Skip to content

Latest commit

 

History

History
170 lines (125 loc) · 11.6 KB

File metadata and controls

170 lines (125 loc) · 11.6 KB

BubblesTheDev Web Browser

Browser Privacy Comparison

This document reflects the current privacy posture of BubblesTheDev Web Browser version 1.0.27.

The goal is accuracy, not marketing language. The browser does not implement first-party telemetry, analytics SDKs, cloud sync, a built-in silent auto-updater client, or automatic diagnostics upload. It does, however, make normal network requests when the user browses the web, uses built-in search features, uses supported site authentication flows such as passkeys, downloads files, or uses the optional managed updater flow.

High-Level Comparison

This table is intentionally high-level. Mainstream browsers change over time, but the Bubbles column below matches the current codebase.

Feature BubblesTheDev Web Browser Google Chrome Microsoft Edge Brave Firefox Safari Opera Vivaldi
First-party telemetry Not implemented Yes Yes Limited Limited Limited Limited Limited
Analytics SDKs in app code None Yes Yes Limited Limited Limited Limited Limited
Automatic diagnostics upload No Yes Yes Limited Limited Limited Limited Limited
Cloud sync requirement None Optional Optional Optional Optional Optional Optional Optional
Auto-updater service No built-in silent updater; optional owner-run managed updater for opted-in installs Present Present Present Present Present through OS updates Present Present
Local browser data storage Yes Yes Yes Yes Yes Yes Yes Yes
Local persistence protection Brotli-compressed, with OS-backed or credential-backed encryption when available Yes Yes Yes Yes Yes Yes Yes
Manual encrypted diagnostics export Yes Varies Varies Varies Varies Varies Varies Varies
Browser-data import from other browsers Yes, explicit user action and consent Yes Yes Yes Yes Yes Yes Yes
Per-site permission controls Yes Yes Yes Yes Yes Yes Yes Yes
Ad and tracker filtering built in Yes Limited Limited Yes Limited Yes Yes Yes
Private or incognito session mode Yes, separate incognito session handling Yes Yes Yes Yes Yes Yes Yes
Search-provider requests from built-in home/search page Yes, after user search on bubbles://home Yes Yes Yes Yes Yes Yes Yes
Passkey and WebAuthn compatibility Yes, through Chromium/Electron site support Yes Yes Yes Yes Yes Yes Yes
Browser VPN or VPN integration feature Local VPN manager, installed-client detection, and ProtonVPN WireGuard profile import Not documented as a built-in browser VPN feature Built-in Edge Secure Network VPN Built-in paid Brave Firewall + VPN Separate Mozilla VPN service and Firefox extension support Not documented as a built-in browser VPN feature Built-in Opera VPN Built-in Proton VPN integration
External-drive install-linked data tracking Yes Varies Varies Varies Varies Varies Varies Varies
Local-only music library scan Yes, explicit opt-in N/A N/A N/A N/A N/A N/A N/A

Additional notes for the new comparison columns:

  • Safari is shown with OS-managed updating because Safari updates are tied to Apple operating-system updates.
  • Opera is shown with optional sync and limited first-party data processing because Opera documents account-based sync and optional data sharing choices.
  • Vivaldi is shown with optional sync and limited first-party data processing because Vivaldi documents both optional encrypted sync and a browser privacy policy with limited browser-generated server messages.
  • Browser-data import from other browsers refers to browser features for importing bookmarks or related local browser data from another browser or exported file.
  • Private or incognito session mode refers to built-in private browsing modes intended to limit what is stored locally after the private session ends.
  • Browser VPN or VPN integration feature is intentionally broad. It includes built-in browser VPNs, first-party browser-integrated VPN partnerships, or local VPN-management features exposed by the browser itself.

Additional notes for the new comparison columns:

  • Safari is shown with OS-managed updating because Safari updates are tied to Apple operating-system updates.
  • Opera is shown with optional sync and limited first-party data processing because Opera documents account-based sync and optional data sharing choices.
  • Vivaldi is shown with optional sync and limited first-party data processing because Vivaldi documents both optional encrypted sync and a browser privacy policy with limited browser-generated server messages.

Local-First Behavior

BubblesTheDev Web Browser stores browser state in the Electron userData directory.

Current persisted data includes:

  • homepage setting
  • browsing history
  • bookmarks
  • bookmark-import consent choices at runtime
  • saved password metadata and encrypted password vault entries
  • imported Chromium extension metadata
  • imported ProtonVPN WireGuard profile metadata
  • toolbar visibility
  • bookmark bar visibility
  • selected shell theme
  • Music Player opt-in state and chosen folder
  • per-site permission settings
  • cached search results and suggestions
  • install-linked path metadata used for custom or external-drive installs and local update preferences

The persisted browser-state payload is compressed before it is written to disk. When Electron safe storage is available, that payload is also protected with OS-backed encryption. If that is unavailable, the runtime falls back to credential-backed AES-GCM protection when possible.

