

Developers of metaverse experiences, for instance, may want to opt for the Firefox Reality browser to navigate the web using a VR headset.įinally, although all of these browsers make bold claims about their credentials for security and privacy, you’ll need to make sure that the one you choose is compliant with your company’s IT policies. There are, of course, some other more niche use cases to bear in mind, depending on your line of work.


Have you used a specific browser extension in the past that you know you can’t live without? Again, a compatibility check is highly important - though with the more mainstream browsers in this guide most of the best and widely used extensions, for example, have supported versions. Does your organisation use bespoke web apps that are only compatible in a few browsers? That plays a significant role in the decision. The first and perhaps most obvious thing to understand before picking a browser is what you need it to do. There’s also the time it will take to become familiar with the user interface - until it feels second nature the web experience won’t be a truly pleasing one. Some browsers have tools that enable the seamless transferring of bookmarks, but otherwise it can be a long and tedious process. Last but not least, we analyze the security of the four most important Chromium-based browsers: Brave, Chrome, Microsoft Edge, and Opera, concluding that all of them suffer from the same security pitfall.The difficulty is that there are so many to choose from and picking your browser can seem like a daunting decision - one that will be laborious to reverse down the line. This paper demonstrates that it is possible to perform browser hijacking, browser extension fingerprinting, and remote code execution attacks as well as silent browser extensions (un)installation by coding a platform-independent proof-of-concept changeware that exploits the HMAC, allowing for free modification of the Secure Preferences file. Concretely, Google introduced a security mechanism based on a cryptographic algorithm named Hash-based Message Authentication Code (HMAC) to avoid users and applications other than the browser modifying the Secure Preferences file. This capability was as simple as adding/removing some lines from a plain text file called Secure Preferences file automatically created by Chromium the first time it was launched. Google disabled years ago the possibility to freely modify some internal configuration parameters, so options like silently (un)install browser extensions, changing the home page or the search engine were banned.
