<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Tech Well]]></title><description><![CDATA[About technology that does you well – and how to use it well. Technologies can enrich your life, even save it, or they can ruin it. This stack guides you to the good ones.]]></description><link>https://techwell.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!T_lv!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa02f6d67-ca8e-4204-9e2c-c1fe1e57e84d_1000x1000.png</url><title>Tech Well</title><link>https://techwell.substack.com</link></image><generator>Substack</generator><lastBuildDate>Tue, 12 May 2026 06:02:10 GMT</lastBuildDate><atom:link href="https://techwell.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Inidox OÜ – Jörgen Winther]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[techwell@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[techwell@substack.com]]></itunes:email><itunes:name><![CDATA[Jorgen Winther]]></itunes:name></itunes:owner><itunes:author><![CDATA[Jorgen Winther]]></itunes:author><googleplay:owner><![CDATA[techwell@substack.com]]></googleplay:owner><googleplay:email><![CDATA[techwell@substack.com]]></googleplay:email><googleplay:author><![CDATA[Jorgen Winther]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Safe Browsing with Tor and Mullvad]]></title><description><![CDATA[As the Chrome and Chromium browsers are true spying machines, what's the alternative?]]></description><link>https://techwell.substack.com/p/safe-browsing-with-tor-and-mullvad</link><guid isPermaLink="false">https://techwell.substack.com/p/safe-browsing-with-tor-and-mullvad</guid><dc:creator><![CDATA[Jorgen Winther]]></dc:creator><pubDate>Sat, 09 May 2026 20:54:49 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="1200" height="900" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:3888,&quot;width&quot;:5184,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;graphical user interface, text, application&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="graphical user interface, text, application" title="graphical user interface, text, application" srcset="https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1669630127566-adeac5492686?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHwxNHx8YnJvd3NlcnxlbnwwfHx8fDE3NzgzMjg1Mzd8MA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@nebulargroup">Nebular</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>My guess is that you are currently using Google Chrome as the browser on your computer. By far most people do that. Others use Microsoft Edge, Opera, Vivaldi, or some other browser that is essentially the same: because Chrome is based on an open source core called Chromium, and that same core can be found in most other browsers.<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-1" href="#footnote-1" target="_self">1</a></p><h2>Problems and alternatives</h2><p>Recent articles by security experts have revealed that Chrome and Chromium work well as browsers, technically speaking, but they contain various mechanisms and features that can be exploited by websites to collect quite comprehensive amounts of data about you and your browsing habits.</p><p>Some of these mechanisms are reserved for Google sites, so that Google themselves can spy even more on you than their competitors in the Internet space, but no matter what, it is bad!</p><p>The fact that something is open source doesn&#8217;t prevent a company like Google to have a siginificant influence on the development, so the many other browsers using Chromium may be able to fork<a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-2" href="#footnote-2" target="_self">2</a> the code and make their own variety of it, but it would lead to the loss of benefiting from further developments on the main project, plus Google may set up some restrictions on how such a fork can be used, so this is not often done.</p><p>An alternative to Chrome is Firefox, which is based on Gecko from Mozilla &#8211; also an open source core, but not under Google&#8217;s control.</p><p>Firefox has significantly fewer mechanisms and flaws that allow for spying on you, but yet, some are there. </p><p>A different kind of consideration you may have around Firefox is that they get 85% of their income from Google! Google pays them that much, half a billion each year, to make Google the standard search engine in the browser. So, even though Firefox says that this is it, there are no other ties, you could wonder if they perhaps anyway may do something, at times, with their code or the adminsitration of it, that is for the purpose of keeping that income stream alive, i.e., something that benefits Google more than the users of the browser. </p><p>A third alternative is Safari, from Apple. It is based on the Webkit core, which is also open source, and controlled by Apple. There are not many other browsers than Safari that uses webkit, apart from a couple of smaller browsers for Linux and a few, older browsers for some mobile phones, like the BlackBerry, but there&#8217;s a catch: Webkit has been forked by Google, renamed into Blink, and Blink is part of Chromium.</p><p>For the sake of completion, the Trident core by Microsoft should also be mention. It is used by the now discontinued Internet Explorer, but is also present in some other browsers on the market, alongside other cores, for instance in Microsoft Edge that uses it together with Chromium.</p><p>A couple more browser cores exist, but they have no real significance.</p><p>Hence, if you want to use something that is not controlled by Google, you will have to stick with Apple or Firefox.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://techwell.substack.com/p/safe-browsing-with-tor-and-mullvad?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://techwell.substack.com/p/safe-browsing-with-tor-and-mullvad?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p>A problem with Chromium is the construction of if, as mentioned, but another is that is is just the core &#8211; browser manufacturers want more features, and Goggle is ready to provide some of those as services (which are not awailable to forks). This can be such as the Safe Browsing API, where the browser sends web addresses to Google for evaluation, and gets information back on whether the site is registered as a dangerous site that should be avoided.</p><p>Google offers a range of such services, and the browsers using Chromium are willingly making use of them.</p><h2>A reminder of why you don&#8217;t want your browser to spy on you</h2><p>I recently shared an article from another Substack of mine, &#8220;<em><a href="https://freeworlddream.substack.com/cp/196895221">Your Data Are Your Freedom</a></em>&#8221;, that touched this topic.</p><p>In that article, I mentioned some of the many data that are being registered about you and what you do, and I mentioned how this can be part of, or next to, social engineering activities, with the purpose of making it possible for others to take over parts of your life, locking you out of it and pretending to be you.