Nothing Private Browser β
A privacy-first browser built on Qt6 + Chromium WebEngine. No telemetry, no session persistence, no black boxes β just a browser that actually respects you.
Overview β
Nothing Private Browser is the privacy-focused sibling of Nothing Browser. It shares the same core engine but with different defaults and features.
| Feature | Nothing Browser | Nothing Private Browser |
|---|---|---|
| Network capture | β Full DevTools | β Disabled by default |
| Session persistence | β Auto-save | β Zero persistence |
| Telemetry | β None | β None |
| Fingerprint spoofing | β Yes | β Yes |
| WebRTC leak protection | β οΈ Optional | β Enabled by default |
| Cookie storage | Persistent | Session-only |
| Cache | Persistent | Wiped on close |
| Use case | Scraping/API reverse engineering | Anonymous browsing |
Why Private Browser? β
Most browsers claim to be private but:
- Send telemetry toζ―ε ¬εΈ
- Store browsing history
- Keep cookies after you close
- Leak your real IP via WebRTC
- Have unique fingerprints
Nothing Private Browser solves all of these.
Key Features β
Zero Telemetry β
// No analytics, no phoning home
// No crash reporting
// No usage metrics
// NothingThe browser does exactly one thing: render web pages. Nothing else.
Zero Session Persistence β
On close, everything is wiped:
- β Cookies deleted
- β Cache cleared
- β localStorage emptied
- β sessionStorage cleared
- β History removed
- β IndexedDB purged
// On close
void PrivateBrowser::closeEvent() {
m_profile->cookieStore()->deleteAllCookies();
m_profile->clearHttpCache();
m_profile->clearAllVisitedLinks();
m_storageManager->clearAll();
}Fingerprint Spoofing β
Same as Nothing Browser β injected at DocumentCreation:
- Chrome User-Agent
- Spoofed hardware concurrency
- Spoofed device memory
- Canvas noise (xorshift PRNG)
- Audio noise
- WebGL vendor/renderer spoofing
WebRTC Leak Protection β
STUN servers are stripped from ICE config:
// Before: Your real IP exposed
iceServers: [{ urls: "stun:stun.l.google.com:19302" }]
// After: STUN servers removed
iceServers: [] // Your real IP never leaksUA-CH Spoofing β
navigator.userAgentData and getHighEntropyValues() return consistent spoofed values:
navigator.userAgentData.brands
// [{brand: "Chromium", version: "124"}, ...]
await navigator.userAgentData.getHighEntropyValues(["architecture", "model"])
// {architecture: "x86", model: "MacBookPro18,1", ...}Installation β
Linux (Debian/Ubuntu) β
# Add repository
curl -fsSL https://pub-5119122a931748c3b649ad4ca5aab522.r2.dev/nothing-browser-key.gpg \
| sudo gpg --dearmor -o /usr/share/keyrings/nothing-browser.gpg
echo 'deb [signed-by=/usr/share/keyrings/nothing-browser.gpg] https://pub-5119122a931748c3b649ad4ca5aab522.r2.dev stable main' \
| sudo tee /etc/apt/sources.list.d/nothing-browser.list
# Install
sudo apt update && sudo apt install nothing-private-browserLinux (.deb) β
sudo dpkg -i nothing-private-browser_*_amd64.debLinux (tar.gz) β
tar -xzf nothing-private-browser-*-linux-x86_64.tar.gz
cd nothing-private-browser-*-linux-x86_64
./nothing-private-browserArch Linux β
yay -S nothing-private-browsermacOS β
Download the .dmg from Releases β drag to Applications.
Windows β
Download the .zip from Releases β extract β run nothing-private-browser.exe.
