1
0
mirror of https://github.com/privacyguides/i18n.git synced 2025-11-01 14:16:32 +00:00
Files
i18n/i18n/nl/mobile-browsers.md
2025-10-28 08:39:46 +00:00

400 lines
19 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

---
meta_title: "Privacy Respecting Web Browsers for Android and iOS - Privacy Guides"
title: Mobiele browsers
icon: material/cellphone-information
description: Deze browsers zijn wat we momenteel aanbevelen voor standaard/niet-anoniem internetten op jouw telefoon.
cover: mobile-browsers.webp
schema:
-
"@context": http://schema.org
"@type": WebPage
name: Aanbevelingen voor privé mobiele browsers
url: "./"
relatedLink: "../desktop-browsers/"
-
"@context": http://schema.org
"@type": MobileApplication
name: Brave
image: /assets/img/browsers/brave.svg
url: https://brave.com
applicationCategory: Web Browser
operatingSystem:
- Android
- iOS
subjectOf:
"@type": WebPage
url: "./"
-
"@context": http://schema.org
"@type": MobileApplication
name: Cromite
image: /assets/img/browsers/cromite.svg
url: https://cromite.org
applicationCategory: Web Browser
operatingSystem:
- Android
subjectOf:
"@type": WebPage
url: "./"
-
"@context": http://schema.org
"@type": MobileApplication
name: Safari
image: /assets/img/browsers/safari.svg
url: https://apple.com/safari
applicationCategory: Web Browser
operatingSystem:
- iOS
subjectOf:
"@type": WebPage
url: "./"
---
<small>Protects against the following threat(s):</small>
- [:material-account-cash: Surveillance kapitalisme](basics/common-threats.md#surveillance-as-a-business-model ""){.pg-brown}
These are our currently recommended **mobile web browsers** and configurations for standard/non-anonymous internet browsing. In het algemeen raden we aan om extensies tot een minimum te beperken: ze hebben geprivilegieerde toegang binnen jouw browser, vereisen dat je de ontwikkelaar vertrouwt, kunnen je [doen opvallen](https://en.wikipedia.org/wiki/Device_fingerprint#Browser_fingerprint), en [verzwakken](https://groups.google.com/a/chromium.org/g/chromium-extensions/c/0ei-Uchnm34/m/lDaXwQhzBAAJ) site-isolatie.
## Brave
<div class="admonition recommendation" markdown>
![Brave logo](assets/img/browsers/brave.svg){ align=right }
**Brave Browser** includes a built-in content blocker and [privacy features](https://brave.com/privacy-features), many of which are enabled by default.
Brave is gebouwd op het Chromium webbrowser project, dus het zou vertrouwd moeten aanvoelen en minimale website compatibiliteitsproblemen moeten hebben.
[:octicons-home-16: Homepage](https://brave.com){ .md-button .md-button--primary }
[:simple-torbrowser:](https://brave4u7jddbv7cyviptqjc7jusxh72uik7zt6adtckl5f4nwy2v72qd.onion){ .card-link title="Onion Service" }
[:octicons-eye-16:](https://brave.com/privacy/browser){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.brave.com){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/brave/brave-browser){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-googleplay: Google Play](https://play.google.com/store/apps/details?id=com.brave.browser)
- [:simple-appstore: App Store](https://apps.apple.com/app/id1052879175)
- [:simple-github: GitHub](https://github.com/brave/brave-browser/releases)
- [:simple-fdroid: F-Droid](https://brave-browser-apk-release.s3.brave.com/fdroid/repo/index.html)
</details>
</div>
### Recommended Brave Configuration
Tor Browser is de enige manier om echt anoniem op het internet te surfen. Wanneer je Brave gebruikt, raden we je aan de volgende instellingen te wijzigen om jouw privacy tegen bepaalde partijen te beschermen, maar alle browsers behalve de [Tor Browser](tor.md#tor-browser) zijn in sommige opzichten traceerbaar door *iemand*.
=== "Android"
These options can be found in :material-menu: → **Settings****Brave Shields & privacy**.
=== "iOS"
These options can be found in :fontawesome-solid-ellipsis: → **Settings****Shields & Privacy**.
#### Brave shields global defaults
Brave includes some anti-fingerprinting measures in its [Shields](https://support.brave.com/hc/articles/360022973471-What-is-Shields) feature. We suggest configuring these options [globally](https://support.brave.com/hc/articles/360023646212-How-do-I-configure-global-and-site-specific-Shields-settings) across all pages that you visit.
