This document reflects the current privacy posture of BubblesTheDev Web Browser version 1.0.27.
The goal is accuracy, not marketing language. The browser does not implement first-party telemetry, analytics SDKs, cloud sync, a built-in silent auto-updater client, or automatic diagnostics upload. It does, however, make normal network requests when the user browses the web, uses built-in search features, uses supported site authentication flows such as passkeys, downloads files, or uses the optional managed updater flow.
This table is intentionally high-level. Mainstream browsers change over time, but the Bubbles column below matches the current codebase.
| Feature | BubblesTheDev Web Browser | Google Chrome | Microsoft Edge | Brave | Firefox | Safari | Opera | Vivaldi |
|---|---|---|---|---|---|---|---|---|
| First-party telemetry | Not implemented | Yes | Yes | Limited | Limited | Limited | Limited | Limited |
| Analytics SDKs in app code | None | Yes | Yes | Limited | Limited | Limited | Limited | Limited |
| Automatic diagnostics upload | No | Yes | Yes | Limited | Limited | Limited | Limited | Limited |
| Cloud sync requirement | None | Optional | Optional | Optional | Optional | Optional | Optional | Optional |
| Auto-updater service | No built-in silent updater; optional owner-run managed updater for opted-in installs | Present | Present | Present | Present | Present through OS updates | Present | Present |
| Local browser data storage | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Local persistence protection | Brotli-compressed, with OS-backed or credential-backed encryption when available | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Manual encrypted diagnostics export | Yes | Varies | Varies | Varies | Varies | Varies | Varies | Varies |
| Browser-data import from other browsers | Yes, explicit user action and consent | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Per-site permission controls | Yes | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Ad and tracker filtering built in | Yes | Limited | Limited | Yes | Limited | Yes | Yes | Yes |
| Private or incognito session mode | Yes, separate incognito session handling | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Search-provider requests from built-in home/search page | Yes, after user search on bubbles://home |
Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Passkey and WebAuthn compatibility | Yes, through Chromium/Electron site support | Yes | Yes | Yes | Yes | Yes | Yes | Yes |
| Browser VPN or VPN integration feature | Local VPN manager, installed-client detection, and ProtonVPN WireGuard profile import | Not documented as a built-in browser VPN feature | Built-in Edge Secure Network VPN | Built-in paid Brave Firewall + VPN | Separate Mozilla VPN service and Firefox extension support | Not documented as a built-in browser VPN feature | Built-in Opera VPN | Built-in Proton VPN integration |
| External-drive install-linked data tracking | Yes | Varies | Varies | Varies | Varies | Varies | Varies | Varies |
| Local-only music library scan | Yes, explicit opt-in | N/A | N/A | N/A | N/A | N/A | N/A | N/A |
Additional notes for the new comparison columns:
Safariis shown with OS-managed updating because Safari updates are tied to Apple operating-system updates.Operais shown with optional sync and limited first-party data processing because Opera documents account-based sync and optional data sharing choices.Vivaldiis shown with optional sync and limited first-party data processing because Vivaldi documents both optional encrypted sync and a browser privacy policy with limited browser-generated server messages.Browser-data import from other browsersrefers to browser features for importing bookmarks or related local browser data from another browser or exported file.Private or incognito session moderefers to built-in private browsing modes intended to limit what is stored locally after the private session ends.Browser VPN or VPN integration featureis intentionally broad. It includes built-in browser VPNs, first-party browser-integrated VPN partnerships, or local VPN-management features exposed by the browser itself.
Additional notes for the new comparison columns:
Safariis shown with OS-managed updating because Safari updates are tied to Apple operating-system updates.Operais shown with optional sync and limited first-party data processing because Opera documents account-based sync and optional data sharing choices.Vivaldiis shown with optional sync and limited first-party data processing because Vivaldi documents both optional encrypted sync and a browser privacy policy with limited browser-generated server messages.
BubblesTheDev Web Browser stores browser state in the Electron userData directory.
Current persisted data includes:
- homepage setting
- browsing history
- bookmarks
- bookmark-import consent choices at runtime
- saved password metadata and encrypted password vault entries
- imported Chromium extension metadata
- imported ProtonVPN WireGuard profile metadata
- toolbar visibility
- bookmark bar visibility
- selected shell theme
- Music Player opt-in state and chosen folder
- per-site permission settings
- cached search results and suggestions
- install-linked path metadata used for custom or external-drive installs and local update preferences
The persisted browser-state payload is compressed before it is written to disk. When Electron safe storage is available, that payload is also protected with OS-backed encryption. If that is unavailable, the runtime falls back to credential-backed AES-GCM protection when possible.