</p><p>An article from Cybernews, &#8220;<a href="https://cybernews.com/privacy/avoiding-internet-surveillance-to-protect-your-privacy-online/">You&#8217;re being watched: How internet surveillance tracks and manipulate you</a>&#8221;, explains more about what is bad about being monitored like that:</p><blockquote><p>&#8230; Aggregation and analysis of large quantities of data from various sources lets these corporations infer information about your hobbies and interests, political views and religious affiliations, financial status, disabilities, and even more. <strong>A simple Google search and an accepted cookie can reveal information about you that you wouldn&#8217;t think to tell anyone</strong>.</p><p>In the best-case scenario, Google will use this information to make an advertisement profile for you, resulting in personalized ads on social media. However, in worse cases, this advertisement profile could be used for <strong>subtle psychological manipulation known as social engineering</strong>, and discrimination on the internet and in real life.</p><p>For example,<strong> scammers may use information about you in phishing attacks</strong> to convince you to log into your bank account via a malicious website. An insurance company, an airline, or any other service may engage in <strong>price discrimination</strong> based on the information they have on you. Furthermore, your advertisement profile is also a behavioral profile, which can be used to <strong>subtly influence your views and opinions </strong>by displaying heavily targeted social media content and/or ads.</p></blockquote><h2>The vulnerabilities</h2><p>Your browser, no matter which one, as well as your operating system and propably most or all other apps you are using, want to update themselves now and then. </p><p>Part of is this is the vendor making changes for whatever reasons they see, but another, and often the major part, is to fix problems found &#8211; vulnerabilities that could be, or perhaps already have been, exploited by hackers or other bad people.</p><p>A web browser is particularly exposed to such vulnerabilities, because you use it to connect to remote computers, all over the world. You mostly don&#8217;t even know which computers they are, or where they are &#8211; you just know a link or a domain name that you cklick on or write in the address field of the browser, and then a request is sent from your computer to some computer, somewhere in the world.</p><p>If that computer in the other end knows how to abuse this new connection made to enter your computer and do bad things there, such as stealing unrelated browser data, files on your computer, or even plant some software that will then either just ruin your computer or continue, hidden in the background, to work as an agent for them &#8211; will, if that can happen, you are in trouble!</p><p>You have of course an antivirus program of some kind, and you believe that you pay attention to not opening dangerous sites, for instance certain sites with adult contents or similar are known to be full of malware and aggressive behavior, but you can&#8217;t know which sites are bad: some of them could look just like your bank, or some other site that you trust.</p><p>Also, there are lots of related services in use, so you are not just in touch with that one computer, you think you are &#8211; there are DNS servers, for instance, and many services, such as the mentioned Google browser services, advertizing networks, and web statistics apps, that also get information about your browsing. In a typical browsing session, several different computers will be told about what you are doing. And any of them can potentially represent bad intentions, or they can be hacked. Also, software on your computer can have bad intentions too, lived out through your browsing and, for instance, cause <em>your</em> computer to do much of what I just described could be done to it by others.</p><p>A lot of all this is not about viruses, so your antivirus program will do nothing to stop it. Instead, the browser needs to prevent it from happening in the first place. And as browsers are made of software &#8211; hundred of thousands of code lines &#8211; there will be software errors in them. Each change will introduce the risk of new errors, and it is an eternal task to test, monitor, and fix such software.</p><p>This is true for all browsers. What is worth considering, though, is how capable, and willing, and fast, the vendor of the browser is to fix problems when they are found.</p><p>And for that reason, probably, most browsers are based on a common, open source, core &#8211; the core is then maintained by many programmers, and there will be many users as well, and many mechanisms that monitor them to see if any new vulnerabilities, any software errors, or potentially bad design desicions have been introduced, and this will be reported and fixed.</p><p>The vendor producing the browser on top of the open source core will then have less code to be responsible for, but there is still some, and therefore, probably, people trust a large company like Google or Microsoft to be able to do that faster and better.</p><p>History has shown that it isn&#8217;t so, sadly.</p><p>Big is not automatically good, because the bigger companies spend a still smaller fraction of their ressources on fixing the code, the bigger they get. And then they may add some bad code on purpose, such as Google has done it, just because they can get away with it and seemingly have no moral sense.</p><p>But still: a very young company with just a few people, making a rarely used browser, should not be your first choice if you are an ordinary user, because there may be things happening with it that would require you, yourself, to discover problems and know what to do about them. It is more safe for ordinary users to go with something more streamline, leaving the experiments to enthusiasts and experts.</p><h2>How to select</h2><p>You can have a look at a long list, and I&#8217;m not sure that it&#8217;s even complete, of web browsers and what core they are based on, at the Wikipedia article <em><a href="https://en.wikipedia.org/wiki/List_of_web_browsers">List of web browsers</a></em>. </p><p>Many of these are not ready yet, or they have already been discontinued, or perhaps they are used only for special purposes, such as the webOS, that is a Linux system with built-in browser, originally developed for the Palm devices, now used for such purposes as TV operating systems. Some may be new and promising, but still not good choices for ordinary users.</p><p>So, from all those many web browsers, which are realistic for you to use?</p><h3>Browsing experience</h3><p>Well, I will introduce another aspect into the discussion. It is not all about security and keeping your private data from being stolen &#8211; it is also about what works!</p><p>Even though it is not talked about a lot these days, it was a major topic until recently, which HTML or CMS feature would work in which browser. And it is still absolutely necessary for a web developer, or a developer of applications that should work in a web browser, to add special code saying something like &#8220;if this browser is used, do this, if that browser is used, do that instead&#8221;, and then test carefully on all relevant browsers to see that it will work as expected.</p><p>It is not much talked now about because the developers handle it, so that you probably don&#8217;t need to care about it as a user. But you can still run into situations where a website looks strange in a particular browsers, or where some functionality, for instance for your online bank or other advanced use, simply requires you to use one of a range of supported browsers, as it may not work at all in some others.