De opties van Shields kunnen naar behoefte per site worden gedowngrade, maar standaard raden wij aan de volgende opties in te stellen:
=== "Android"
<div class="annotate" markdown>
- [x] Select **Aggressive** under *Block trackers & ads*
- [x] Select **Auto-redirect AMP pages**
- [x] Select **Auto-redirect tracking URLs**
- [x] Select **Require all connections to use HTTPS (strict)** under *Upgrade connections to HTTPS*
- \[x\] (Optional) Select **Block Scripts** (1)
- [x] Select **Block third-party cookies** under *Block Cookies*
- [x] Select **Block Fingerprinting**
- [x] Select **Prevent fingerprinting via language settings**
<details class="warning" markdown>
<summary>Use default filter lists</summary>
Brave allows you to select additional content filters within the **Content Filtering** menu or the internal `brave://adblock` page. Wij raden het gebruik van deze functie af; houd in plaats daarvan de standaardfilterlijsten aan. Het gebruik van extra lijsten zorgt ervoor dat u zich onderscheidt van andere Brave gebruikers en kan ook het aanvalsoppervlak vergroten als er een exploit in Brave is en een kwaadaardige regel wordt toegevoegd aan één van de lijsten die je gebruikt.
</details>
- [x] Select **Forget me when I close this site**
</div>
1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*.
=== "iOS"
<div class="annotate" markdown>
- [x] Select **Aggressive** under *Trackers & Ads Blocking*
- [x] Select **Strict** under *Upgrade Connections to HTTPS*
- [x] Select **Auto-Redirect AMP pages**
- [x] Select **Auto-Redirect Tracking URLs**
- \[x\] (Optional) Select **Block Scripts** (1)
- [x] Select **Block Fingerprinting**
- [x] Select **Site Tabs Closed** under *Auto Shred*
<details class="warning" markdown>
<summary>Use default filter lists</summary>
Brave allows you to select additional content filters within the **Content Filtering** menu. Wij raden het gebruik van deze functie af; houd in plaats daarvan de standaardfilterlijsten aan. Het gebruik van extra lijsten zorgt ervoor dat u zich onderscheidt van andere Brave gebruikers en kan ook het aanvalsoppervlak vergroten als er een exploit in Brave is en een kwaadaardige regel wordt toegevoegd aan één van de lijsten die je gebruikt.
</details>
</div>
1. This option disables JavaScript, which will break a lot of sites. To unbreak them, you can set exceptions on a per-site basis by tapping on the Shield icon in the address bar and unchecking this setting under *Advanced controls*.
##### Clear browsing data (Android only)
- [x] Selecteer **Gegevens wissen bij het sluiten van de browser**
##### Social Media Blocking (Android only)
- [ ] Uncheck alle sociale media componenten uit
#### Other privacy settings
=== "Android"
<div class="annotate" markdown>
- [x] Select **Disable non-proxied UDP** under [*WebRTC IP handling policy*](https://support.brave.com/hc/articles/360017989132-How-do-I-change-my-Privacy-Settings#webrtc)
- \[x\] (Optional) Select **No protection** under *Safe Browsing* (1)
- [ ] Uncheck **Allow sites to check if you have payment methods saved**
- [ ] Uncheck **Javascript optimization & security** under the setting with the same name
- [x] Select **Close tabs on exit**
- [ ] Uncheck **Allow privacy-preserving product analytics (P3A)**
- [ ] Uncheck **Automatically send diagnostic reports**
- [ ] Uncheck **Automatically send daily usage ping to Brave**
</div>
1. Brave's [implementation of Safe Browsing](https://support.brave.com/hc/en-us/articles/15222663599629-Safe-Browsing-in-Brave) on Android **does not** proxy [Safe Browsing network requests](https://developers.google.com/safe-browsing/v4/update-api#checking-urls) like its desktop counterpart. This means that your IP address may be seen (and logged) by Google. Note that Safe Browsing is not available for Android devices without Google Play Services.
=== "iOS"
- [ ] Uncheck **Allow Privacy-Preserving Product Analytics (P3A)**
- [ ] Uncheck **Automatically send daily usage ping to Brave**
#### Leo
These options can be found in :material-menu: → **Settings****Leo**.
<div class="annotate" markdown>
- [ ] Uncheck **Show autocomplete suggestions in address bar** (1)
</div>
1. This option is not present in Brave's iOS app.
#### Search engines
These options can be found in :material-menu:/:fontawesome-solid-ellipsis: → **Settings****Search engines**.
- [Deselecteer **Zoeksuggesties weergeven**
#### Brave Sync
[Brave Sync](https://support.brave.com/hc/articles/360059793111-Understanding-Brave-Sync) allows your browsing data (history, bookmarks, etc.) to be accessible on all your devices without requiring an account and protects it with E2EE.
## Cromite (Android)
<div class="admonition recommendation" markdown>
![Cromite logo](assets/img/browsers/cromite.svg){ align=right }
**Cromite** is a Chromium-based browser with built-in ad blocking, fingerprinting protections, and other [privacy and security enhancements](https://github.com/uazo/cromite/blob/master/docs/FEATURES.md). It is a fork of the discontinued **Bromite** browser.