Privacy Features Deep Dive β
Cookie Management β
Cookies are session-only by default:
// No persistent cookie storage
m_profile->setPersistentStoragePath("");
m_profile->setPersistentCookiesPolicy(
QWebEngineProfile::NoPersistentCookies
);Cache Behavior β
Cache is cleared on every close:
void PrivateBrowser::clearCache() {
m_profile->clearHttpCache();
m_profile->clearAllVisitedLinks();
m_profile->clearRequestFilter();
}Storage Isolation β
Each session gets fresh storage:
// New storage for each session
m_profile = new QWebEngineProfile("PrivateSession_" + QUuid::createUuid().toString());Planned Features β
Ad Blocker (v0.2.0) β
Network-level, filter-list based ad blocking:
// Coming soon
class AdBlocker : public QWebEngineUrlRequestInterceptor {
void interceptRequest(QWebEngineUrlRequestInfo &info) override {
if (isAdDomain(info.requestUrl().host())) {
info.block(true);
}
}
};Tor Routing (v0.3.0) β
Optional onion routing, one toggle:
// Coming soon
void enableTor() {
m_profile->setProxy(QNetworkProxy::Socks5Proxy, "127.0.0.1", 9050);
// Route all traffic through Tor
}ProtonVPN Support (v0.3.0) β
Import .ovpn or WireGuard config file directly:
// Coming soon
void importVPNConfig(const QString& filePath) {
// Parse OpenVPN or WireGuard config
// Configure system VPN
// Route browser traffic through VPN
}Comparison with Other Privacy Browsers β
| Feature | Nothing Private | Brave | Firefox | Tor Browser |
|---|---|---|---|---|
| Zero telemetry | β Yes | β οΈ Some | β οΈ Some | β Yes |
| Fingerprint spoofing | β Yes | β Yes | β οΈ Limited | β Yes |
| Session persistence | β None | β οΈ Optional | β οΈ Persistent | β None |
| WebRTC leak protection | β Yes | β Yes | β οΈ Partial | β Yes |
| Built-in ad blocker | π Planned | β Yes | β οΈ Extension | β Yes |
| Tor integration | π Planned | β οΈ Private mode | β No | β Yes |
| Open source | β MIT | β MPL | β MPL | β BSD |
Limitations β
Sites That May Not Work β
| Site | Status | Reason |
|---|---|---|
| Google Search | β οΈ May block | Fingerprinting |
| Gmail | β οΈ May block | Account protection |
| β οΈ Often blocks | Bot detection | |
| Banking sites | β οΈ May block | Security measures |
| Cloudflare sites | β Works | TLS matches Chrome |
Known Limitations β
| Limitation | Description |
|---|---|
| No Chrome extensions | Qt WebEngine limitation |
| No mobile emulation | Desktop-only |
| No sync across devices | Privacy by design |
| No password manager | Session-only storage |
Privacy Audit Status β
| Component | Status | Last Audit |
|---|---|---|
| Telemetry | β None | v0.1.0 |
| Data persistence | β Wiped on close | v0.1.0 |
| Fingerprint spoofing | β οΈ In progress | v0.1.3 |
| WebRTC leaks | β Fixed | v0.1.1 |
| DNS leaks | β οΈ Needs VPN | v0.3.0 planned |
Roadmap β
| Version | Focus | Features |
|---|---|---|
| v0.1.0 | Core privacy | Zero telemetry, session wipe |
| v0.1.1 | Network leaks | WebRTC protection |
| v0.1.2 | Fingerprinting | UA-CH spoofing |
| v0.1.3 | Canvas/Audio | xorshift PRNG noise |
| v0.2.0 | Ad blocking | Network-level filter lists |
| v0.3.0 | Anonymity | Tor routing, VPN support |
| v1.0.0 | Stable | Full privacy audit |
Quick Start β
First Launch β
# Linux
nothing-private-browser
# macOS
open /Applications/Nothing\ Private\ Browser.app
# Windows
nothing-private-browser.exeThe browser opens with:
- Fresh session (no previous data)
- Fingerprint spoofing enabled
- WebRTC protection on
- No telemetry
Using the Browser β
- Browse normally β all privacy features work automatically
- Close the browser β everything is wiped
- Reopen β fresh session, no traces
No settings to configure. No privacy toggles to find. It just works.
Image Assets Notice β
Some image assets used in this project are sourced externally and may be subject to third-party rights.
If a DMCA or copyright complaint is filed against any asset, it will be removed promptly. Assets are not guaranteed to stay in the repo permanently β if you depend on specific images in a fork, host your own copies.
License β
MIT License β use it, modify it, fork it. Just don't add telemetry.
Next Steps β
- Privacy Features β Deep dive into privacy protections
- Installation β Detailed install guides
- Roadmap β Upcoming features
Nothing Ecosystem Β· Ernest Tech House Β· Kenya Β· 2026
Built by Ernest Tech House