</p><p>That said, you can, for 99% of your normal web browsing, use any of the major browsers without problems. Only with the catch that if you are not using Chrome, which all all websites and web apps work with, you may need to have an alternative browser installed for those special cases where it is needed.</p><p>I suggest that you select your main browser without falling for the pressure to simply use Chrome, &#8220;because everything works on it&#8221;. Use what suits you, and then, perhaps Chrome, perhaps a derivate, for the special cases only.</p><p>Personally, I had a period where Firefox was my main browser, but I had to use Chrome for Internet banking &#8211; until I found out that Vivaldi, or other Chromium based browsers, could replace Chrome in almost all such cases. So I ended up with something like 97% use of Firefox, 2.5% of Vivaldi, and the last 0.5% of Chrome.</p><p>But now that won&#8217;t do anymore. Not with the increasing attacks on privacy by Google, that have been reveled recently. Now I want Chrome out completely, and I will then start looking for the best alternative for those 0.5% of the situations where my main choise won&#8217;t work.</p><h3>The dangers that come with Google</h3><p>To be fair, it is not new that Google is spying on you. They are writing it in all their terms of use, for all their products and services (each being 60 pages long, so who ever reads them?) And some people have been wise and thrown out Google completely long ago. Others, like me, thought that it was also a matter of convenience and an adaptation to real life &#8211; &#8220;ideology is fine, but I need a tech setup that I can live with every day".</p><p>Well, no more. Not with Google, that is.</p><p>And especially one article was the drop that made my cup flow over: This article on the Proton substack: <em><a href="https://protonprivacy.substack.com/p/chrome-is-a-surveillance-platform">Chrome is a surveillance platform. Here&#8217;s the evidence.</a></em></p><p>What is says is not really new, but it is a summary of evidence presented by several security experts recently. I have surfed a bit and found some of those, and I have also found kind of an answer to the question I asked to the article &#8211; &#8220;<em>What about Chromium-based browsers &#8211; are they as bad as Chrome?</em>&#8221;</p><p>And yes, they are, in general, just as bad. The browser manufacturers are explaining, now and then, how they are different from Google, even if they base their browser on Chromium. But, at the same time, they use the Goggle services, this way sending information about you and your browsing to Google. And, logically speaking, that&#8217;s Google&#8217;s purpose of giving them the core and the services. We shouldn&#8217;t fool ourselves into believing that the smaller vendors can somehow trick Google into just given and not getting. Google is 100% geared toward capturing data about people, and they will succeed in that with everything they do.</p><p>Some of the elements of Google&#8217;s organized spying through Chromium are:</p><ul><li><p>Fingerprinting &#8211; different mechanisms are in play to make sure that the website, or Goggle through their services, can see who you are, even if you are not logged in, by recognizing details about your computer, browser, etc. &#8211; so detailed, that it is almost impossible to hide from it. Even if you switch browser, they can recognize you on other parameters, so they can collect a complete picture of everything you do; a total picture of your presence in this universe.</p></li><li><p>Tracking across websites, so that one site knows what you did on another. Across days, too, and cookies are a great help for this.</p></li><li><p>Allowing secret domain name forwarding (CNAME cloaking), that again can allow for stealing data through cookies.</p></li><li><p>Mechanisms for storing data on your computer that bypasses any cookie policy you may have decided on. So, websites using these can store data no matter what you want, even if you believe that you have forbidden it.</p></li></ul><p>In addition, not mentioned in the article but touched by some of the commenters, Google Chrome is installing, on your computer, without your knowledge or permission, a 4-5 GB AI engine &#8211; for Google&#8217;s descreet use. That&#8217;s not what you expect when installing a browser, I guess? As Google doesn&#8217;t even talk about it, who knows what it is being used for, and it can be a pain to try to delete &#8211; it comes back again.</p><p>Basically, a Chromium-based web browser, and in particular Chrome, doesn&#8217;t just allow you to see the contents of web pages acroos the Internet, such as you would expect. It also collects data about you, helped by a range of special mechanisms implemented for that purpose.</p><h3>Apple, an alternative?</h3><p>Quite many people use Safari on their iPhones and iPads, and even on their Apple Watches, and sometimes also on their Mac computers.</p><p>Because of all these platforms combined have a certain volume in the market, that leaves up to around 20% of all browser use to be done through Safari. Or, perhaps not&#8230;</p><p>Webkit is a precondition for browsers to function on the iPhone, etc., so even the competing browsers on those platforms are also based on Webkit, and that sometimes affects the statistics of use, because the webservers register them as &#8220;Webkit browsers&#8221;, assuming that this means Safari.</p><p>The real number of Safari users is probably somewhat smaller.</p><p>According to several experts on the Internet, Webkit and Safari are not spying on you, the same way as Chrome and Chromium is, but there are at any time various vulnerabilities that can be exploited by websites to get access to data they shouldn&#8217;t, and all the fingerprinting that other browsers also allow. Maybe not in exactly the same ways as on Chromium, but still, it is possible.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!vYqS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!vYqS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!vYqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png" width="1456" height="952" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:952,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:459307,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://techwell.substack.com/i/197001723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!vYqS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 424w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 848w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 1272w, https://substackcdn.com/image/fetch/$s_!vYqS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F52b6f8f7-cb3e-477f-a47c-f532e96e8c99_1651x1080.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Like just about every browser on the market, Safari claims to be a safe and secure web wrowser, keeping track of threats, for instance, and blocking ceetain potential problems. It may be true, but it opens up the question in my mind how much there is to keep track of, and block, and how much of it is missed by the app and allowed to remain a threat?