A collaboration between Mullvad VPN and the Tor Project

Mullvad Browser

Mullvad Browser

  -  90.3 MB  -  Freeware
  • Latest Version

    Mullvad Browser 14.0 LATEST

  • Review by

    Juan Garcia

  • Operating System

    Windows 10 (64-bit) / Windows 11

  • User Rating

    Click to vote
  • Author / Product

    Amagicom AB / External Link

  • Filename

    mullvad-browser-windows-x86_64-14.0.exe

Mullvad Browser is a free privacy-focused web browser that aims to provide users with a secure and private browsing experience by directly infusing security-focused add-ons in cooperation with Mullvad VPN and the Tor Project.

This all-in-one solution allows users of all ages and knowledge levels to drastically reinforce their online security and prevent their private data from being tracked and collected by large corporations, ad monitoring services, and malicious online destinations.

To best serve the needs of all its users, this chromium-based browser platform comes with preinstalled security features that not only dramatically reduce the online fingerprint of each of its user but also allows faster and more streamlined browsing on websites where trackers and ads are prevented to be loaded.

And all of that and much more is done without any built-in tracking and telemetry features that are often a crucial part of all popular internet browser apps.

Features

Privacy Protection – Prevent websites from tracking browsing history or collecting personal data.

Ad Blocking – Block ads and trackers for a cleaner and faster browsing experience.

VPN Integration – Built-in support for enhancing privacy and security by routing all traffic via encrypted VPN servers.

Prevent cross-site tracking – Automatically isolate tabs one from another to prevent cross-site data tracking.

Secure Connection – Full focus on HTTPS Everywhere ensures always-active secure connection.

How to Use

To get this app up and running on any modern Windows PC, users are only required to download and install an automated installer downloaded from a secure source such as the official website or internal FileHorse servers.

After the app is deployed, users can simply run it and access a standard-looking web browser dashboard that promotes fast and secure access to all internet content.

User Interface

The user interface is clean and minimalist, with a focus on privacy and security.

Many of its security features come fully activated, but some add-ons such as VPN can be activated by user request by simply locating the VPN icon near the main address field. The browser add-on taskbar is also home to the uBlock Origin, the world’s most capable third-party tracker blocker. Users can activate its drop-down dashboard by simply clicking on its icon, accessing a small configuration screen for whitelisting, and other tools useful for monitoring and customizing the look of the webpage elements.

FAQ

What is Mullvad Browser?
It’s a privacy-focused web browser with pre-installed ad and tracking blockers that prevent tracking of users’ habits and collection of private data.

Is it safe?
Yes, this app is 100% secure from viruses and other malware. The developers have infused the app with the latest advanced security features to ensure user privacy and safety.

What platforms does this app support?
In addition to 64-bit Windows 10 and Windows 11, this app can also be installed on macOS, and Linux, and many of its features can also be added via a simple Firefox Extension add-on.

Alternatives

Tor Browser - A Privacy-focused web browser that uses the Tor network to protect your privacy.

Brave Browser - One of the most popular secure web browsers with built-in ad blocking and privacy protection features.

Firefox - Legendary privacy-focused browser app developed by Mozilla.

Opera - It brings you more speed, more discoveries, and more safety.

Pricing

This app is 100% FREE. It does not feature any hidden premium features, premium unlocks, in-app ads or promotions, or subscriptions.

System Requirements

This lightweight browser app is compatible with Windows (64-bit Windows 10 and newer), macOS, and Linux.

PROS
  • Strong privacy protection features.
  • Integrated with Mullvad VPN.
  • Free to use.
  • Minimalist interface.
CONS
  • No native mobile version is available.
Conclusion

Mullvad Browser is an extremely solid choice for users of all knowledge levels that are concerned about their online privacy and who want to reduce the number of ads and trackers that hamper their browsing experience. With its strong privacy protection features and integration with the very effective and easy-to-use Mullvad VPN service, it provides a secure and private browsing experience.

  • Mullvad Browser 14.0 Screenshots

    The images below have been resized. Click on them to view the screenshots in full size.

    Mullvad Browser 14.0 Screenshot 1
  • Mullvad Browser 14.0 Screenshot 2
  • Mullvad Browser 14.0 Screenshot 3
  • Mullvad Browser 14.0 Screenshot 4
  • Mullvad Browser 14.0 Screenshot 5

What's new in this version:

Mullvad Browser 14.0
Updated:
- Updated Firefox to 128.4.0esr
- Updated NoScript to 11.5.2
- Updated Mullvad Browser Extension to 0.9.3