[:octicons-home-16: Homepage](https://cromite.org){ .md-button .md-button--primary }
[:octicons-eye-16:](https://github.com/uazo/cromite/blob/master/docs/PRIVACY_POLICY.md){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://github.com/uazo/cromite?tab=readme-ov-file#docs){ .card-link title="Documentation" }
[:octicons-code-16:](https://github.com/uazo/cromite){ .card-link title="Source Code" }
<details class="downloads" markdown>
<summary>Downloads</summary>
- [:simple-android: F-Droid](https://cromite.org/fdroid/repo/?fingerprint=49F37E74DEE483DCA2B991334FB5A0200787430D0B5F9A783DD5F13695E9517B)
- [:simple-github: GitHub](https://github.com/uazo/cromite/releases/latest)
</details>
</div>
### Aanbevolen configuratie
These options can be found in :material-menu: → :gear: **Settings****Privacy and security**.
#### Browsing data
- [x] Select **Close all open tabs on exit**
#### Incognito mode
- [x] Select **Open external links in incognito**
#### Veiligheid
- [x] Select **Always use secure connections**
This prevents you from unintentionally connecting to a website in plain-text HTTP. HTTP is extremely uncommon nowadays, so this should have little to no impact on your day-to-day browsing.
#### Adblock Plus settings
These options can be found in :material-menu: → :gear: **Settings****Adblock Plus settings**.
Cromite contains a customized version of Adblock Plus with EasyList enabled by default, as well as options to select more filter lists within the **Filter lists** menu.
Using extra lists will make you stand out from other Cromite users and may also increase attack surface if a malicious rule is added to one of the lists you use.
- \[x\] (Optional) Select **Enable anti-circumvention and snippets**
This setting adds an additional Adblock Plus list that may increase the effectiveness of Cromite's content blocking. The warnings about standing out and potentially increasing attack surface apply.
#### Legacy Adblock settings
These options can be found in :material-menu: → :gear: **Settings****Legacy Adblock settings**.
- [ ] Uncheck the autoupdate setting
This disables update checks for the unmaintained Bromite adblock filter.
## Safari (iOS)
On iOS, any app that can browse the web is [restricted](https://developer.apple.com/app-store/review/guidelines) to using an Apple-provided [WebKit framework](https://developer.apple.com/documentation/webkit), so a browser like [Brave](#brave) does not use the Blink engine (the core component of Chromium) like its counterparts on other operating systems.
<div class="admonition recommendation" markdown>
![Safari-logo](assets/img/browsers/safari.svg){ align=right }
**Safari** is de standaardbrowser in iOS. It includes [privacy features](https://support.apple.com/guide/iphone/browse-the-web-privately-iphb01fc3c85/ios) such as [Intelligent Tracking Prevention](https://webkit.org/blog/7675/intelligent-tracking-prevention), isolated and ephemeral Private Browsing tabs, fingerprinting protection (by presenting a simplified version of the system configuration to websites, so more devices look identical), and fingerprint randomization, as well as Private Relay for those with a paid iCloud+ subscription.
[:octicons-home-16: Homepage](https://apple.com/safari){ .md-button .md-button--primary }
[:octicons-eye-16:](https://apple.com/legal/privacy/data/en/safari){ .card-link title="Privacy Policy" }
[:octicons-info-16:](https://support.apple.com/guide/iphone/browse-the-web-iph1fbef4daa/ios){ .card-link title="Documentation" }
</details>
</div>
### Recommended Safari Configuration
The following privacy/security-related options can be found in :gear: **Settings****Apps****Safari**.
#### Allow Safari to Access
Under **Siri**:
- [ ] Disable **Learn from this App**
- [ ] Disable **Show in App**
- [ ] Disable **Show on Home Screen**
- [ ] Disable **Suggest App**
This prevents Siri from using content from Safari for Siri suggestions.
#### Zoeken
- [ ] Disable **Search Engine Suggestions**
This setting sends whatever you type in the address bar to the search engine set in Safari. Door zoeksuggesties uit te schakelen, kan je nauwkeuriger bepalen welke gegevens je naar jouw zoekmachineprovider stuurt.
#### Profiles
Safari allows you to separate your browsing with different profiles. All of your cookies, history, and website data are separate for each profile. You should use different profiles for different purposes e.g. Shopping, Work, or School.
#### Privacy & beveiliging
- [x] Enable **Prevent Cross-Site Tracking**
This enables WebKit's [Intelligent Tracking Protection](https://webkit.org/tracking-prevention/#intelligent-tracking-prevention-itp). The feature helps protect against unwanted tracking by using on-device machine learning to stop trackers. ITP protects against many common threats, but does not block all tracking avenues because it is designed to not interfere with website usability.