</figcaption></figure></div><p>Next to that, it is an Apple user&#8217;s world. There are not many Windows or Linux users who use Safari or Webkit-based browsers &#8211; hence, not a real alternative for anyone else than users of Apple products. And even they often prefer other browsers, for whatever reasons.</p><p>Apart from all the theoretical stuff, I personally find Safari on the Mac a quite good browser for everyday use, but still one that has some user interface specialties that makes me move away from it every time I try using ot for a while. </p><p>I have sometimes thought about the Mac with its built-in software being a complete package that you could live with without ever installing any other software &#8211; if you didn&#8217;t have too advanced or specialized needs, of course. But still, almost everything on the computer &#8211; every bit of software it comes with &#8211; ends up being replaced by something else by most users. Same situation for Safari. It all works, it is all good, but not sufficiently appealing in the long run. To me, it is to some extent because of that closed world it represents.</p><p>Maybe you se this different than I do, and then, perhaps you will be happy with Safari.</p><h3>Firefox and other Gecko-based browsers</h3><p>The Mozilla corporation that makes Firefox, is owned by the Mozilla Foundation, which is a USA-based nonprofit organization.</p><p>It gets by far most of its income from Goggle, who pays for having the Google search engine preset in the browser &#8211; which is worth more than half a billion dollars a year to them. You can change the search engine to something else after installing the browser.</p><p>Mozilla makes the Gecko core, and on top of that, the Firefox browser. Both as open source projects with contributors from around the world, and from Mozilla.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Y3Ri!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 424w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 848w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 1272w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png" width="1456" height="848" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:848,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1630291,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://techwell.substack.com/i/197001723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 424w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 848w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 1272w, https://substackcdn.com/image/fetch/$s_!Y3Ri!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F66edd878-cfd3-4415-a2e4-be00d4696fa4_1826x1063.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Firefox, as it can look like. You can the open a sidebar with buttons, and many other features, and it can quickly become exactly as you like it. There is also a great bookmark administration feature, and you can group links/pages in the toolbar, as I&#8217;ll show in the next screenshot.</figcaption></figure></div><p>I think that many sees this browser as the open alternative to the for-profit driven approaches by Google, Microsoft, and Apple, and there has been periods where you would find many people recommending Firefox. Especially in the days when the browser market was completely dominated by Microsoft and their Internet Explorer. </p><p>However, nowadays, Firefox has a very small marketshare, and the other Gecko-based browsers are even more rare to see. This, because Google had a long ride of success with Chrome, and was able to initiate many alternative browsers based on Chromium.</p><p>With the current increase in awareness of the unfortunate construction and abuse of data that Chrome is connected with, it looks like very many computer users are looking for an alternative.</p><p>And here, Firefox is the most well-know and well-established alternative.</p><p>It is a feature-rich browser that offers a stream of new features and optimizations. To most users, Firefox will be an attractive alternative to Chrome, because of its many details that allow you to adjust it to your likings.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!X_jD!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!X_jD!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 424w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 848w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 1272w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!X_jD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png" width="710" height="488" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:488,&quot;width&quot;:710,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:88423,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://techwell.substack.com/i/197001723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!X_jD!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 424w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 848w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 1272w, https://substackcdn.com/image/fetch/$s_!X_jD!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F26824385-839b-417e-bcf3-93ad8d37cbe2_710x488.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">You may, like me open so many browser tabs that they don&#8217;t fit the screen, but Firefox allows you to group them, this way still have them all at hand. Very practical. Not completely as nice as Vivaldi&#8217;s workspaces and stacked pages, but then again, Firefox is without Chromium, so I can live with that.</figcaption></figure></div><p>The many features, though, also cost a bit on the speed, the memory consumption, and the stability, as I have experienced it, so for some time, there really were good reasons for looking at Chrome instead, for an easier browsing day. However, as Firefox is much less prone to give away your private data than Chrome is, and as this has now been established as a fact, I wouldn&#8217;t hesitate to recommend Firefox over Chrome.</p><p>There is even a special Firefox for Business, that allows for easy central administration and is marketed by &#8220;<em>combines open-source transparency with advanced security features and frequent updates to help safeguard your organization&#8217;s data</em>&#8221;. That&#8217;s some promise, and I haven&#8217;t tried it, but it is clear that even businesses are now aware of the data security risks with Chrome and want to do something about them, so this argument might be just right.</p><p>If you are looking for a rich experience with many features, I believe that you will like Firefox the most, out of what is not Chromium based. And using this as your standard browser will work just as well for most people as using Chrome, so it is the most direct conversion to something more safe you can make.</p><p>Personally, I feel unhappy about participating in generating more profit to Google by using Firefox. Google pays half a billion dollars to Mozilla every year, because they use the search data delivered to generate even more money. But by switching to another search engine, the opposite happens: Google will effectively lose the money they have paid for this, so that&#8217;s, in my perspective, probably even better than just not letting them earn it :)</p><p>Then it comes as no surprise, I guess, that almost all &#8220;alternative&#8221; search engines are paid by Google in the same way, because they are also sending your data to Google. With some exceptions, but that wil be the topic of a separate article.