket to the largest possible user base. Sure, acquiring Chrome, or at least Firefox, would be ideal, but failing that, tech players can always push their own browser high up the popularity ladder.<\/p>\n<p><strong>\u201cStickiness\u201d.<\/strong> A service that\u2019s built directly into the browser will see more frequent use because it\u2019s always within easy reach. Besides, it\u2019s harder to switch from a familiar browser: it takes significant effort to migrate bookmarks and extensions to another browser and set it up. This is way more than simply closing one chat tab and opening another.<\/p>\n<p><strong>More information.<\/strong> If there are many users, and they access the service frequently, they feed the AI provider more information, allowing new versions of language models to be trained faster, helping to improve the product. A browser has access to all user web traffic, so training can be done on any website data \u2014 not just on conversations with the model.<\/p>\n<p><strong>New training methods.<\/strong> The provider gains a gold mine of behavioral data. Currently, AI agents work by looking at web pages and figuring out what button to press. This is similar to how humans think out loud: it\u2019s a slow and not very efficient process. Training on mouse movements and clicks will allow for a completely new layer in the model, resembling motor memory which, just like in humans, will be faster and more efficient.<\/p>\n<p>Sufficiently bold providers could even utilize user files on the computer for training. Newer versions of Facebook are already <a href=\"https:\/\/www.theverge.com\/meta\/694685\/meta-ai-camera-roll\" target=\"_blank\" rel=\"nofollow noopener\">doing something similar<\/a> by sending unpublished photos from the user\u2019s phone gallery to the cloud.<\/p>\n<p><strong>Lower costs.<\/strong> AI providers\u2019 enormous server costs would decrease because some of the work would be done directly on the user\u2019s computer instead of on a virtual machine in the cloud.<\/p>\n<p><strong>Bypassing blocks and paywalls.<\/strong> AI model training is already facing a shortage of new information, with the problem exacerbated by many websites blocking access to AI agents. Cloudflare, which protects one in five websites, including the vast majority of larger ones, has <a href=\"https:\/\/www.cloudflare.com\/press-releases\/2025\/cloudflare-just-changed-how-ai-crawlers-scrape-the-internet-at-large\/\" target=\"_blank\" rel=\"nofollow noopener\">enabled this policy by default<\/a>. Sending data requests from the user\u2019s computer addresses these challenges: the AI agent\u2019s activity is indistinguishable from the computer owner\u2019s.<\/p>\n<p>A distributed network of browsers makes it possible to access websites for things like model training, without running into restrictions. In principle, this also allows downloading publicly unavailable data, such as articles in subscription-based journals.<\/p>\n<h2>Impact on privacy and confidentiality<\/h2>\n<p>All of this means that an AI browser creates significant, poorly controlled threats to your privacy. AI companies get access to all of your traffic, your entire web history, the full content of those websites, and all the files on your computer.<\/p>\n<p>As a result, you might unintentionally feed deeply personal or restricted data \u2014 like books you purchased, or unpublished scientific papers \u2014 into a publicly available AI system. You could also accidentally leak highly confidential information from work websites, such as draft financial reports, in-progress designs, or other trade secrets.<\/p>\n<p>This isn\u2019t some sci-fi scenario: in 2023, ChatGPT <a href=\"https:\/\/www.tomsguide.com\/news\/chatgpt-bug-reveals-chat-histories-to-other-users-what-you-need-to-know\" target=\"_blank\" rel=\"nofollow noopener\">mistakenly revealed snippets of users\u2019 chats<\/a>, and the \u201cshare chat\u201d feature \u2014 available to ChatGPT users until July 31, 2025 \u2014 resulted in <a href=\"https:\/\/techcrunch.com\/2025\/07\/31\/your-public-chatgpt-queries-are-getting-indexed-by-google-and-other-search-engines\/\" target=\"_blank\" rel=\"nofollow noopener\">tens of thousands of user conversations being indexed by search engines<\/a> and made available to anyone.<\/p>\n<h2>What makes AI-powered browsers a security risk<\/h2>\n<p>Incidents involving AI applications are becoming commonplace, and paint a worrying picture.<\/p>\n<p>In a <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/promptfix-attacks-supercharge\/\" target=\"_blank\" rel=\"nofollow noopener\">recent experiment<\/a>, researchers successfully tricked an AI agent within the Comet browser into downloading malware onto its owner\u2019s computer. They did this by sending a fake email to the victim\u2019s account, which the agent could access, stating falsely that it contained blood test results. To download them, the user had to click a link and complete a CAPTCHA. When the AI agent tried to download the results and encountered a CAPTCHA, it was prompted to complete a special task, which the agent \u201csuccessfully\u201d handled by downloading a malicious file.<\/p>\n<p>In another experiment by the same team, an AI assistant was persuaded to buy products from a scam site. Considering that passwords and payment information are often saved in browsers, deceiving an AI agent could lead to real financial losses.<\/p>\n<p>The researchers noted that AI is highly susceptible to social engineering, and tried-and-true human deception tricks work well on it. While the tests were conducted in the Comet browser, the same thing would happen in any browser with AI agent capabilities.<\/p>\n<p>Another risk is that a browser is a fully featured application with broad access to files on the computer. By obeying a <a href=\"https:\/\/www.kaspersky.com\/blog\/chatgpt-jaibrakes\/48216\/\" target=\"_blank\" rel=\"noopener nofollow\">prompt injection<\/a> on a malicious site, a browser assistant can delete the user\u2019s files, or upload them to fraudulent websites without permission. A recent example involving the <a href=\"https:\/\/www.kaspersky.com\/blog\/nx-build-s1ngularity-supply-chain-attack\/54223\/\" target=\"_blank\" rel=\"noopener nofollow\">hack of the Nx application<\/a> demonstrated this: the malicious code didn\u2019t search for crypto wallets or passwords on infected developers\u2019 computers itself; instead, it simply instructed previously installed AI assistants to find the files it needed.