- [x] Enable **Require Face ID/Touch ID to Unlock Private Browsing**
This setting allows you to lock your private tabs behind biometrics/PIN when not in use.
- [ ] Disable **Fraudulent Website Warning**
This setting uses Google Safe Browsing (or Tencent Safe Browsing for users in mainland China or Hong Kong) to protect you while you browse. As such, your IP address may be logged by your Safe Browsing provider. Disabling this setting will disable this logging, but you might be more vulnerable to known phishing sites.
- [x] Enable **Not Secure Connection Warning**
This setting shows a warning screen if your connection to a website isn't using HTTPS. Safari will automatically try to upgrade the site to HTTPS, so you should only see this when there is no HTTPS connection available.
- [ ] Disable **Highlights**
Apple's privacy policy for Safari states:
> When visiting a webpage, Safari may send information calculated from the webpage address to Apple over OHTTP to determine if relevant highlights are available.
#### Settings for Websites
Under **Camera**
- [x] Select **Ask**
Under **Microphone**
- [x] Select **Ask**
Under **Location**
- [x] Select **Ask**
These settings ensure that websites can only access your camera, microphone, or location after you explicitly grant them access.
#### Other Privacy Settings
These options can be found in :gear: **Settings****Apps****Safari****Advanced**.
##### Fingerprinting Mitigations
The **Advanced Tracking and Fingerprinting Protection** setting will randomize certain values so that it's more difficult to fingerprint you:
- [x] Select **All Browsing** or **Private Browsing**
##### Privacybehoudende advertentiemeting
- [ ] Schakel **Privacy Preserving Ad Measurement**uit
Bij het meten van advertentieklikken wordt van oudsher gebruik gemaakt van trackingtechnologie die inbreuk maakt op de privacy van de gebruiker. [Private Click Measurement](https://webkit.org/blog/11529/introducing-private-click-measurement-pcm) is a WebKit feature and proposed web standard aimed towards allowing advertisers to measure the effectiveness of web campaigns without compromising on user privacy.
De functie heeft op zichzelf weinig privacyproblemen, dus hoewel je ervoor kunt kiezen om hem ingeschakeld te laten, beschouwen wij het feit dat hij automatisch is uitgeschakeld in Privénavigatie als een aanwijzing om de functie uit te schakelen.
#### Altijd privé browsen
Open Safari en tik op de knop Tabbladen, rechtsonder. Then, expand the :material-format-list-bulleted: Tab Groups list.
- [x] Selecteer **Privé**
Safari's Privénavigatie modus biedt extra bescherming van de privacy. Private Browsing gebruikt een nieuwe [kortstondige](https://developer.apple.com/documentation/foundation/urlsessionconfiguration/1410529-ephemeral) sessie voor elk tabblad, wat betekent dat tabbladen van elkaar geïsoleerd zijn. There are other smaller privacy benefits with Private Browsing too, such as not sending a webpages address to Apple when using Safari's translation feature.
Do note that Private Browsing does not save cookies and website data, so it won't be possible to remain signed in to sites. Dit kan een ongemak zijn.
#### iCloud Synchronisatie
De synchronisatie van de Safari-geschiedenis, tabbladgroepen, iCloud-tabbladen en opgeslagen wachtwoorden verloopt via E2EE. However, by default, bookmarks are [not](https://support.apple.com/HT202303). Apple can decrypt and access them in accordance with their [privacy policy](https://apple.com/legal/privacy/en-ww).
You can enable E2EE for your Safari bookmarks and downloads by enabling [Advanced Data Protection](https://support.apple.com/HT212520). Go to :gear: **Settings****iCloud****Advanced Data Protection**.
- [x] Turn on **Advanced Data Protection**
If you use iCloud with Advanced Data Protection disabled, we also recommend setting Safari's default download location to a local folder on your device. This option can be found in :gear: **Settings****Apps****Safari****General****Downloads**.
## Criteria
**Wij zijn niet verbonden aan de projecten die wij aanbevelen.** Naast [onze standaardcriteria](about/criteria.md)hebben wij een duidelijke reeks eisen ontwikkeld om objectieve aanbevelingen te kunnen doen. Wij stellen voor dat je jezelf vertrouwd maakt met deze lijst voordat je een project kiest, en jouw eigen onderzoek uitvoert om er zeker van te zijn dat je de juiste keuze maakt.
### Minimale vereisten
- Moet automatische updates ondersteunen.
- Must receive engine updates from upstream releases quickly.
- Must support content blocking.
- Wijzigingen die nodig zijn om de browser privacyvriendelijker te maken, mogen de gebruikerservaring niet negatief beïnvloeden.