Privacy Tools Guide

No browser is privacy-neutral out of the box. Every major browser makes different trade-offs between usability, performance, and the amount of data it collects or exposes. This comparison focuses on the browsers most used by privacy-conscious people in 2026, evaluating them on what actually matters: default behavior, fingerprinting resistance, telemetry, and how much work you need to do to make them actually private.

The Browsers in This Comparison

Chrome, Edge, and Safari are excluded — they are not meaningfully privacy-focused and require so much configuration that other browsers are simply better starting points.

Telemetry and Data Collection

Firefox sends telemetry to Mozilla by default: crash reports, usage data, and feature experiments. This is opt-out, not opt-in. Mozilla uses this data internally and does not sell it, but the collection still happens unless you disable it in about:preferences#privacy.

Brave ships with telemetry disabled by default for most users. Its “privacy-preserving product analytics” (called P3A) uses a randomized sampling method and is designed not to identify individuals. P3A is still on by default and can be turned off.

LibreWolf strips all Mozilla telemetry at build time. There is no opt-out required because the code was never included.

Mullvad Browser similarly removes all telemetry. It is built by the Tor Project using the same base as Tor Browser, with network-anonymity features replaced by a focus on fingerprint resistance for use with a VPN.

Tor Browser sends no telemetry. It connects through the Tor network, so even if it did, the connection would be anonymized.

Fingerprinting Resistance

Browser fingerprinting identifies users by combining browser attributes — screen resolution, fonts, plugins, WebGL renderer, canvas data, audio API output, etc. — into a near-unique profile that persists across sessions without cookies.

Firefox with default settings has poor fingerprint resistance. privacy.resistFingerprinting (RFP) exists but is not enabled by default. Without it, Firefox is highly fingerprintable.

Brave ships with its own fingerprint randomization called “Farbling.” Instead of refusing to return fingerprint-sensitive values, Brave randomizes them slightly per site per session. This is an effective approach that maintains site compatibility while degrading fingerprint quality.

LibreWolf enables privacy.resistFingerprinting by default, adopts the same approach as Tor Browser. This can break some sites but provides strong fingerprint protection.

Mullvad Browser enables full RFP and targets making all users look identical to each other — the same strategy as Tor Browser but without the Tor network requirement. This is the most consistent non-Tor fingerprint protection available.

Tor Browser provides the strongest fingerprint resistance: all users look identical. Combined with Tor’s IP anonymity, this is the gold standard. The trade-off is speed and compatibility with sites that block Tor exit nodes.

Fingerprint resistance ranking (high to low):
1. Tor Browser
2. Mullvad Browser
3. LibreWolf
4. Brave (with Farbling)
5. Firefox (requires manual hardening)

Default Privacy Settings

The practical question is: what protection do you get without any configuration?

Firefox defaults: Moderate. Enhanced Tracking Protection in “Standard” mode blocks known trackers and third-party cookies in private windows. Social media trackers, cross-site tracking cookies, and fingerprinting trackers are blocked. Cryptomining blocked. DNS is not encrypted by default (configurable). Telemetry on.

Brave defaults: Strong. Shields block third-party ads and trackers, cross-site cookies, and fingerprinting. HTTPS upgrades automatic. Brave DNS (Cloudflare) used. Private windows with Tor available. Brave Rewards (crypto ad system) is presented prominently but off by default.

LibreWolf defaults: Very strong. uBlock Origin pre-installed and enabled. All telemetry removed. privacy.resistFingerprinting on. WebRTC disabled. Most privacy settings pre-configured to hardened values.

Mullvad Browser defaults: Very strong. uBlock Origin pre-installed. Full fingerprint resistance. No Brave Rewards or other monetization built in. Designed to be used with Mullvad VPN or any other VPN.

Tor Browser defaults: Maximum. Routes all traffic through Tor. JavaScript controls per-site. Canvas and WebGL fingerprinting blocked. JavaScript can be fully disabled with one click.

Chromium vs Gecko Engine

Brave is Chromium-based. This gives it Google’s rendering engine, V8 JavaScript engine, and the extensions ecosystem of Chrome. The practical benefit: better site compatibility and access to more extensions.

