The most secure, private browser ever made?

Discussion in 'other software & services' started by DoctorPC, Feb 19, 2014.

Thread Status:
Not open for further replies.
  1. DoctorPC

    DoctorPC Banned

    Joined:
    Jan 9, 2014
    Posts:
    813
    Seems like it... Let's see what this baby offers;

    1) Full time private browsing.
    2) Built in blocker for trackers/spyware/ads. (better than Ghostery+Admuncher so far)
    3) True private speed dial - only add things you WANT to add.
    4) Third Party, Flash, Java. HTLM5, Evercookie blocking.
    5) Sandboxed Tabs
    6) Browser Fingerprint Scrambling
    7) Installation, Error, and Update tracking removed.
    :cool: No DNS caching.
    9) FULL cleansing on closure of browser, including pepperdata and indexes.
    10) AUTOMATED Proxy for any search engine.
    11) Scrambled Referrer+Header Information.
    12) DNT on by default.
    13) IP scrambling with single click.

    My gosh, this may be the most secure, browser ever developed? All they are missing is encryption of bookmarks, and they tell me that's in the works.

    https://www.epicbrowser.com/#three
     
  2. Sordid

    Sordid Registered Member

    Joined:
    Oct 25, 2011
    Posts:
    235
    'Tis Chromium plus pre-installed addons which include code and function not directly related to security.
     
  3. TonyW

    TonyW Registered Member

    Joined:
    Oct 12, 2005
    Posts:
    2,741
    Location:
    UK
  4. DoctorPC

    DoctorPC Banned

    Joined:
    Jan 9, 2014
    Posts:
    813
    If you examine it, you will find it's not just preinstalled addons. For example removal of the InstallID, are changed via the code, more akin to SRWARE Iron if anything. The only pre-installed Addon is Adblock, and the FAQ clearly states this. Nevertheless, a DC based 'angel' funded project could be a honeypot.

    Either way, the idea, and implementation is pretty nice.
     
  5. Sordid

    Sordid Registered Member

    Joined:
    Oct 25, 2011
    Posts:
    235
    Chromium doesn't have an install ID.

    I was using addons (as in viewed from chrome://extensions/) as a generic term. They are likely layering pre-existing active scripts on work that is already 99% creditable to another dev team. The security of the browser is founded there.

    As a secure browser, I see it as strong Chromium code with bolt on un-vetted development

    "Either way, the idea, and implementation is pretty nice."

    Yes, a great idea. Turnkey private browser.
     
    Last edited: Feb 19, 2014
  6. bellgamin

    bellgamin Registered Member

    Joined:
    Aug 1, 2002
    Posts:
    8,102
    Location:
    Hawaii
    I'm giving it a try. Somehow it seems a nanosecond faster than Google Chrome. Uses a separate process for each Tab (as does Chrome) - uses lots of Ram, accordingly.

    Their forum is active, & seemingly has some representation by proponents.

    I didn't see anyone mention that Epic has a built in proxy. Click a red icon in the address bloc & it turns green, meaning you are using Epic's proxy. Click it again & it returns to red - no proxy active.

    Another Chrome clone is Slimjet. I'm giving it a try as well.

    (Now that I have my security apps pretty well nailed down, I've become a browser junkie.)
     
  7. TairikuOkami

    TairikuOkami Registered Member

    Joined:
    Oct 10, 2005
    Posts:
    3,418
    Location:
    Slovakia
    Yes, they try to hide very well, in Contact and in About, there is no address, just that it is based in US and India. I really do not like it. It seems fishy.
    Anyway as mentioned before, once the company is based in USA, it has to obey US laws, just like Microsoft was told to get emails from Ireland's server.
    So it is just Chromium with configurable addons like in Yandex browser?
     

    Attached Files:

    Last edited: Jun 25, 2014
  8. Veeshush

    Veeshush Registered Member

    Joined:
    Mar 16, 2014
    Posts:
    643
    https://www.ssllabs.com/ssltest/analyze.html?d=epicbrowser.com
    Experimental: This server is vulnerable to the OpenSSL CCS vulnerability (CVE-2014-0224) and exploitable. Grade set to F.

    That's always embarrassing. Anyway, I let them know via email. Could be a false positive.

    edit

    Don't get me wrong though, the more private browsers the better.
     
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.