The application does not automatically upload this browser-state data.
Installer builds can optionally be configured with an owner-run update server. In that case, installs that use Automatic updates can send a minimal update-registration record containing install-management fields such as install ID, app version, install path, install root, install drive type, host name, platform, architecture, last-seen time, and the IP address seen by that server. They can also request the latest published release metadata and download the published installer package. The managed updater now rejects non-HTTPS release metadata or installer URLs and requires a valid published SHA-256 hash before the installer is launched. This does not include browsing history, bookmarks, saved passwords, or page contents.
If the browser is installed on an external drive instead of C:, install-linked data and path tracking can follow that selected external location instead of being treated only as a default system-drive install.
Diagnostics are generated locally.
Current behavior:
- runtime diagnostic entries are written to the local diagnostics directory
- users can export an encrypted
.bdiagdiagnostics report manually - no automatic diagnostics upload path is implemented
- the runtime checks panel surfaces local status for storage protection, enabled download-scan providers, ad-block counters, executable path, and performance state
This means diagnostic data stays on-device unless the user explicitly chooses to export it.
This browser is not offline-only. Network traffic still occurs when the user does one of the following:
- opens websites or web apps
- signs into websites
- loads page assets such as images, scripts, fonts, and media
- downloads files
- uses external search engines directly
- uses the bundled
bubbles://homesearch experience - uses websites that request passkey or WebAuthn authentication through the platform browser flow
The internal Bubbles search page can contact DuckDuckGo and Google endpoints to assemble results, related searches, and suggestions after the user performs a search.
When the user downloads files, the browser may run trusted-source-aware download handling, local protection-provider checks, destination selection, and normal file save behavior. That is part of the local browser protection flow rather than a first-party analytics pipeline.
When the user signs in with a passkey on a supported site, the authentication flow is between the website, Chromium/Electron, and the operating system or authenticator. The browser does not add a separate first-party passkey cloud service.
The Music Player is local-only.
- It is disabled by default.
- No folder scan starts until the user explicitly agrees in the Music Player UI.
- It scans the default Music folder or another local folder the user selects.
- Playback uses local files only.
- The application does not upload the user's music library.
The browser uses Electron with Chromium sandboxing and process isolation while avoiding first-party telemetry frameworks and automatic background reporting.
Current characteristics:
- sandboxed renderers and helper windows
contextIsolationenablednodeIntegrationdisabled in renderers- separate session handling for incognito windows
- per-site permission prompts with allow, block, and ask-later behavior
- ad and tracker request filtering with local counters
- modular download protection using Windows Defender, Authenticode verification, and browser heuristics when available
- trusted-source-aware download handling intended to reduce unnecessary friction while keeping local protection checks active
- no automatic diagnostics upload
- no first-party analytics pipeline
- no cloud sync service
- no built-in silent auto-updater service
- optional owner-run managed updater only for installs that explicitly opt into
Automatic updates - managed update installs require verified HTTPS release endpoints and SHA-256 installer validation
- password save and reveal flows are restricted to secure contexts such as
https:pages or local loopback development hosts - imported extensions are loaded without local file access and high-risk permissions trigger extra user warnings
- Chromium and Electron secure-context behavior for supported passkey and WebAuthn site flows
Uninstall behavior is also local-first.
Current uninstall behavior:
- the installed app files are removed
- the user can choose which local data categories should be removed or kept
- current removable categories include browser profile data, saved passwords, diagnostics reports, and local update preferences
- if a category is left unchecked, that data remains on the device for a future reinstall or update
- uninstall cleanup also removes stale uninstall metadata and re-checks leftovers before showing a warning
- external-drive installs can keep install-linked data associated with the selected external location
BubblesTheDev Web Browser currently aims for a local-first privacy posture:
- browser settings, history, bookmarks, permissions, search cache, and install-linked path metadata stay on-device
- toolbar visibility, bookmark bar visibility, and the selected shell theme stay on-device
- persisted state is compressed and protected locally
- diagnostics stay local unless the user exports them
- music library access requires explicit consent before any scan begins
- bookmark import and VPN profile scanning require explicit user consent before local file access begins
- password save and reveal behavior is limited to secure contexts instead of arbitrary insecure pages
- supported passkey sign-ins rely on site and platform authenticator flows rather than a first-party Bubbles credential cloud
- browsing and built-in search still create normal traffic to the websites and search providers the user chooses to use
Developed by BubblesTheDev