The concern: Chromium’s architecture includes Google services integration points that Brave removes or replaces. Google also controls the Chromium codebase, which means Brave must continually audit and patch upstream changes. Google’s Manifest V3 changes that weakened content blocking extensions affect Brave users (Brave’s built-in Shields bypasses this, but third-party blocking extensions are constrained).

Firefox, LibreWolf, and Mullvad Browser use the Gecko engine. This means better extension control (Manifest V2 still supported), independent codebase governance, and no upstream dependency on Google.

Extensions

Firefox/LibreWolf/Mullvad: Full Manifest V2 support. uBlock Origin in full “medium mode” works on Firefox. Extension permissions model is granular.

Brave: Manifest V3 required for Chrome Web Store extensions. Brave’s built-in Shields handles most blocking, partially compensating for MV3 limitations.

Tor Browser: Extension installation is strongly discouraged. Adding extensions changes your browser fingerprint away from the standard Tor Browser profile, reducing anonymity.

Configuration Checklist for Each Browser

Firefox: Minimum Hardening

// In about:config:
privacy.resistFingerprinting = true
privacy.firstparty.isolate = true
network.dns.disablePrefetch = true
browser.send_pings = false
geo.enabled = false
media.peerconnection.enabled = false   // Disables WebRTC

Brave: Additional Hardening

Go to brave://settings/shields and set:

Go to brave://settings/privacy:

Sync and Account Features

Firefox Sync encrypts your bookmarks, passwords, and history before syncing — Mozilla cannot read the content. The encryption uses your Firefox Account credentials as the key.

Brave Sync also encrypts client-side.

LibreWolf disables Firefox Sync by default. You can re-enable it.

Mullvad Browser has no sync feature — by design, it is treated as a disposable browsing profile.

Tor Browser has no sync or accounts. All history and cookies are cleared on exit by default.

The Practical Choice

Use case Browser
Daily driver, good defaults, max compatibility Brave
Daily driver, Firefox ecosystem, willing to configure LibreWolf
Sensitive research, journalist work, VPN user Mullvad Browser
High anonymity required, Tor network Tor Browser
General use, existing Firefox user Firefox (with hardening)

There is no single best browser. Tor Browser provides the most anonymity but is slow and breaks many sites. Mullvad Browser provides near-Tor-level fingerprinting protection with normal browsing speed. Brave works well for daily use with minimal configuration. LibreWolf is the best choice if you want the Firefox ecosystem with strong defaults applied.

WebGL Fingerprinting and Canvas Defense

WebGL and canvas fingerprinting are particularly effective at identifying users because they expose hardware-specific rendering information. Different GPUs and graphics drivers produce slightly different outputs, creating a persistent identifier.

Firefox with RFP returns spoofed WebGL values that don’t match your actual hardware. The values are consistent within a session but differ across sites, preventing cross-site tracking.

Brave’s approach uses randomization — each site sees slightly different WebGL data, degrading fingerprint quality while maintaining compatibility. Test yourself using the WebGL fingerprinting tool at https://webbrowsertools.com/webgl/.

LibreWolf and Mullvad take the Firefox approach further, disabling some WebGL APIs entirely and spoofing others. This breaks fewer sites than Tor Browser but still provides strong protection.

Test your browser’s fingerprinting resistance:

# Using browserleaks.com directly
curl -s https://www.browserleaks.com/webgl | grep -o "WebGL fingerprint.*" | head -1

# Using headless Chrome for automated testing
chromium --headless --disable-gpu https://browserleaks.com/webgl

Tracking Cookies vs First-Party Cookies

Modern tracking relies less on third-party cookies (which all these browsers block) and more on first-party cookies set by domains you visit. A site can place a persistent identifier in a first-party cookie and correlate it across visits.

Firefox Enhanced Tracking Protection in “Strict” mode isolates first-party cookies by site, preventing persistence across your browsing. However, this breaks site features. Default “Standard” mode does not isolate first-party cookies.

Brave uses a cookie partitioning approach — each site’s cookies remain isolated to that site by default. This maintains functionality while preventing cross-site correlation.

