Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror
×
Software Chrome Firefox Internet Explorer Opera Safari Security The Internet

Ask Slashdot: Most Secure Browser In an Age of Surveillance? 391

An anonymous reader writes "With the discovery that the NSA may be gathering extensive amounts of data, and the evidence suggesting makers of some of the most popular browsers may be in on the action, I am more than a little wary of which web browser to use. Thus, I pose a question to the community: is there a 'most secure' browser in terms of avoiding personal data collection? Assuming we all know by know how to 'safely' browse the internet (don't click on that ad offering to free your computer of infections) what can the lay person do have a modicum of protection, or at least peace of mind?"
This discussion has been archived. No new comments can be posted.

Ask Slashdot: Most Secure Browser In an Age of Surveillance?

Comments Filter:
  • Well... (Score:5, Insightful)

    by Anonymous Coward on Sunday June 23, 2013 @02:24AM (#44083049)

    I'll be uncharacteristically calm here, and ask that someone provide this, "evidence suggesting makers of some of the most popular browsers may be in on the action."

    And in any case, let's be realistic. The NSA doesn't really need help from your browser if they're watching all your traffic. :p

  • by NewtonsLaw ( 409638 ) on Sunday June 23, 2013 @02:24AM (#44083051)

    Yes, but how do you know that MS hasn't inserted a nice big back-door for the spooks?

    From a "security" perspective, you'll have to go with an open-source browser -- but even that's not a guarantee.

    To be sure, you'll have to compile it yourself from a set of source files that you have gone through with a fine-toothed comb, checking each line for any chance of hidden functionality.

    Oh, come to think of it -- you'll also have to assemble all the libraries from similarly vetted sources -- oh, and that means you'll need to use a compiler you've built from vetted sources -- but hey, that would involve using another compiler that could already be compromised so...

    You'll have to hand-code (from source to binary) every bite of the compiler you use and then type it in through a BIOS that you've also hand coded -- entering the BIOS code through a set of toggle switches on the front panel.

    Bottom line -- you don't *know* for sure that *any* browser is going to be secure.

  • No such thing (Score:5, Insightful)

    by Anonymous Coward on Sunday June 23, 2013 @02:26AM (#44083059)

    Security should begin at the hardware level, the kernel should be inaccessible from a hardware perspective. The next best thing is a complete secure OS, so your options are limited to something like TAILS.

    https://tails.boum.org/

    I wouldn't say its 100% secure, its certainly not, but it does raise the bar a little and for them to use anything against you, they would need to admit to having the ability to break encryption. That's not going to happen. That said, always be careful as it will be used in other ways should it be required.

    Other than that, there is no such thing as "safe".

  • Lynx (Score:5, Insightful)

    by Anonymous Coward on Sunday June 23, 2013 @02:28AM (#44083067)

    Face it, who's going to bother writing anything to exploit flaws in lynx? It just isn't worth it.

  • Re:Lynx (Score:5, Insightful)

    by stox ( 131684 ) on Sunday June 23, 2013 @02:31AM (#44083079) Homepage

    Not only that, but it lacks the features to exploit. Which is actually an important point in security, to only have the features you need and nothing else. Less surface area to attack.

  • by kthreadd ( 1558445 ) on Sunday June 23, 2013 @02:32AM (#44083087)

    Well he is technically correct. IE is as of version 10 actually a good browser. The only problem is that it's only available on Windows and the source code is not available under an open source license. If both of these were false I then I wouldn't mind running it.

  • by smash ( 1351 ) on Sunday June 23, 2013 @02:35AM (#44083099) Homepage Journal
    ... the snooping is done on your ISP's backbone, and the browser you use makes little difference. Government level snooping is a whole different kettle of fish to bad companies stealing info from you via tracking cookies.
  • by Viking2054 ( 2919437 ) on Sunday June 23, 2013 @02:51AM (#44083163)

    Considering that the internet transmits your public IP address in every header you send across the internet and also contains the IP address of the destination, there is no way for you to hide what sites you visit without going through a proxy server. As far as I know, Header information in every packet is plain text and there is no way to encrypt that because if it was encrypted then no router would be able to forward your packets onto the next step in its final destination. So your browser, e-mail program, or anything else that sends and receives data through the internet is going to leave a trail for the government to potentially record. It may not lead back to you specifically, but it will lead to someone in your household or in your neighborhood that is using your wi-fi for internet access, provided you haven't locked down your wi-fi. If you have locked down your wi-fi then the government can claim it was only you, someone in your household or someone you have given your wi-fi password to, which significantly lowers their potential suspects or targets.

    If you send everything you do through a proxy server with a vpn connection to the proxy, then that has a very good chance of making you mostly anonymous. However, a warrant and the cooperation of the proxy service owner might make it possible for the government to still connect the dots back to you. Also, sending everything through a proxy server with all the non-routing information encrypted (via vpn) may actually lead to you being watched more closely then if you don't.

    If what you are really after is encryption of the contents of what you see and do on the internet, your best bet is probably still a VPN through a proxy server. Especially since SSL and some of the other methods for encrypting data between two end points on the internet aren't as secure as they were once thought to be. I don't know of anyone that has come up with a replacement for SSL that has been adopted by very many content providers. And even if the web browsers may have adopted some new security encryption scheme, it won't be effective until most if not all content providers also adopt and implement it.

