← Back to context

Comment by freehorse

2 days ago

Orion does not collect telemetry data [0].

[0] https://orionbrowser.com/privacy

How do you know that? Source is closed. Is a network analyzer enough to determine?

  • People usually don't compile their browsers from source anyway. And of course, technically, a program can check whether monitoring tools are running and adapt its behaviour accordingly, but this is malware territory and it makes no sense for any reputable browser. Also, technically, one can do that on router level anyway and not have this issue. So yes, I would say that analyzing the network is enough.

    • "People usually don't compile their browsers from source anyway."

      But this is a forum that includes people who do compile their browser from source

      As such, if promoting a new browser here, it should be expected people may ask about the availability of source code

      I use an HTML browser that is a 2M static binary

      It compiles quickly and easily on all the computers I own, and these computers are underpowered

      This allows me to customise the software

      For example, any "features" I do not wish to have, such as telemetry or other "automatic" remote connections, can be removed

      NB. I am not expressing an opinion on the "Orion" software, I am commenting exclusively on the statement, "People usually don't compile their browsers from source anyway" appearing in a forum read by people who _do_ compile their browsers from source

      2 replies →

  • Because their entire continued existence depends on maintaining a reputation of preserving privacy?

    • I usually like to accuse people of the wildest privacy conspiracies, but here in the case of Orion, one day the founder approached me together to work with him, and I tried to see how far is he willing to do in practice (“ok maybe we could do X and Y or Z”).

      He stopped me and explained to me that is his business model, and… it was to sell apps / subscriptions. He has no interest into anything else and strongly explained that the user pays and that’s it.

      Eventually I didn’t work with him but I have a very positive opinion of him, so at least, based on my experience as a potential employee strongly trusts

  • > Source is closed. Is a network analyzer enough to determine? Or do a search and give arguments why it's not enough ?