A collaboration between Mullvad VPN and the Tor Project

Mullvad Browser

Mullvad Browser

  -  83.9 MB  -  Freeware
  • Latest Version

    Mullvad Browser 13.5.7 LATEST

  • Review by

    Juan Garcia

  • Operating System

    Windows 10 (64-bit) / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    Amagicom AB / External Link

  • Filename

    mullvad-browser-windows-x86_64-13.5.7.exe

Mullvad Browser is a free privacy-focused web browser that aims to provide users with a secure and private browsing experience by directly infusing security-focused add-ons in cooperation with Mullvad VPN and the Tor Project.

This all-in-one solution allows users of all ages and knowledge levels to drastically reinforce their online security and prevent their private data from being tracked and collected by large corporations, ad monitoring services, and malicious online destinations.

To best serve the needs of all its users, this chromium-based browser platform comes with preinstalled security features that not only dramatically reduce the online fingerprint of each of its user but also allows faster and more streamlined browsing on websites where trackers and ads are prevented to be loaded.

And all of that and much more is done without any built-in tracking and telemetry features that are often a crucial part of all popular internet browser apps.

Features

Privacy Protection – Prevent websites from tracking browsing history or collecting personal data.

Ad Blocking – Block ads and trackers for a cleaner and faster browsing experience.

VPN Integration – Built-in support for enhancing privacy and security by routing all traffic via encrypted VPN servers.

Prevent cross-site tracking – Automatically isolate tabs one from another to prevent cross-site data tracking.

Secure Connection – Full focus on HTTPS Everywhere ensures always-active secure connection.

How to Use

To get this app up and running on any modern Windows PC, users are only required to download and install an automated installer downloaded from a secure source such as the official website or internal FileHorse servers.

After the app is deployed, users can simply run it and access a standard-looking web browser dashboard that promotes fast and secure access to all internet content.

User Interface

The user interface is clean and minimalist, with a focus on privacy and security.

Many of its security features come fully activated, but some add-ons such as VPN can be activated by user request by simply locating the VPN icon near the main address field. The browser add-on taskbar is also home to the uBlock Origin, the world’s most capable third-party tracker blocker. Users can activate its drop-down dashboard by simply clicking on its icon, accessing a small configuration screen for whitelisting, and other tools useful for monitoring and customizing the look of the webpage elements.

FAQ

What is Mullvad Browser?
It’s a privacy-focused web browser with pre-installed ad and tracking blockers that prevent tracking of users’ habits and collection of private data.

Is it safe?
Yes, this app is 100% secure from viruses and other malware. The developers have infused the app with the latest advanced security features to ensure user privacy and safety.

What platforms does this app support?
In addition to 64-bit Windows 10 and Windows 11, this app can also be installed on macOS, and Linux, and many of its features can also be added via a simple Firefox Extension add-on.

Alternatives

Tor Browser - A Privacy-focused web browser that uses the Tor network to protect your privacy.

Brave Browser - One of the most popular secure web browsers with built-in ad blocking and privacy protection features.

Firefox - Legendary privacy-focused browser app developed by Mozilla.

Opera - It brings you more speed, more discoveries, and more safety.

Pricing

This app is 100% FREE. It does not feature any hidden premium features, premium unlocks, in-app ads or promotions, or subscriptions.

System Requirements

This lightweight browser app is compatible with Windows (64-bit Windows 10 and newer), macOS, and Linux.

PROS
  • Strong privacy protection features.
  • Integrated with Mullvad VPN.
  • Free to use.
  • Minimalist interface.
CONS
  • No native mobile version is available.
Conclusion

Mullvad Browser is an extremely solid choice for users of all knowledge levels that are concerned about their online privacy and who want to reduce the number of ads and trackers that hamper their browsing experience. With its strong privacy protection features and integration with the very effective and easy-to-use Mullvad VPN service, it provides a secure and private browsing experience.

  • Mullvad Browser 13.5.7 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Mullvad Browser 13.5.7 Screenshot 1
  • Mullvad Browser 13.5.7 Screenshot 2
  • Mullvad Browser 13.5.7 Screenshot 3
  • Mullvad Browser 13.5.7 Screenshot 4
  • Mullvad Browser 13.5.7 Screenshot 5

What's new in this version:

Mullvad Browser 13.5.7
- Updated uBlock Origin to 1.60.0
- Bug 361: SSL_ERROR_NO_CYPHER_OVERLAP on some Brazilian government websites [mullvad-browser]
- Bug 43201: Security fixes from Firefox 131.0.2 [tor-browser]


Mullvad Browser 13.5.6
- Updated Firefox to 115.16.0esr
- Updated NoScript to 11.4.40