The application does not automatically upload this browser-state data.

Installer builds can optionally be configured with an owner-run update server. In that case, installs that use Automatic updates can send a minimal update-registration record containing install-management fields such as install ID, app version, install path, install root, install drive type, host name, platform, architecture, last-seen time, and the IP address seen by that server. They can also request the latest published release metadata and download the published installer package. The managed updater now rejects non-HTTPS release metadata or installer URLs and requires a valid published SHA-256 hash before the installer is launched. This does not include browsing history, bookmarks, saved passwords, or page contents.

If the browser is installed on an external drive instead of C:, install-linked data and path tracking can follow that selected external location instead of being treated only as a default system-drive install.

Diagnostics And Runtime Checks

Diagnostics are generated locally.

Current behavior:

  • runtime diagnostic entries are written to the local diagnostics directory
  • users can export an encrypted .bdiag diagnostics report manually
  • no automatic diagnostics upload path is implemented
  • the runtime checks panel surfaces local status for storage protection, enabled download-scan providers, ad-block counters, executable path, and performance state

This means diagnostic data stays on-device unless the user explicitly chooses to export it.

What Still Uses The Network

This browser is not offline-only. Network traffic still occurs when the user does one of the following:

  • opens websites or web apps
  • signs into websites
  • loads page assets such as images, scripts, fonts, and media
  • downloads files
  • uses external search engines directly
  • uses the bundled bubbles://home search experience
  • uses websites that request passkey or WebAuthn authentication through the platform browser flow

The internal Bubbles search page can contact DuckDuckGo and Google endpoints to assemble results, related searches, and suggestions after the user performs a search.

When the user downloads files, the browser may run trusted-source-aware download handling, local protection-provider checks, destination selection, and normal file save behavior. That is part of the local browser protection flow rather than a first-party analytics pipeline.

When the user signs in with a passkey on a supported site, the authentication flow is between the website, Chromium/Electron, and the operating system or authenticator. The browser does not add a separate first-party passkey cloud service.

Music Player Privacy Model

The Music Player is local-only.

  • It is disabled by default.
  • No folder scan starts until the user explicitly agrees in the Music Player UI.
  • It scans the default Music folder or another local folder the user selects.
  • Playback uses local files only.
  • The application does not upload the user's music library.

Security And Privacy Model

The browser uses Electron with Chromium sandboxing and process isolation while avoiding first-party telemetry frameworks and automatic background reporting.

Current characteristics:

  • sandboxed renderers and helper windows
  • contextIsolation enabled
  • nodeIntegration disabled in renderers
  • separate session handling for incognito windows
  • per-site permission prompts with allow, block, and ask-later behavior
  • ad and tracker request filtering with local counters
  • modular download protection using Windows Defender, Authenticode verification, and browser heuristics when available
  • trusted-source-aware download handling intended to reduce unnecessary friction while keeping local protection checks active
  • no automatic diagnostics upload
  • no first-party analytics pipeline
  • no cloud sync service
  • no built-in silent auto-updater service
  • optional owner-run managed updater only for installs that explicitly opt into Automatic updates
  • managed update installs require verified HTTPS release endpoints and SHA-256 installer validation
  • password save and reveal flows are restricted to secure contexts such as https: pages or local loopback development hosts
  • imported extensions are loaded without local file access and high-risk permissions trigger extra user warnings
  • Chromium and Electron secure-context behavior for supported passkey and WebAuthn site flows

Uninstall Privacy Model

Uninstall behavior is also local-first.

Current uninstall behavior:

  • the installed app files are removed
  • the user can choose which local data categories should be removed or kept
  • current removable categories include browser profile data, saved passwords, diagnostics reports, and local update preferences
  • if a category is left unchecked, that data remains on the device for a future reinstall or update
  • uninstall cleanup also removes stale uninstall metadata and re-checks leftovers before showing a warning
  • external-drive installs can keep install-linked data associated with the selected external location

Summary

BubblesTheDev Web Browser currently aims for a local-first privacy posture:

  • browser settings, history, bookmarks, permissions, search cache, and install-linked path metadata stay on-device
  • toolbar visibility, bookmark bar visibility, and the selected shell theme stay on-device
  • persisted state is compressed and protected locally
  • diagnostics stay local unless the user exports them
  • music library access requires explicit consent before any scan begins
  • bookmark import and VPN profile scanning require explicit user consent before local file access begins
  • password save and reveal behavior is limited to secure contexts instead of arbitrary insecure pages
  • supported passkey sign-ins rely on site and platform authenticator flows rather than a first-party Bubbles credential cloud
  • browsing and built-in search still create normal traffic to the websites and search providers the user chooses to use

Developed by BubblesTheDev