  • by OzPeter ( 195038 ) on Sunday June 23, 2013 @02:57AM (#44083185)

    So you fix your browser .. are you also going to fix your ISP, whoever they buy their feed from etc etc until you get all the way to the actual web server? And how do you know to trust them?

    Or are you going to build your own internet ,. with hookers and blackjack?

  • None of them (Score:5, Insightful)

    by timmyf2371 ( 586051 ) on Sunday June 23, 2013 @03:10AM (#44083241)

    None of the browsers will protect you from surveillance.

    Work on the basis that your ISP is compromised and that the web services you use have shared their databases with Government agencies. When you consider this, changing your browser is going to have little to no impact.

    I think the only way you can really be secure from surveillance is to use the tor browser and only use web services which can't trace you. So, no Google, Apple, social networking or any of the cool stuff we take for granted these days.

  • by Anonymous Coward on Sunday June 23, 2013 @04:25AM (#44083433)

    It's best to leak as little info as possible, so Firefox + NoScript.

    What really should be done is making this Orwellian nightmare illegal. There is zero reason to wiretap EVERYBODY ALL THE TIME!

    Free speech is one of the most important principles of the USA. And no privacy means no free speech. This dystopia is unconstitutional.

  • by Bert64 ( 520050 ) <bert@[ ]shdot.fi ... m ['sla' in gap]> on Sunday June 23, 2013 @04:29AM (#44083455) Homepage

    That's what people said about IE5 & 6 at the time they were released and look how that turned out. Those who forget the lessons of history are doomed to repeat them.

  • by evilsofa ( 947078 ) on Sunday June 23, 2013 @04:54AM (#44083527)
    Doing what you prescribe will do the very thing that you are trying to avoid - get you on the NSA's list of people who are probably not American and must be up to something really interesting.

    http://yro.slashdot.org/story/13/06/21/1443204/use-tor-get-targeted-by-the-nsa [slashdot.org]
  • by Intrepid imaginaut ( 1970940 ) on Sunday June 23, 2013 @05:20AM (#44083589)

    Bingo, the tech community is doing it all wrong. Fight back through educating politicians and voters. Make the government work for you.

  • by smash ( 1351 ) on Sunday June 23, 2013 @05:41AM (#44083669) Homepage Journal
    When IE6 came out, it was competing with Netscape 4. I don't think i need to elaborate too much on that, those who were around back then can confirm how not great netscape 4 was.
  • by Grashnak ( 1003791 ) on Sunday June 23, 2013 @06:02AM (#44083745)

    I always love how people simultaneously believe that the NSA is so technically brilliant that it can collect and analyze every message sent by every random person on earth, but also so stupid that they name their secret backdoor key _NSAKEY.

  • by Bert64 ( 520050 ) <bert@[ ]shdot.fi ... m ['sla' in gap]> on Sunday June 23, 2013 @06:23AM (#44083817) Homepage

    Which is exactly the point, if enough people start using IE again that competition is effectively eliminated they will almost certainly cease development while encouraging the creation of ie-only websites to lock users in. This is called "bad faith".

    Having experienced this in the past, i have no desire to experience it again and thus won't use any version of IE wether it's a decent browser or not.

  • by benjymouse ( 756774 ) on Sunday June 23, 2013 @06:32AM (#44083867)

    Some of those AV companies are Chinese.

    Care to list out the name of the AV companies which are owned and/or operated by the CHINESE ??

    I am interested in factual information, not fear mongering !!

    The MAPP program is public. You can find the list of MAPP partners at Microsoft Security Response Center [microsoft.com]

    Huawei is there, as well as several Beijing companies.

    My emphasis on Chinese was tongue-in-cheek. They get a few days advantage to develop scanning signatures. Yes, some of them may go rogue or (more likely) some of the employees. I would think that is why they only get a few days head start and not several months.

  • Comment removed (Score:5, Insightful)

    by account_deleted ( 4530225 ) on Sunday June 23, 2013 @06:40AM (#44083897)
    Comment removed based on user account deletion
  • by StripedCow ( 776465 ) on Sunday June 23, 2013 @07:49AM (#44084103)

    You forgot that you also have to craft your own CPU.

    Ever wondered why CPU's didn't get any faster than 3.5 to 4 GHz?
    That's right, the NSA has since crammed in so many "features" that it became technically impossible to make them run any faster.

  • by ebno-10db ( 1459097 ) on Sunday June 23, 2013 @08:22AM (#44084211)

    You don't have to compile Firefox from source. If an open source product has an NSA backdoor, it only takes ONE user to bring down the entire product, or the Mozilla Foundation in the example, and shame them forever. This in itself is a guarantee.

    Assuming that it's clear that it's a backdoor, as opposed to something that appears to be an ordinary security bug.

  • regression (Score:4, Insightful)

    by __aaqvdr516 ( 975138 ) on Sunday June 23, 2013 @09:26AM (#44084435)

    Your "secure browser" can be compromised by the Operating System. The Operating System can be compromised by the hardware.

    The safest way to do your computing is to make all your own chips, assemble it yourself, and write your own OS. Even then you're subject to Man-in-the-Middle attacks, so you're going to have to go lay all your own fiber and do it all over again for those on the other side.

He has not acquired a fortune; the fortune has acquired him. -- Bion

Working...