Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

The best 8 secure browsers 2016
TechWorld ^ | 25 February 2016 | John E Dunn

Posted on 03/08/2016 6:10:51 PM PST by ShadowAce

click here to read article


Navigation: use the links below to view more comments.
first previous 1-2021-35 last
To: ShadowAce

Thank you for the very good options.

I use Safari for work and Epic for all other browsing. Options:

Epic. https://epicsearch.in/

Comodo. https://www.comodo.com/\

Cuil. http://cuil.pt/

Dogpile. http://www.dogpile.com/


21 posted on 03/08/2016 7:37:22 PM PST by Falconspeed ("Keep your fears to yourself, but share your courage with others." Robert Louis Stevenson (1850-94))
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

Thanks for the ping.


22 posted on 03/08/2016 8:06:20 PM PST by GOPJ (Republican elites have turned into " race-baiting bigots" - feeding on PC mob evils.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: ShadowAce

checkout later


23 posted on 03/08/2016 8:08:42 PM PST by plsjr (<>< Mankind "knows" by trial and error; Only the CREATOR really knows His creation.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

I’ve only tried the Comodo Dragon and the Maxthon. Both seemed to work fine.


24 posted on 03/08/2016 8:20:00 PM PST by smokingfrog ( sleep with one eye open (<o> ---)
[ Post Reply | Private Reply | To 1 | View Replies]

To: smokingfrog

And where does Safari stack up in this biased article?


25 posted on 03/08/2016 8:32:29 PM PST by aviator (Armored Pest Control)
[ Post Reply | Private Reply | To 24 | View Replies]

To: aviator

Why is it biased?


26 posted on 03/08/2016 8:47:49 PM PST by ShadowAce (Linux - The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 25 | View Replies]

To: ShadowAce

there’s a fella online on youtube that talks about TOR and how it actually sends up red flags to the f bi when they see it beign used- and they can break into it and know who’s using it-

There is no security online-


27 posted on 03/08/2016 9:09:55 PM PST by Bob434
[ Post Reply | Private Reply | To 1 | View Replies]

To: nickcarraway

[[I thought the NSA likes people to use Tor.]]

they do- people think it’s veiling their identity, but it doesn’t- it’s just like a big red sign that says’ ‘hey, I’m trying to evade detection’


28 posted on 03/08/2016 9:12:05 PM PST by Bob434
[ Post Reply | Private Reply | To 11 | View Replies]

To: ShadowAce

BFL


29 posted on 03/08/2016 9:25:27 PM PST by super7man (Madam Defarge, knitting , knitting, always knitting.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bfl


30 posted on 03/08/2016 9:31:33 PM PST by Kush (Insert your own witty, patriotic, or sarcastic remark here.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Bob434
there’s a fella online on youtube that talks about TOR and how it actually sends up red flags to the f bi when they see it beign used- and they can break into it and know who’s using it-

Part of your problem is that you believe everything you read/see online.

The use of TOR is NOT a red flag. If, however, your IP address pops up on a TOR egress point for a kiddie porn site or some al Qaeda affiliate, THEN you might get a call.

TOR was developed by the government for secure communications, and it's an excellent tool. A majority of web traffic is filtered through fewer than a dozen sites (e.g. Google, Facebook, Twitter). Seeing the Internet in all of its glory, warts and all, is what TOR does for an average user.

The way I like to tell the story is that there are 65535 TCP/UDP ports available on every computer in the world. The grand majority of traffic is on ports under 1000. Anything over 1000 is generally used for port randomization in domain/enterprise environments. MOST of the world's Internet traffic travels over ports 80 (HTTP) and 443 (HTTPS). There are literally thousands of other protocols in use (e.g. NNTP, XMPP, IRC, FTP) still very much in use around the world. To think that the Internet you all know through your web browser is the extent of it is foolish.

31 posted on 03/09/2016 4:53:31 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 27 | View Replies]

To: ShadowAce

BFL


32 posted on 03/09/2016 5:05:29 AM PST by antidisestablishment (If Washington was judged with the same standard as Sodom, it would not exist.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ShadowAce

bkmk


33 posted on 03/09/2016 6:18:10 AM PST by AllAmericanGirl44
[ Post Reply | Private Reply | To 1 | View Replies]

To: rarestia

[[THEN you might get a call.]]

So basically you are saying it is a red flag tool- The fella explained it very well on youtube- you can check it out yourself if you wish- Tor is designed to flag users who are trying to hide their identity- while it may be a fine tool for other purposes, it’s also used to determine if folks are trying to evade detection


34 posted on 03/09/2016 8:51:45 AM PST by Bob434
[ Post Reply | Private Reply | To 31 | View Replies]

To: Bob434

Problem with that statement is that your identity isn’t hidden, per se. It’s a way to mask your habits, no completely obscure your identity. All it takes is compromising an endpoint, and everything you’re doing is easy to track.

If you want anonymity, use VPN.


35 posted on 03/09/2016 9:36:37 AM PST by rarestia (It's time to water the Tree of Liberty.)
[ Post Reply | Private Reply | To 34 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-35 last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson