Bromite Browser

Bromite Browser

Web site: bromite.org
Category: Network
Subcategory: Web browsers
Platform: Android
License: GPL
Interface: GUI
Programing language: JavaScript, Go, HTML
First release: 2017
line

Bromite Browser – a Chromium fork with support for ad blocking and enhanced privacy. Bromite aims at providing a no-clutter browsing experience without privacy-invasive features and with the addition of a fast ad-blocking engine. Minimal UI changes are applied to help curbing the idea of “browser as an advertisement platform”.

Bromite is currently built for ARM, ARM64 and x86 and for the Android SDK versions 19 and 21; Bromite SystemWebView is provided as well (SDK21+). For every Bromite build you can always find a matching vanilla Chromium build which is used for example to verify which issues are specific to Bromite or not.

Features:
– customizable adblock filters via user-provided URL (see https://www.bromite.org/custom-filters)
– remove click-tracking and AMP from search results
– DNS-over-HTTPS support with any valid IETF DoH endpoint
– always-incognito mode
– disable all field trials permanently
– disable smart search by default, allow web search from incognito mode
– always-visible cookies, javascript and ads site settings
– remove Play integration binary blobs
– use CFI on all architectures except x86
– disable media router and remoting by default
– disable dynamic module loading
– show warnings for TLSv1.0/TLSv1.1 pages
– enable site-per-process isolation for all devices with memory > 1GB
– completely remove safe browsing and other privacy-unfriendly features
– proxy configuration page with PAC and custom proxy lists support
– settings to disable custom intents and clear session on exit
– flags to toggle anti-fingerprinting mitigations for canvas, audio, client rects, webGL and sensor APIs (see full list below for all the new flags)
– use frozen User-Agent to conceal real model and browser version
– privacy enhancement patches from Iridium, Inox patchset, Brave and ungoogled-chromium projects
– security enhancement patches from GrapheneOS project
– disable scroll-to-text-fragment
– reduced referer granularity
– block gateway attacks via websockets
– use 64-bit ABI for webview processes
– make all favicon requests on-demand (supercookie mitigation)
– enable all network isolation features
– ignore enterprise policies that disallow secure DNS
– ask permission to play protected media
– disable the DIAL repeating discovery

Leave a Comment

88 − = 78