Fixed:
- Provide search engine icons
- Remove the Security Levels icon from the toolbar
- set media.navigator.enabled = true
- Tidy up mullvad Fluent files
- compat: make spoofed orientation reflect spoofed screen dimensions
- 10ms time precision via EXSLT date-time function
- NoScript default whitelist re-appears on clicking NoScript Options / Reset
- Re-enable Picture-in-Picture mode
- Re-enable screenshots component
- Add more color aliases that take dark mode into account
- Backport Bugzilla 1834307 and hide smooth-scroll UX
- pdfjs.disabled used to be part of RFP until Bug 1838415; lock pref to false in stable
- Review 000-tor-browser.js and 001-base-profile.js for 128
- "New window" missing from File menu
- Several console errors: Console.maxLogLevelPref used with a non-existing pref:
- Check Bug 1894779: Allow font-face urls to be resource:// urls and relax CORS for resource:// URLs
- Remove safebrowsing URLs
- Set clipboard.imageAsFile.enabled to false
- Restore the HTML form on DDG when using safest in 128
- Review LaterRun in 128
- Disable Firefox Flame button due to unknown interactions with New Identity
- Move from panel-footer class to moz-button-group
- toolbar rules in panelUI-shared.css are unneccessary
- Remove migrations for security.certerrors.mitm.auto_enable_enterprise_roots
- "Switching to a new device" regressed on 128
- The Neterror page has a checkbox to report iframe origin errors to TPO
- Drop "Learn More" spacing
- Add description-deemphasized class to our additions to about:preferences
- Use a more robust approach to hide the "tracking protection" urlbar button
- Create script to generate issue triage csv's from bugzilla query and git scraping
- Disable network prefetch
- compat: ESR128: enable textmetrics
- Disable Privacy-Preserving Attribution
- Drop level="top" attribute from panels
- Drop the badged="true" attribute from security level button
- Update our preferences to account for new line height
- Remove the firefox-view button from UI, even when always-on private-browsing mode is disabled
- Make RemoteSettings use only local dumps
- Disable recent search suggestions
- Stop trying to hide "Restore previous session"
- Inconsistent use of "New private window" vs "New window"
- Remove some residuals from update scripts
- Unconditionally disable find-bar transition animation
- Remove 'Website Privacy Preferences' and ensure sensible default prefs
- Opt out from Firefox relay by default.
- Remove the shopping components
- Disable contentRelevancy component
- Disable translations until audited and solved the UX problems
- check bounceTrackingProtection in PB mode does not persist to disk
- moz-message-bar does not get announced on Orca screen-reader
- Backport fix for Mozilla 1436462
- Verify whether an update is unsupported before choosing one
- Remove mention of Firefox Relay from settings
- Hide 'Always underline links' option
- Backport Bugzilla 1436226 Hardcode VP8/VP9
- Ensure non-privacy browsing also sets the GPC header
- Disable offscreen canvas until verified it is not fingerprintable
- Prevent search-bar from being auto-hidden when not used for awhile
- Audit fingerprinting overrides (MozBug 1834274)
- Backport Bugzilla 1922294: RFP: fixup square spoofed orientation
- Disable automatic exception for HTTPS-First
- UI freezes when clipboard is empty after screen lock
- Fullscreen videos have rounded letterboxing corners
- NoScript-blocked content placeholders causing slow downs
- NoScript Lifecycle error on extension updates
- Check and update bundled font versions
- Revert the OS deprecation notification introduced in #42347
- windows: remove UI for "open Tor Browser automatically when computer starts"
- Move tb-dev to base-browser
- Set SOURCE_DATE_EPOCH in the default env variables
- Update toolchains for ESR128
- Split the Rust configuration options
- Update list of people with github commit access in MB issue templates
- Upgrade binutils to 2.41
- Remove binutils when not needed
- tools/signing/upload-update_responses-to-staticiforme should regenerate update-responses when it already exists
- Skip versions which don't set incremental_from when generating incrementals
- Don't set legacy version for Mullvad Browser
- Improve fetch_changelogs.py for major releases
- Add @PieroV and @ma1 as new signers
- Fix single-browser in relprep.py
- Modify update-responses to prevent upgrades on unsupported Windows and macOS versions
- Drop mingw-w64/gcc toolchain
- Use mingw-w64/clang toolchain to build Rust
- Implement missing Windows headers required for building cross-compiling WebRTC with mingw


Mullvad Browser 13.5.9
- Updated Firefox to 115.17.0esr
- Updated NoScript to 11.4.42

Fixed:
- Issue with custom home page on local filesystem [tor-browser]
- Backport Mozbug 1886222 [tor-browser]
- Backport security fixes from Firefox 132 [tor-browser]
- relprep.py: bump Firefox and GV to a (yet) non-existing tag when the last one does not match HEAD [tor-browser-build]


Mullvad Browser 13.5.7
- Updated uBlock Origin to 1.60.0
- Bug 361: SSL_ERROR_NO_CYPHER_OVERLAP on some Brazilian government websites [mullvad-browser]
- Bug 43201: Security fixes from Firefox 131.0.2 [tor-browser]