Fixed:
- Rebase Mullvad Browser Release onto Firefox 115.16.0esr [mullvad-browser]
- Download spam prevention should not affect browser extensions [tor-browser]
- Backport security fixes from Firefox 131 [tor-browser]


Mullvad Browser 13.5.2
- Updated Firefox to 115.14.0esr
- Updated NoScript to 11.4.31
- Updated uBlock Origin to 1.59
- Bug 325: Rebase Mullvad Browser Stable onto 115.14.0esr [mullvad-browser]


Mullvad Browser 13.5.1
- Updated Firefox to 115.13.0esr
- Rebase Mullvad Browser stable onto 115.13.0esr [mullvad-browser]
- Backports security fixes from Firefox 128 [tor-browser]
- Mullvad Browser is not listed as a possible default browser application for Gnome on Ubuntu / Fedora [mullvad-browser]
- Use the GitHub repository for firefox-l10n [tor-browser-build]
- Fix permission issue on files in the debian directory [tor-browser-build]
- Include Windows installer without -portable- in download json files [tor-browser-build]


Mullvad Browser 13.5
All Platforms:
- Hide "List all tabs" when the tabs don't overflow [mullvad-browser]
- Make User-Agent request header match RFP's navigator.userAgent [mullvad-browser]
- Move network.proxy.failover_direct=false pref to base-browser [mullvad-browser]
- Update nightly mar signing key [mullvad-browser]
- Mouse-over long links causes the browser element to re-center relative to width of status tooltip [mullvad-browser]
- Should we reflect the actual channel in about:debugging? [mullvad-browser]
- The Letterboxing>Content Alignment heading doesn't follow the Firefox design document capitalization [mullvad-browser]
- Add default bookmarks in the alpha channels for testing [mullvad-browser]
- Consider dropping protection against line-height introduced in #23104 [tor-browser]
- compat: beacon: re-enable the API but transform it to a no-op [tor-browser]
- Letterboxing preferences UI [tor-browser]
- Make the appearance of letterboxing look more intentional [tor-browser]
- Add option to reuse last window size when letterboxing is enabled [tor-browser]
- intl.accept_languages gets into a stuck modifed state [tor-browser]
- Drop dom.enable_resource_timing = false preference [tor-browser]
- browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are ignored for the new window opened by New Identity [tor-browser]
- Correctly round new windows when bookmarks toolbar is set to "Only Show on New Tab" [tor-browser]
- Fluent migration: new identity [tor-browser]
- Fluent migration: security level [tor-browser]
- compat: why is eventCounts undefined? [tor-browser]
- Visual noise in 13.5a4 letterboxing [tor-browser]
- Betterboxing: gradient is never shown [tor-browser]
- Betterboxing: make the decorator border disappear when the corners are flat [tor-browser]
- Change RFP-spoofed Timezone from UTC to a real-world, less discriminable one [tor-browser]
- Include Alpha and Nightly in MOZ_APP_DISPLAYNAME (and possibly in other places) [tor-browser]
- Fix betterboxing + findbar horizontal bounce if the scrollbar is not an overlay [tor-browser]
- Shrink the window to match letterboxing size when the emtpy area is doble-clicked [tor-browser]
- Install svg from branding theme to browser/chrome/icons/default [tor-browser]
- When startup window is maximized per letterboxing.rememberSize on startup, the restore button shrinks it to its minimum size [tor-browser]
- Update the profile directory patch to check both for system-install and for is-packaged-app file [tor-browser]
- Correctly record new initial window size after auto-shrinking [tor-browser]
- Try not to spoof system-ui in contexts exempt from RFP [tor-browser]
- Move base-browser.ftl Fluent file from "browser" to "toolkit" [tor-browser]
- Exempt pdf.js from letterboxing [tor-browser]
- Modify moz-support-link [tor-browser]
- Windows + macOS:
- Win ≤8.1 and macOS ≤10.14 not supported in ESR 128 [tor-browser]
- Add a banner warning users about the upcoming EOL for Win ≤8.1 and macOS ≤10.14 [tor-browser]
- Add support link to OS deprecation message [tor-browser]

Windows:
- Create asset(s) for the Mullvad Browser installer [mullvad-browser]
- Disable setting default browser on Windows [mullvad-browser]
- windows: FontSubstitutes can leak system locale [tor-browser]
- Add filetype association to the installer of Mullvad Browser [tor-browser-build]