</p><p>As for the other Gecko-based browsers on the market, there are several, but most are described by reviewers as unstable. There are two exceptions, though, and they have the exact opposite reputation: they are stable, pleasant to use, and super-safe &#8211; they are Tor and Mullvard, which I will discuss next.</p><h3>Tor and the Tor browser</h3><p>Tor is a network of computers that works as an abstraction layer for your browsing: instead of your own computer going directly to a DNS server to resolve the domain name and find the IP address of the server you are approaching, where the website you want to read is placed, the request is sent out in the network and then one of the computers there is doing it for you. And the connection to the server itself is made in a similar way, so that nobody in the world can know that it is really you who are looking at it &#8211; they believe that it is someone else.</p><p>In fact, not just some-<em>one</em> &#8211; your request will be relayed many times from computer to computer, until one of them finally send it to the destination. It is very difficult to track back where the original request came from.</p><p>The Tor browser is a Gecko-based browser, a derivate of Firefox, you could say, that has been stripped down to be simple and secure. And yet, it works mostly like all other browsers, and I guess that most people in most situations wouldn&#8217;t even notice the difference, when first the browser has been set up.</p><p>Because, for the Tor browser to work at all, it must be connected to the Tor network, and that&#8217;s the first thing to do when you have installed it. You can do it easily, though, by just accepting that the browser does it for you, in a way that will work. Or you can connect in a way that you want to, but that, of course, will require that you first find out what you want, which again may cause you to spend some time on it.</p><p>The browser offers a number of anonymizing features, such as letterboxing, that allows for the browser window to be set to only one of a few standard sizes, to prevent the width and heigh of your browser window to become part of a fingerprint that could identify you. It also addresses some of the problems mentioned for Google Chrome and Chromium, for instance hiding other details that could otherwise be used for fingerprinting.</p><p>When you close the browser, it deletes cookies and other privacy related data, so that the next session will be a fresh one. That stops, together with the anonymization features, any tracking between sessions (remember, though, that any website you log into will, of course, be able to track everything you do there).</p><p>There is a special option available: you can access websites that are not accessible through a normal web browser, because their naming and communication concept doesn&#8217;t follow the standard. These sites are hidden to normal browsers. They are called Onion sites, because these sites are part of a top domain called .onion (&#8220;Tor&#8221; itself is short for &#8220;The onion router&#8221;). That&#8217;s basically where &#8220;the dark web&#8221; is.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!PeQE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!PeQE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 424w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 848w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 1272w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!PeQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png" width="1342" height="837" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/f905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:837,&quot;width&quot;:1342,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:213787,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://techwell.substack.com/i/197001723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!PeQE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 424w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 848w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 1272w, https://substackcdn.com/image/fetch/$s_!PeQE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff905d6a4-25ba-4b88-a27b-a9fe3bb631ac_1342x837.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Tor browser can &#8220;onionize&#8221; searches too, making it less likely that there will be registrations in unwanted places, by unwanted parties, of your web searches.</figcaption></figure></div><p>The dark web has become synonymous with crime and spy novels, but the term simply means that it is the areas of the Internet that you can&#8217;t see (with a normal browser). There is no automatic relation to anything criminal in the dark web. Tor can display basically any site on the Internet, and that makes it a bit more vulnerable for people to use who cannot judge what sites are reasonable to visit, and which are not. Of course, the ability to have websites that are hidden, will also inspire some people to put stuff there that wouldn&#8217;t survive in the daylight &#8211; I suggest to stay away from such sites if you happen to bump into them.</p><p>When a website address doesn&#8217;t follow a nomal pattern, it may be possible for you to see it (through Tor), even if you are in a country where the authorities have blocked a lot of sites. Because, they block sites through rules in routers, and these rules are based on the common patterns. This is not so much a matter of protecting your privacy, of course, but it is still a good thing to know that you have a potentially larger freedom to look at what you want on the Internet, not dictated by the authorities that may have dubious motives for their censoring.</p><p>There is a built-in VPN function, as described, in using the Tor network, but you can add another VPN on top of that, to become even more anonymous on the net. That will slow the whole thing down, though, and the Tor browser already isn&#8217;t the fastest, so you should be prepared for a user experience that is similar to what we had in the beginning of the Internet days &#8211; you know, with dial-up modems, etc., and pictures on the websites that sometimes didn&#8217;t show.</p><p>The US goverment is partially financing Tor, which is a USA-based project. Who know what that means with regard to backdoors and government surveillance? So far, I haven&#8217;t heard of anything like that being a fact. Let&#8217;s hope it isn&#8217;t; that Tor really is a free space in an otherwise totally surveilled world.</p><p>Tor is, as it is described, a great possibility to have for people who need to be private. For instance journalists in countries where journalism is forbidden, or people in general who find that what they do is perfectly okay but still, they don&#8217;t want every Big Tech, criminal organization, and intelligence service in the world to know about it.</p><p>And remember: it also offers added protection for access to sites on the normal parts of the Internet, i.e., those that are not in the dark web.</p><p>It is actually a fully useful browser for all normal purposes, so if you simply want maximum privacy, this is a good starting point. </p><p>Find the Tor browser for download at the <a href="https://www.torproject.org/">Tor Project</a> website.