LibreWolf and Mullvad enable privacy.firstparty.isolate, which partitions all cookies and storage by first-party domain. This is strict but breaks some sites that rely on cross-domain cookies.

For developers building privacy-respecting sites, use SameSite=Lax or SameSite=Strict on all cookies:

// Node.js/Express example
res.cookie('sessionId', token, {
  sameSite: 'strict',
  secure: true,
  httpOnly: true,
  maxAge: 3600000
});

DNS over HTTPS (DoH) Implementation

Default DNS queries are unencrypted, revealing every domain you visit to your ISP. All modern browsers support DoH, but they configure it differently.

Firefox allows customizable DoH providers through Settings. Set a custom provider like NextDNS, Quad9, or Cloudflare:

about:preferences#privacy → DNS over HTTPS → Custom provider

Brave uses Cloudflare for DoH by default but allows switching in Settings → Privacy → Brave Shields defaults.

LibreWolf and Mullvad use configurable DoH through torrc-style configuration files.

# Verify DoH is active
curl -s -H "accept: application/dns-json" https://dns.google/resolve?name=example.com&type=A | jq

# Compare unencrypted vs encrypted DNS query times
time nslookup example.com  # Unencrypted
time dig @8.8.8.8 example.com +https  # Over HTTPS

Rendering Engine Security Patches

The choice between Chromium and Gecko affects how quickly security patches reach you.

Chromium (used by Brave) receives patches directly from Google, usually in weekly releases. Brave inherits these patches and can apply additional hardening. However, Google controls the security roadmap.

Gecko (Firefox, LibreWolf, Mullvad) has its own security team and release cycle. Mozilla releases updates on a monthly schedule for Firefox, which LibreWolf and Mullvad inherit. This can mean slower patching, but both projects audit upstream changes closely.

For time-sensitive systems, Brave’s rapid patch cycle offers an advantage. For long-term privacy philosophy, Gecko’s independence from Google appeals to privacy-focused users.

Network Protocol Analysis

Examine what your browser leaks even before websites load. Use Wireshark or mitmproxy to inspect the actual requests:

# Install mitmproxy
pip install mitmproxy

# Run proxy on localhost:8080
mitmweb

# Configure browser to route through mitmproxy, then visit a site
# Inspect connection patterns and DNS queries in the mitmweb dashboard

Key things to watch:

Firefox leaks SNI by default. Enable network.http.http3.enable and configure a DoH provider to hide SNI.

Brave, LibreWolf, Mullvad have SNI blocking built in, particularly when using HTTPS/3.

Extension Ecosystem and Manifest V3 Impact

Google’s Manifest V3 limits what content-blocking extensions can do. Extensions can no longer use webRequest API, only the limited declarativeNetRequest API which has per-rule caps.

Firefox still supports Manifest V2 fully. uBlock Origin works at full power. This is the primary reason some power users prefer Firefox or LibreWolf.

Brave compensates by offering built-in shields that function at the browser engine level, bypassing MV3 limitations entirely. This gives Brave users protection equivalent to or better than uBlock Origin, without installing extensions.

LibreWolf comes with uBlock Origin pre-installed in MV2, combining the best of both worlds.

For developers choosing between browser platforms for users: if you cannot guarantee uBlock Origin’s availability (corporate environments, locked-down systems), Brave’s shields provide superior default protection.

JavaScript Execution Context

Web pages execute JavaScript with access to global APIs that can leak identifying information. The navigator object contains particularly sensitive data:

// These values differ between browsers and hardware
console.log(navigator.hardwareConcurrency);  // CPU core count
console.log(navigator.deviceMemory);          // RAM in GB
console.log(navigator.language);              // UI language
console.log(navigator.languages);             // Multiple languages
console.log(navigator.userAgent);             // Browser and OS
console.log(navigator.plugins);               // Installed plugins (mostly deprecated)

Firefox with RFP spoof these to generic values (usually “2” cores, “8GB” RAM).

Brave randomizes them per-site or per-session.

Tor Browser makes all users look identical, defeating JavaScript-based fingerprinting entirely.

If you’re building a web application that needs to identify users, never rely on these APIs. Use authentication tokens and server-side session management instead.

Built by theluckystrike — More at zovo.one