Average Ratings 1 Rating
Average Ratings 2 Ratings
Description
The Dragon browser integrates the finest attributes of Chrome, utilizing Chromium technology meticulously designed to provide users with a browsing experience that far exceeds that of its competitors, particularly in terms of speed, stability, and ease of use. This is precisely the motivation behind Comodo's introduction of Comodo Dragon, a web browser built on Chromium that not only incorporates all of Chrome's functionalities but also delivers an exceptional level of security and privacy that is uniquely associated with Comodo. It offers enhanced privacy features that go beyond what standard Chromium technology provides. Known for its innovative approach, Comodo is a leading developer of online security and trust assurance solutions. The Comodo Dragon enhances the latest Chromium technology by fortifying it in ways that are crucial for navigating the modern Internet, which is often fraught with malware threats. Ultimately, it stands out for its superior security and privacy features, making it an ideal choice for users concerned about their online safety. With the increasing prevalence of cyber threats, the Dragon represents a significant advancement in secure browsing technology.
Description
Safeguard yourself against tracking, surveillance, and censorship by taking proactive measures. If you reside in a region where Tor is blocked, you can set it up to connect through a bridge by selecting the option indicating, "Tor is censored in my country." Conversely, if Tor is not blocked but fails to connect, check to ensure that your system clock is accurately set, as this is a common issue. It’s important to note that Tor Browser does not permit browser plugins like Flash, RealPlayer, and QuickTime, as these could potentially be exploited to expose your IP address. Therefore, we advise against adding any extra extensions or plugins to the Tor Browser, as they may either circumvent Tor's protections or jeopardize your privacy. The Tor Browser is equipped with built-in tools such as HTTPS Everywhere and NoScript, which enhance your security and privacy. By utilizing the Tor network, the Tor Browser helps maintain your anonymity while browsing. Additionally, it is designed to thwart attempts by websites to “fingerprint” or track you based on your unique browser setup, offering a robust defense against online identification. Ultimately, using Tor is a vital step toward preserving your online privacy in an increasingly monitored digital landscape.
API Access
Has API
API Access
Has API
Integrations
FireShot
AWS Marketplace
Anonymous Messenger
Ant Download Manager (AntDM)
BitHide
Bitwarden
Breachsense
Chronicle SOAR
Kasm Workspaces
Live Proxies
Integrations
FireShot
AWS Marketplace
Anonymous Messenger
Ant Download Manager (AntDM)
BitHide
Bitwarden
Breachsense
Chronicle SOAR
Kasm Workspaces
Live Proxies
Pricing Details
No price information available.
Free Trial
Free Version
Pricing Details
No price information available.
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
Comodo Security Solutions
Founded
1998
Country
United States
Website
www.comodo.com/home/browsers-toolbars/browser.php
Vendor Details
Company Name
The Tor Project
Founded
2006
Country
United States
Website
www.torproject.org/download/