Mullvad Browser 13.5.6
- Updated Firefox to 115.16.0esr
- Updated NoScript to 11.4.40

Fixed:
- Rebase Mullvad Browser Release onto Firefox 115.16.0esr [mullvad-browser]
- Download spam prevention should not affect browser extensions [tor-browser]
- Backport security fixes from Firefox 131 [tor-browser]


Mullvad Browser 13.5.2
- Updated Firefox to 115.14.0esr
- Updated NoScript to 11.4.31
- Updated uBlock Origin to 1.59
- Bug 325: Rebase Mullvad Browser Stable onto 115.14.0esr [mullvad-browser]


Mullvad Browser 13.5.1
- Updated Firefox to 115.13.0esr
- Rebase Mullvad Browser stable onto 115.13.0esr [mullvad-browser]
- Backports security fixes from Firefox 128 [tor-browser]
- Mullvad Browser is not listed as a possible default browser application for Gnome on Ubuntu / Fedora [mullvad-browser]
- Use the GitHub repository for firefox-l10n [tor-browser-build]
- Fix permission issue on files in the debian directory [tor-browser-build]
- Include Windows installer without -portable- in download json files [tor-browser-build]


Mullvad Browser 13.5
All Platforms:
- Hide "List all tabs" when the tabs don't overflow [mullvad-browser]
- Make User-Agent request header match RFP's navigator.userAgent [mullvad-browser]
- Move network.proxy.failover_direct=false pref to base-browser [mullvad-browser]
- Update nightly mar signing key [mullvad-browser]
- Mouse-over long links causes the browser element to re-center relative to width of status tooltip [mullvad-browser]
- Should we reflect the actual channel in about:debugging? [mullvad-browser]
- The Letterboxing>Content Alignment heading doesn't follow the Firefox design document capitalization [mullvad-browser]
- Add default bookmarks in the alpha channels for testing [mullvad-browser]
- Consider dropping protection against line-height introduced in #23104 [tor-browser]
- compat: beacon: re-enable the API but transform it to a no-op [tor-browser]
- Letterboxing preferences UI [tor-browser]
- Make the appearance of letterboxing look more intentional [tor-browser]
- Add option to reuse last window size when letterboxing is enabled [tor-browser]
- intl.accept_languages gets into a stuck modifed state [tor-browser]
- Drop dom.enable_resource_timing = false preference [tor-browser]
- browser.startup.homepage and TOR_DEFAULT_HOMEPAGE are ignored for the new window opened by New Identity [tor-browser]
- Correctly round new windows when bookmarks toolbar is set to "Only Show on New Tab" [tor-browser]
- Fluent migration: new identity [tor-browser]
- Fluent migration: security level [tor-browser]
- compat: why is eventCounts undefined? [tor-browser]
- Visual noise in 13.5a4 letterboxing [tor-browser]
- Betterboxing: gradient is never shown [tor-browser]
- Betterboxing: make the decorator border disappear when the corners are flat [tor-browser]
- Change RFP-spoofed Timezone from UTC to a real-world, less discriminable one [tor-browser]
- Include Alpha and Nightly in MOZ_APP_DISPLAYNAME (and possibly in other places) [tor-browser]
- Fix betterboxing + findbar horizontal bounce if the scrollbar is not an overlay [tor-browser]
- Shrink the window to match letterboxing size when the emtpy area is doble-clicked [tor-browser]
- Install svg from branding theme to browser/chrome/icons/default [tor-browser]
- When startup window is maximized per letterboxing.rememberSize on startup, the restore button shrinks it to its minimum size [tor-browser]
- Update the profile directory patch to check both for system-install and for is-packaged-app file [tor-browser]
- Correctly record new initial window size after auto-shrinking [tor-browser]
- Try not to spoof system-ui in contexts exempt from RFP [tor-browser]
- Move base-browser.ftl Fluent file from "browser" to "toolkit" [tor-browser]
- Exempt pdf.js from letterboxing [tor-browser]
- Modify moz-support-link [tor-browser]
- Windows + macOS:
- Win ≤8.1 and macOS ≤10.14 not supported in ESR 128 [tor-browser]
- Add a banner warning users about the upcoming EOL for Win ≤8.1 and macOS ≤10.14 [tor-browser]
- Add support link to OS deprecation message [tor-browser]

Windows:
- Create asset(s) for the Mullvad Browser installer [mullvad-browser]
- Disable setting default browser on Windows [mullvad-browser]
- windows: FontSubstitutes can leak system locale [tor-browser]
- Add filetype association to the installer of Mullvad Browser [tor-browser-build]