</p><h3>The Mullvad browser</h3><p>Mullvad is a Swedish company that mainly has one product, a VPN service, and then they offer the browser free of charge.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M1Ki!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M1Ki!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 424w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 848w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 1272w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M1Ki!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png" width="1456" height="1029" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1029,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:912700,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://techwell.substack.com/i/197001723?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!M1Ki!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 424w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 848w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 1272w, https://substackcdn.com/image/fetch/$s_!M1Ki!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc98486d8-0f66-40ee-99b5-2604e908cad1_1702x1203.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">The Mullwad browser showing letterboxing in action &#8211; the webpage is kept inside of the gray framing, because that&#8217;s a standard size of 1400x900 pixels. When changing the size if the browser window, the webpage will shift between different such standard sizes, making it impossible for the web server in the other end to know that detail about your browser setup.</figcaption></figure></div><p>The Mullvad browser can collaborate with the VPN service, so that it is possible to switch it on and off from the browser, but, as they say at Mullvad, you don&#8217;t need to subscribe to that service to use the browser, and you can perfectly well use the browser also with other VPN services.</p><p>The browser itself is identical to the Tor browser, except for one, important detail: it doesn&#8217;t use the Tor network but functions instead in the same way as most other browsers, just with extra attention to secure browsing, through the features that Tor also has, such as letterboxing and other mechanisms to help avoid fingerprinting. As it is not using the Tor network but rather the normal web browsing mechanisms, it also cannot access .onion sites.</p><p>It is a very easy browser to use, and even though it may not offer a huge range of features, it can be extended by Firefox extensions to help you make your everyday with the browser as convenient as possible. Just be aware that extensions involve third parties, and, hence, increase the risk of someone spying on you through them.</p><p>Such as the <a href="https://go.getproton.me/SH2cp">Proton Pass</a> extension for Firefox works fine, and I have become quite fond of that one, so to me, this is already a sales argument :)</p><div class="callout-block" data-callout="true"><p><em>This link is an affiliate link</em><a class="footnote-anchor" data-component-name="FootnoteAnchorToDOM" id="footnote-anchor-3" href="#footnote-3" target="_self">3</a><em>, leading to a page with a good offering on Proton Ultimate, which includes Pass and some other products. I thought I would share it with you &#8211; if you subscribe to Tech Well, you&#8217;ll get some more links to additional offerings.</em></p></div><p>Mullvad is less private than Tor, but not much, under normal circumstances, and it is a quite fast and pleasant browser to work with. </p><p>It gives you the full scope of privacy if you remember to close the browser after each session, so that it can start with fresh details the next time, not allowing form any tracking by websites across sessions. But, of course, you can leave it open during several days, such as I tend to do, and that will then reduce the privacy level a bit &#8211; but not to as low a level as most other browsers work at.</p><p>Hence, I can&#8217;t see any good reason for not just using this one as your standard browser. Perhaps with Tor as a second option, for when you feel that you want the maximum privacy possible.</p><p>Find the Mullvad browser for download at the <a href="https://mullvad.net/en/browser">Mullvad website</a>.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://techwell.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Tech Well! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h2>Your choice</h2><p>Many people don&#8217;t want trouble. They believe, that if Microsoft has put Edge on their computer, they must use that one. Or if &#8220;everybody&#8221; is using Chrome, they must also use that. Or if their bank says that it only supports Chrome, then everything they do on the Internet must be through Chrome.</p><p>But, first of all; Microsoft, Apple, or any other Big Tech company, are not doing what they do to make you happy. And they are certainly not doing it to preserve your privacy &#8211; on the contrary. So you shouldn&#8217;t follow their push, or their advice.</p><p>And the bank may have designed their website so that it only works on Chrome, and if you can&#8217;t avoid using the site, then maybe you should just have Chrome installed for that one purpose? Or perhaps better, try out some other browsers, and if one of them turns out to also work with the bank site, then use that instead, when banking.</p><p>Think about, when the bank recommends Chrome, it is often just an easy way for their supporters to make things work. There could easily be other ways of making it work, but then you&#8217;ll have to find those yourself, by experimenting a bit.</p><p>So, in general, don&#8217;t be afraid of having more than one web browser. Use the best one for most purposes, and use others for what they are needed for. This way, you&#8217;ll be able to design a life that is almost as convenient as when just using what came with the computer, but which to a much higher degree protects your privacy.</p><p>Always remember, what can be difficult to see sometimes, that you own the computer, you pay for your Internet connection, and all the data you have are yours.</p><p>Big Tech has no right whatsoever to behave like if they own you or your computer, or your data. They may have to power to enforce such a condition, but only if you let them.</p><p>And by the help of a simple browser change, you can stop them from, or severely limit them in stealing your data.</p><p>Another thing to consider: We all sort of vote with our feet. If we run away from Chrome, then maybe Google will change their behavior, and at least, other vendors will see that there is a market to go for here, so they may produce better alternatives.</p><p>We all win on that.</p><p style="text-align: center;">&#8212;oOo&#8212;</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://techwell.substack.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share&quot;,&quot;text&quot;:&quot;Share Tech Well&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://techwell.substack.com/?utm_source=substack&amp;utm_medium=email&amp;utm_content=share&amp;action=share"><span>Share Tech Well</span></a></p><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-1" href="#footnote-anchor-1" class="footnote-number" contenteditable="false" target="_self">1</a><div class="footnote-content"><p>The statistics vary over time, of course, but also from where you get them. Currenty, you can expect to find somewhere around 67% of website views being done from Chrome, and about 10% from other Chromium-based browsers. Firefox has a close to 3% marketshare, and Safari and Webkit-based browsers then make up almost the remaining 20%.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-2" href="#footnote-anchor-2" class="footnote-number" contenteditable="false" target="_self">2</a><div class="footnote-content"><p>For those not familiar with the open source/software development term &#8220;fork&#8221; &#8211; it simple means a copy of the code that is then being developed as a new code, no longer part of the original project. Often, a fork will get a new name, and over the years, it will become more and more different from the original project. Forks are made all the time in the open source programming world, which is one of the reason for so many different projects and pieces of software being in existence &#8211; it takes a few seconds to make a fork, and then you have a new product.</p></div></div><div class="footnote" data-component-name="FootnoteToDOM"><a id="footnote-3" href="#footnote-anchor-3" class="footnote-number" contenteditable="false" target="_self">3</a><div class="footnote-content"><p>Affiliate links means that if you click on them and decide to buy something from the site you get to, I may earn a commission. You will still benefit from the offer, so it it is the company, in this case Proton, who pays for it all. I use affiliate agreeements on this substack to make it possible to share such offerings and make th readers happy, and, potentially, to earn a bit myself. Remember, though, that first of all, I will not recommend anything that I don&#8217;t like, and second, you decide yourself if any offer given is interesting for you &#8211; please buy it only if you like like.</p><p></p></div></div>]]></content:encoded></item><item><title><![CDATA[Welcome to Tech Well]]></title><description><![CDATA[I'll help you navigate the expanding universe of technological opportunities and challenges]]></description><link>https://techwell.substack.com/p/welcome-to-tech-well</link><guid isPermaLink="false">https://techwell.substack.com/p/welcome-to-tech-well</guid><dc:creator><![CDATA[Jorgen Winther]]></dc:creator><pubDate>Wed, 06 May 2026 13:23:23 GMT</pubDate><enclosure url="https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw"><img src="https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080" width="1200" height="713.0769230769231" data-attrs="{&quot;src&quot;:&quot;https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:false,&quot;imageSize&quot;:&quot;large&quot;,&quot;height&quot;:3708,&quot;width&quot;:6240,&quot;resizeWidth&quot;:1200,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;brown wooden framed glass window&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/jpg&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:&quot;center&quot;,&quot;offset&quot;:false}" class="sizing-large" alt="brown wooden framed glass window" title="brown wooden framed glass window" srcset="https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 424w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 848w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1272w, https://images.unsplash.com/photo-1590441037159-d8764caffbc1?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzMDAzMzh8MHwxfHNlYXJjaHw4MHx8d2VsY29tZSUyMHRlY2h8ZW58MHx8fHwxNzc4MDY5NTE2fDA&amp;ixlib=rb-4.1.0&amp;q=80&amp;w=1080 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Photo by <a href="https://unsplash.com/@lgnwvr">LOGAN WEAVER | @LGNWVR</a> on <a href="https://unsplash.com">Unsplash</a></figcaption></figure></div><p>We are surrounded by technology, and it can become a bit overwhelming at times. </p><p>We feel the urge to learn about new techs, because that&#8217;s what everybody is talking about right now &#8211; and we don&#8217;t want to fall behind and become outdated.</p><p>And we feel the fear of some of those new technologies, because they obviously aren&#8217;t as kind and giving as the vendor claims &#8211; or maybe they are, but with a catch.</p><p>There&#8217;s in general a catch to everything in tech. If it&#8217;s useful in one way, it will cost you on some other account. The price can be money, or freedom, or it can be a more long-term effect of yourself losing the skills that the tech now takes over.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://techwell.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://techwell.substack.com/subscribe?"><span>Subscribe now</span></a></p><h2>Guidance</h2><p>That&#8217;s why we seek more information about everything. It is mostly not clear from the first look at it, if you will benefit from a specific product or service.</p><p>And we see more and more warnings: some products are, apparently, not good for us at all. Especially the Big Tech companies seem to have entered a mood where they openly steal your data and use them for whatever they want &#8211; whatever they can make money on.</p><p>Another problem is data security, with data breaches every other moment bringing what you thought were your personal, confidential, data into the hands of criminals &#8211; or just displayed publicly by the company you trusted to keep them safe, by some kind of weird mistake.</p><p>And we get increasingly aware that being connected isn&#8217;t just about having access to everything and everyone, it is also about everything and everyone having access to you, through your data.</p><p>Technology is very much about data. The days are gone where you could have a typewriter that simply printed a character when you pressed a button, and that was that. Now, there will be a recording somewhere of what you pressed, what was printed, and on what material, and the recording will include a lot of information about time, date, who wrote it, how long they took to do it, how often they do something similar, and what else they are doing in their life.</p><p>In modern times, you don&#8217;t have control of what you tell others. As a basic rule, everything that exists, everything that happens, will result in data being registered somewhere, and shared with people and technology that you don&#8217;t even know of.</p><p>If is not wrong to talk about the current concept of society as a surveillance society.</p><p>It doesn&#8217;t take camera&#8217;s on every street corner to get there &#8211; we are already under surveillance by all the other technologies we use.</p><h2>Inspiration</h2><p>Not all technology is bad technology. Far from it! Think about the many people who literally get saved by a bell, when a machine of some kind at the hospital will ensure that help is provided when needed.</p><p>Mechanisms of all sorts in modern cars can help prevent accidents, or help you stay more safe and get less hurt in case an accident does happen.</p><p>The Internet is full of things you can do, that will teach and train you, help you do your shopping, banking, tax reporting, or other daily chores in ways that will save you time, and sometimes also money.</p><p>And you can read an article like this one, without first hearing about a book of articles being published, then going to a bookstore to hear if they can get it, and then waiting for a while until they call and tell that now they have it home.</p><p>It is not all good, and often there is a Yin-Yang situation built-into all new technologies and ideas, as you may win something, but it comes with some drawbacks as well.</p><p>Nevertheless, new technologies can be interesting to hear about, so that you can make a choice of what to do. And also, new alternatives &#8211; not necessarily new inventions, just another take on how to do it or which conditions to offer, can be just what you need to hear about. A new email program and service, for instance, if you are unhappy with the one you have. That&#8217;s old technology, but the new approach to it can potentially cure the worries you have with the old one.</p><h2>Warnings</h2><p>Among all the technologies out there &#8211; all the software, hardware, services &#8211; and their connected business ideas and changes to the way we live, there are some that will be seen as an improvement to many, but perhaps not to all. And there will be some that are definitely no improvement to anybody, if you just pay attention to what they really are.</p><p>Think about cigarettes, that may originally have been a low-level technology not considered problematic, by some, but which nevertheless turned into killing millions of people and making even more millions terribly ill. The side-effects, such as using farming land for producing tobacco instead of the food that was more needed locally, just made the whole thing worse.</p><p>Or what about the computer mouse, that was meant to be an easier way of navigating and using a computer, but has causes many cases of &#8220;tennis elbow&#8221; &#8211; sometimes with resulting operations or severe limitations in how people could use their hands and arms after the damage had occurred.</p><p>And in the data spheres, all the abuse of personal data can make it difficult to live a normal, free life &#8211; putting you in a situation where you must censure yourself to avoid being harassed by other users on social media platforms, or indeed, to avoid being thrown out of the platforms or brought in the search light of governmental intelligence organizations or criminal organizations. Not because you say something illegal or evil, but just because some arbitrarily set rules of the platforms require that you are only a 10% &#8220;you&#8221;, keeping whatever other thoughts you might have about the world for yourself. This could be opinions about the current state leader, for instance, or thoughts about religion, humanity, society, and politics in a broad perspective.</p><p>Data privacy is a large topic with most services today &#8211; &#8220;who will get your personal data?&#8221; shouldn&#8217;t be necessary to ask, yet, it always is&nbsp;&#8211; but also the availability of data has become an issue: where you some years ago might experience that a diskette couldn&#8217;t be read and your data on it were lost, then you can today be at risk of having all your data safely put in a fully backed up cloud account, that you just can&#8217;t get access to &#8211; either for the simple reason that you forgot the password, or for some more advanced reasons, that can include almost anything, including that a foreign government puts restrictions on the datacenter, the communication, or even on your data specifically.</p><p>And, of course, for the hardware: can it be repaired if it breaks? Will it stop working, all of a sudden, because the vendor want&#8217;s to push you into buying a new piece of gear instead of using the old one for as long as it could potentially last?</p><p>Many products and services have problems like these built-into them.</p><p>We need to hear about such things, so that we can take them into account.</p><h2>A world of promotions</h2><p>I find it difficult to source good information about products and services on the Internet &#8211; because almost everything is put there for the purpose of making you buy something, or for someone to get a commission if they can make you click on a link.</p><p>That&#8217;s the kind of economy that drives the Internet now, and Substack is no exception. Even if there are many stacks that can be read for free, the main concept is to make readers pay for the stacks they want to read.</p><p>Next to that, affiliate links and paid contents may not tell you the true story about something, but instead a positive story that will make you buy into a world that is not there for you, but for the vendors.</p><p>We have to look at this world from all sides, I think, because if nobody can earn money on the Internet, there will be no drive and enthusiasm, and the Internet will fade. When affiliate marketing was invented, that made it possible for enthusiasts to justify paying for a web hosting account and some plugins for their content management system, etc., and run their writing business as such &#8211; a business. That kept them going. Many other initiatives died out because people lost the motivation along the way.</p><p>On the other hand, the readers must get something useful out of it. While they can&#8217;t expect the site owners to know about every thinkable product, meaning that these therefore must pick a few that they can talk about with more insight, I still think that the readers must be able to expect that there is real and honest experience and insight behind the words. So, even if there is an affiliate link, it should not mean that the text is automatically 100% untrustworthy advertising copy.</p><p>I have decided to seek and accept affiliations with some companies that I feel are right, regarding products and services that I truly can recommend. But I will write what I think, also if it may be seen as negative for the product, and I will also write about and potentially recommend other products as well.</p><p>My goal with this Substack is not mainly to promote one or another product, but to help you, the reader, find a way forward in what has become a tough technological environment. </p><p>There are values behind each word, and any recommendation can be seen as a genuine attempt to make you aware of a way to improve your use of tech, to become in line with those values.</p><p>And, my values regarding tech are a bit old-fashioned, I must admit. I am not automatically a fan of everything new. Often, I can see that something we had before was better in some ways &#8211; hence, the &#8220;welcome back&#8221; sign in the window: We sometimes benefit from taking a step back when it comes to technology. Not always, but selectively now and then.</p><p>Articles here will not always be about products or services, but can also be about how we behave and what it leads to. Regarding tech, of course, but still, there is a significant human element in everything that happens to us humans, and that&#8217;s also interesting to consider &#8211; it&#8217;s not all about tech.</p><p>And I did it! I managed to write this introduction without saying AI a single time :)</p><div><hr></div><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://techwell.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Thanks for reading Tech Well! Subscribe for free to receive new posts and support my work.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item></channel></rss>