<\/p>\n<p>A third, still hypothetical, risk is related to the fact that more and more countries are passing laws against accessing illegal information online. The list of what\u2019s forbidden differs from country to country, from child sexual abuse and terrorism to unlicensed books and cryptographic technology. If some players in the AI browser market decide to use their browser as a crawler (search bot) to train new LLMs, or if an AI agent is attacked with a prompt injection, the AI assistant could start searching for such information without the user\u2019s request. How the user would prove that it was the AI looking for the data is an open question.<\/p>\n<p>We also shouldn\u2019t forget about traditional software vulnerabilities. <a href=\"https:\/\/issues.chromium.org\/issues?q=type:vulnerability%20status:fixed%20\" target=\"_blank\" rel=\"nofollow noopener\">Hundreds of dangerous defects<\/a> are found in browsers every year because browser security is a complex engineering task. Even with the Chromium team doing the lion\u2019s share of the work, there\u2019s still plenty for wrapper developers to do. Will enough attention be paid to testing and fixing vulnerabilities in AI-powered browsers? It\u2019s not a given.<\/p>\n<p>Finally, sloppy implementation of AI features can lead to excessive memory and CPU consumption, as <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/artificial-intelligence\/new-local-ai-integration-into-firefox-spurs-complaints-of-cpu-going-nuts-chip-and-power-spikes-plague-new-version-141-x\" target=\"_blank\" rel=\"nofollow noopener\">demonstrated by the recent release of Firefox 141<\/a>. While this doesn\u2019t directly threaten security, the lags and glitches annoy users and increase the chance of human error.<\/p>\n<h2>What makes for an ideal AI browser<\/h2>\n<p>To enjoy the benefits of AI without creating unnecessary risks, you should choose a browser that:<\/p>\n<ul>\n<li>Allows you to enable and disable AI processing with a single click for individual sites and groups of sites, while isolating AI models and their conversation context between different sites.<\/li>\n<li>Guarantees that the AI only downloads and sends information based on specific user requests.<\/li>\n<li>Lets you choose the AI model, including a fully local one.<\/li>\n<li>Performs self-checks, and isn\u2019t afraid to double-check with the user in questionable situations.<\/li>\n<li>Asks for confirmation before entering sensitive data or making purchases.<\/li>\n<li>Has built-in, OS-level restrictions on access to files and data.<\/li>\n<\/ul>\n<p>No such browser with these specific features currently exists on the market. Also, all of these measures won\u2019t suffice to protect you from phishing and scam sites and the risks associated with landing on them. So, in addition to a smart browser, it\u2019ll be even more imperative to have an external system in place to deliver <a href=\"https:\/\/me-en.kaspersky.com\/premium?icid=me-en_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kprem___\" target=\"_blank\" rel=\"noopener\">full-fledged protection of your computer and smartphone from cyberthreats<\/a>.<\/p>\n<blockquote><p>Read about other AI-related risks:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/recall-2025-risks-benefits\/53407\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Should you disable Microsoft Recall in 2025?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-disable-gemini-on-android\/53771\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Is a Gemini AI update about to kill privacy on your Android device?<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/trojans-disguised-as-deepseek-grok-clients\/53116\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Trojans masquerading as DeepSeek and Grok clients<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/what-are-android-safetycore-and-key-verifier\/53171\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Google forcing Android System SafetyCore on users to scan for nudes<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/blog\/shadow-ai-3-policies\/54252\/\" target=\"_blank\" rel=\"noopener nofollow\"><strong>Three approaches to workplace \u201cshadow AI\u201d from the cybersecurity standpoint<\/strong><\/a><\/li>\n<\/ul>\n<\/blockquote>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"premium-geek\">\n","protected":false},"excerpt":{"rendered":"<p>A race between tech giants is unfolding before our very eyes. Who&#8217;ll be the first to transform the browser into an AI assistant app? As you test these new products, be sure to consider their enormous impact on security and privacy.<\/p>\n","protected":false},"author":2722,"featured_media":24639,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9],"tags":[1481,1636,16,21,22,2822,135,43,97,321,131],"class_list":{"0":"post-24638","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-ai","9":"tag-browsers","10":"tag-chrome","11":"tag-firefox","12":"tag-google","13":"tag-llm","14":"tag-mozilla","15":"tag-privacy","16":"tag-security-2","17":"tag-technology","18":"tag-tips-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/24638\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/ai-browser-security-privacy-risks\/29538\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/12804\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ai-browser-security-privacy-risks\/29465\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/28582\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ai-browser-security-privacy-risks\/31416\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ai-browser-security-privacy-risks\/30077\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ai-browser-security-privacy-risks\/40476\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ai-browser-security-privacy-risks\/13779\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ai-browser-security-privacy-risks\/54303\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ai-browser-security-privacy-risks\/23177\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ai-browser-security-privacy-risks\/32677\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ai-browser-security-privacy-risks\/29649\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ai-browser-security-privacy-risks\/35393\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ai-browser-security-privacy-risks\/35021\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/ai\/","name":"AI"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24638","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2722"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=24638"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24638\/revisions"}],"predecessor-version":[{"id":24641,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/24638\/revisions\/24641"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/24639"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=24638"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=24638"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=24638"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}