Build System:
All Platforms:
- Move --disable-eme to OS- and architecture-specific mozconfigs [mullvad-browser]
- Deb package in the debian software installer is showing the License as "Proprietary" [mullvad-browser]
- Enable GeckoDriver for all desktop platforms [tor-browser]
- Update mach to work with python 3.12 [tor-browser]
- Bump the various branches to 13.5 on main [tor-browser-build]
- Create Release Prep MR generating script [tor-browser-build]
- Add command to unsign .mar files and compare with sha256sums-unsigned-build.txt [tor-browser-build]
- Add RPM dependencies to README [tor-browser-build]
- Sign mullvad-browser nightly updates [tor-browser-build]
- Dump more information about build times on Firefox [tor-browser-build]
- make fetch is not fetching mullvad repo [tor-browser-build]
- Set correct updater_url for Mullvad Browser nightly builds [tor-browser-build]
- Update detailsURL in tools/signing/nightly/update-responses-base-config.yml [tor-browser-build]
- Remove use of projects/browser/run_scripts [tor-browser-build]
- Update projects/browser/Bundle-Data/Docs/Licenses/NoScript.txt [tor-browser-build]
- Update README for Ubuntu 24.04 unprivileged user namespace changes [tor-browser-build]
- Update keyring/boklm.gpg for new subkeys [tor-browser-build]
- Explicitly fetch tags in the release preparation script [tor-browser-build]
- Script to automate uploading sha256s and signatures to location signing/download-unsigned-sha256sums-gpg-signatures-from-people-tpo expects them to be [tor-browser-build]
- Add an option to create zip files using 7z [rbm]
- Move capture_exec to a separate module [rbm]
- We should remove ./ when using 7-zip for zip files [rbm]
- Correctly refresh file when computing input_files_id and a file is set as refresh_input [rbm]

Windows:
- Build system installer for Mullvad Browser on Windows [mullvad-browser]
- Use Clang to compile NSIS [tor-browser-build]
- Update NSIS to 3.09 [tor-browser-build]
- Do a cleanup of the NSIS script [tor-browser-build]
- Include the ShellLink plugin in NSIS [tor-browser-build]
- Draft the new installer for Mullvad Browser [tor-browser-build]
- $app_bundle is missing the final .app in projects/firefox/build [tor-browser-build]
- authenticode-timestamping.sh fails to run again because tmp-timestamp already exists [tor-browser-build]
- Explicitly initialize the plugin directory on the Windows installer [tor-browser-build]
- Stop generating an MB "portable" windows install [tor-browser-build]


Mullvad Browser 13.0.10
- Updated Firefox to 115.8.0esr
- Updated mullvad-browser-extension to 0.8.5
- Rebase Mullvad Browser Stable onto Firefox 115.8.0esr
- Spoof english leaks via numberingSystem: numbers (non-latn) or decimal separator (latn)

Build System:
- Set time on signing machine before starting signing
- Use Capture::Tiny instead of IO::CaptureOutput
- Switch from IO::CaptureOutput to Capture::Tiny
- Make stdout and stderr utf8


Mullvad Browser 13.0.4
- Updated Firefox to 115.5.0esr
- Updated uBlock Origin to 1.53.0
- Enable storage.sync to fix broken webextensions [mullvad-browser]
- Rebase Mullvad Browser Stable to 115.5.0esr [mullvad-browser]
- Blank Net Error page on name resolution failure [tor-browser]
- Empty the clipboard on browser shutdown only if content comes from private browsing windows [tor-browser]

Build:
- Remove $bundle_locales from signing scripts now that we're on ALL for everything [tor-browser-build]
- Fix logging in tools/signing/do-all-signing [tor-browser-build]
- Add .nobackup files to reproducible and disposable directores [tor-browser-build]
- Fix typo in finished-signing-clean-linux signer


Mullvad Browser 12.5.5
- Updated NoScript to 11.4.27
- Upated uBlock Origin to 1.52.2
- Backport security fixes from Firefox 118 to ESR 102.15 / 115.3 - based Tor Browser [tor-browser]


Mullvad Browser 12.5.3
All Platforms:
- Updated Translations
- Updated Firefox to 102.15.0esr
- Bug 232: Rebase Mullvad Browser stable onto 102.15
- Bug 42053: Backport security fixes from Firefox 117 to ESR 102.15 - based Tor Browser
- Bug 40937: First window after update should go to the user-friendly release page on GitHub

Build System:
All Platforms:
- Bug 40857: Mullvad Browser generated downloads.json references tbb-* build tag rather than mb-*
- Bug 40913: add boklm back to list of taggers in relevant projects
- Bug 40921: staticiforme-prepare-cdn-dist-upload uses hardcoded torbrowser path for .htacess file generation


Mullvad Browser 12.5.2
- Change log not available for this version


Mullvad Browser 12.5.1
- Updated Firefox to 102.13.0esr
- Bug 192: Rebase Mullvad Browser 12.5 stable on top of 102.13esr
- Bug 41854: Download Spam Protection cannot be overridden to allow legitimate downloads