Build System:
All Platforms:
- Move --disable-eme to OS- and architecture-specific mozconfigs [mullvad-browser]
- Deb package in the debian software installer is showing the License as "Proprietary" [mullvad-browser]
- Enable GeckoDriver for all desktop platforms [tor-browser]
- Update mach to work with python 3.12 [tor-browser]
- Bump the various branches to 13.5 on main [tor-browser-build]
- Create Release Prep MR generating script [tor-browser-build]
- Add command to unsign .mar files and compare with sha256sums-unsigned-build.txt [tor-browser-build]
- Add RPM dependencies to README [tor-browser-build]
- Sign mullvad-browser nightly updates [tor-browser-build]
- Dump more information about build times on Firefox [tor-browser-build]
- make fetch is not fetching mullvad repo [tor-browser-build]
- Set correct updater_url for Mullvad Browser nightly builds [tor-browser-build]
- Update detailsURL in tools/signing/nightly/update-responses-base-config.yml [tor-browser-build]
- Remove use of projects/browser/run_scripts [tor-browser-build]
- Update projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt [tor-browser-build]
- Update README for Ubuntu 24.04 unprivileged user namespace changes [tor-browser-build]
- Update keyring/boklm.gpg for new subkeys [tor-browser-build]
- Explicitly fetch tags in the release preparation script [tor-browser-build]
- Script to automate uploading sha256s and signatures to location signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo expects them to be [tor-browser-build]
- Add an option to create zip files using 7z [rbm]
- Move capture_exec to a separate module [rbm]
- We should remove ./ when using 7-zip for zip files [rbm]
- Correctly refresh file when computing input_files_id and a file is set as refresh_input [rbm]

Windows:
- Build system installer for Mullvad Browser on Windows [mullvad-browser]
- Use Clang to compile NSIS [tor-browser-build]
- Update NSIS to 3.09 [tor-browser-build]
- Do a cleanup of the NSIS script [tor-browser-build]
- Include the ShellLink plugin in NSIS [tor-browser-build]
- Draft the new installer for Mullvad Browser [tor-browser-build]
- $app_bundle is missing the final .app in projects/firefox/build [tor-browser-build]
- authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
- Explicitly initialize the plugin directory on the Windows installer [tor-browser-build]
- Stop generating an MB "portable" windows install [tor-browser-build]


Mullvad Browser 13.0.10
- Updated Firefox to 115.8.0esr
- Updated mullvad-browser-extension to 0.8.5
- Rebase Mullvad Browser Stable onto Firefox 115.8.0esr
- Spoof english leaks via numberingSystem: numbers (non-latn) or decimal separator (latn)

Build System:
- Set time on signing machine before starting signing
- Use Capture::Tiny instead of IO::CaptureOutput
- Switch from IO::CaptureOutput to Capture::Tiny
- Make stdout and stderr utf8


Mullvad Browser 13.0.4
- Updated Firefox to 115.5.0esr
- Updated uBlock Origin to 1.53.0
- Enable storage.sync to fix broken webextensions [mullvad-browser]
- Rebase Mullvad Browser Stable to 115.5.0esr [mullvad-browser]
- Blank Net Error page on name resolution failure [tor-browser]
- Empty the clipboard on browser shutdown only if content comes from private browsing windows [tor-browser]

Build:
- Remove $bundle_locales from signing scripts now that we're on ALL for everything [tor-browser-build]
- Fix logging in tools/signing/do-all-signing [tor-browser-build]
- Add .nobackup files to reproducible and disposable directores [tor-browser-build]
- Fix typo in finished-signing-clean-linux signer


Mullvad Browser 12.5.5
- Updated NoScript to 11.4.27
- Upated uBlock Origin to 1.52.2
- Backport security fixes from Firefox 118 to ESR 102.15 / 115.3 - based Tor Browser [tor-browser]


Mullvad Browser 12.5.3
All Platforms:
- Updated Translations
- Updated Firefox to 102.15.0esr
- Bug 232: Rebase Mullvad Browser stable onto 102.15
- Bug 42053: Backport security fixes from Firefox 117 to ESR 102.15 - based Tor Browser
- Bug 40937: First window after update should go to the user-friendly release page on GitHub

Build System:
All Platforms:
- Bug 40857: Mullvad Browser generated downloads.json references tbb-* build tag rather than mb-*
- Bug 40913: add boklm back to list of taggers in relevant projects
- Bug 40921: staticiforme-prepare-cdn-dist-upload uses hardcoded torbrowser path for .htacess file generation


Mullvad Browser 12.5.2
- Change log not available for this version


Mullvad Browser 12.5.1
- Updated Firefox to 102.13.0esr
- Bug 192: Rebase Mullvad Browser 12.5 stable on top of 102.13esr
- Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads