When you visit a website, you can be identified and tracked through your IP address, third-party cookies, all kinds of tracking scripts, and through so called browser fingerprints. That's why masking your IP address is not enough to stop the data collection. However, by using a trustworthy VPN in combination with a privacy-focused browser, you can put up a better resistance against the mass surveillance of today. That's why we partnered with the Tor Project to develop Mullvad Browser – a browser designed to minimize tracking and fingerprints.

A VPN is not enough. This is why you need a privacy-focused browser.

Big tech, authorities, and data brokers can use your IP address, cookies, scripts, and browser fingerprints to identify and track you online. Learn more about your unwanted followers and why you need a privacy-focused browser to stop them.

A Tor-developed browser. To run with a VPN instead of the Tor Network.

Using a VPN alone is not enough to achieve perfect privacy. There's simply too much data being extracted through most browsers. So, Mullvad reached out to the experts on privacy-focused browsers: the Tor Project. Learn about the idea behind the collaboration.

Your browser in itself can be a privacy problem. Things to look for when choosing a browser.

Some browsers are made to map your internet behavior. That's their business model. Others just don't have enough privacy protection. These are the questions you should ask yourself (or even better, the browser provider) before you choose a browser.

Your browser can be used to uniquely identify you. Get to know browser fingerprinting.

When you visit a webpage, most browsers give away information about your software and device. Combining this information with your other browser data makes it possible to create a user profile that can identify you.

No telemetry.

Telemetry is unique data being collected by the browser to improve its performance. We don't believe in collecting data about our users. So, with the Mullvad Browser we have removed all telemetry.

Private browsing by default.

The Mullvad Browser has private mode enabled by default. This means no cookies, cache and history are saved between your sessions. The browser also includes a reset button that creates a clean session in one click.

Blocking third-party trackers with uBlock Origin.

Even with strong protection against fingerprinting and cookies, it's a good idea to block third-party trackers. You don't want to use 'too many' extensions as it could be the one thing that identifies you. That's why we only use uBlock Origin.

Transparent business model.

We have no intention in earning money from the Mullvad Browser. Our business model is to earn money from our VPN service. Our only ambition with the Mullvad Browser is to provide the best privacy-focused browser possible to Mullvad's VPN users – and to everyone else, for that matter.

Privacy first.

Mullvad VPN has a proven record of putting privacy first. With no strange business models or short-term venture capitalist owners. The Tor Project is a non-profit organization fighting for human rights. We will always put privacy first, in everything we do.

What's New

All Platforms

  • Updated Firefox to 128.6.0esr
  • Updated NoScript to 12.1.1
  • Updated uBlock Origin to 1.61.2
  • Bug 359: Remove 13.5 mullvad-browser fluent files from translation [mullvad-browser]
  • Bug 388: Rebase Mullvad Browser stable onto Firefox 128.6.0esr [mullvad-browser]
  • Bug 42125: lock RFP part 2 [tor-browser]
  • Bug 43176: noscript-marker CSP warnings in the console [tor-browser]
  • Bug 43269: NoScript localization issue [tor-browser]
  • Bug 43282: Unable to click/tap/select anything adjacent the WebGL placeholders [tor-browser]
  • Bug 43296: NoScript-blocked video content placeholder is not centered [tor-browser]
  • Bug 43338: Custom zoom + "Zoom text only" breaks pdfjs [tor-browser]
  • Bug 43352: Failing connection attempts to multicast IPv6 ff00:::443 logged during NoScript updates [tor-browser]
  • Bug 43366: Do not use system accent color in inputs [tor-browser]
  • Bug 43384: Backport security fixes from Firefox 134 [tor-browser]

Linux

  • Bug 41311: AppArmor profile fails on Debian stable [tor-browser-build]
  • Bug 41313: Show waiting cursor while app opens [tor-browser-build]

Build System

All Platforms

  • Bug 41321: Update PieroV's expired keys [tor-browser-build]
  • Bug 41340: Update kick_devmole_build script with Mullvad's new GitHub workflow endpoint [tor-browser-build]

macOS

  • Bug 41325: Newer versions of 7z fail to extract our dmg files because of the /Applications symlink [tor-browser-build]
  • Bug 41327: Print more logs when make_full_update.sh failed to generate mar file in dmg2mar [tor-browser-build]