Package Details: mullvad-browser-bin 14.0.9-1

Git Clone URL: https://aur.archlinux.org/mullvad-browser-bin.git (read-only, click to copy)
Package Base: mullvad-browser-bin
Description: Privacy-focused web browser developed by Mullvad VPN and the Tor Project
Upstream URL: https://mullvad.net/en/browser
Keywords: browser firefox mullvad privacy private
Licenses: MPL-2.0, GPL-3.0-or-later
Conflicts: mullvad-browser
Provides: mullvad-browser
Submitter: tarball
Maintainer: tarball
Last Packager: tarball
Votes: 56
Popularity: 6.86
First Submitted: 2023-04-03 14:58 (UTC)
Last Updated: 2025-04-01 16:44 (UTC)

Pinned Comments

tarball commented on 2025-03-12 18:00 (UTC)

Please discuss bugs here before reporting them upstream, especially if they can't be reproduced with the original tarballs. Some bugs are caused by packaging issues and need to be fixed here. We can always escalate upstream if necessary.

tarball commented on 2024-06-26 08:35 (UTC)

Make sure to fetch the developers' signing key before building the package.

The official instructions are here. The link is also mentioned in the PKGBUILD.

If the site is blocked in your region, you'll have to work around it or trust me that this is what it says:

% gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org

which (as of 2024-06-26) should also show this fingerprint:

EF6E 286D DA85 EA2A 4BA7  DE68 4E2C 6E87 9329 8290

If your gpg says otherwise, you may have been fed garbage.

Latest Comments

« First ‹ Previous 1 2 3 4 Next › Last »

tarball commented on 2024-04-15 17:36 (UTC) (edited on 2024-04-15 17:46 (UTC) by tarball)

edit: looks like system-install will be enough pretty soon, see @pospeselr's comment for more info. That file is already being created by the PKGBUILD.


Thanks, I'll look into that shortly and add it if it helps.

The usual place for this is policies.json (see this nix config for an example), but I tried that (along with all the other options that have any relation to updates) and it didn't make any difference.

deron commented on 2024-04-15 17:30 (UTC) (edited on 2024-04-15 17:30 (UTC) by deron)

Disabling auto-updates (about:config > app.update.auto) fixed the UpdateInfo issue for me (so far).

texer22 commented on 2024-02-29 10:44 (UTC) (edited on 2024-02-29 10:45 (UTC) by texer22)

After an update it does not update the file in /user/UpdateInfo/updates/.. It still shows "pending". https://github.com/mullvad/mullvad-browser/issues/229 "@foter @Giger22 Please note that the packages from the aur are community provided, and we don't offer support for it.

Could you please contact the mullvad-browser-bin maintainer and pass your comments directly to them?"

tarball commented on 2024-01-19 16:26 (UTC) (edited on 2024-01-23 15:55 (UTC) by tarball)

edit: GitHub releases lag behind the official CDN for about an hour, but I think it's worth it to cover the less fortunate among us (myself included).


Hmm... the browser targets the privacy-conscious audience which might not appreciate sending their requests to Microsoft.

I've been having the same problem actually, so I understand your pain completely. Mullvad's servers are partially blocked and the rest is throttled here for providing a VPN service, which forces me to use a (trusted) proxy.

Let's see if anyone else cares enough to vote for or against this.

If not, I'll probably change the URL when 13.0.9 is released (which is likely to happen in a couple of days).

The binary is signed anyway.

<deleted-account> commented on 2024-01-19 16:13 (UTC)

Could you please change the source URL to GitHub? The cdn.mullvad.net server is very poor and downloading from East Asia always fails.

<deleted-account> commented on 2023-11-06 11:28 (UTC)

When I download the source tarball with paru, it always fails with a timeout; when I download it with Firefox, it succeeds. Is this a problem with curl options?

PortableAlgebra commented on 2023-07-10 07:48 (UTC)

If you're getting the PGP/GPG error, just refer directly to Mullvad's website for the command to run for the current signing key. Slug's comment is probably fine too, but I prefer using the method from Mullvad.

https://mullvad.net/en/help/verifying-mullvad-browser-signature/

Download the Tor Browser Developers signing key

The fingerprint of the code signing key is EF6E 286D DA85 EA2A 4BA7 DE68 4E2C 6E87 9329 8290 and it can be downloaded from TOR:

gpg --auto-key-locate nodefault,wkd --locate-keys torbrowser@torproject.org

Slug commented on 2023-06-22 16:30 (UTC) (edited on 2023-06-22 16:32 (UTC) by Slug)

I had a problem with a missing public PGP key ; trying to import it failed. It was necessary to specify a server to import the key.

I was recommended the following line to be able to import it :

gpg --keyserver hkps://keys.openpgp.org --recv-keys E53D989A9E2D47BF  ✔

gpg: key 4E2C6E8793298290: public key "Tor Browser Developers (signing key) torbrowser@torproject.org" imported

gpg: Total number processed: 1

gpg: imported: 1

ZorinArch commented on 2023-04-25 04:37 (UTC)

@kaivai thank you, i fix that issue.

morganava commented on 2023-04-23 11:30 (UTC) (edited on 2023-04-23 11:32 (UTC) by morganava)

To anyone wanting to build a from-source source package, this is going to be a bit complicated but should be possible. You'll want to have a look at the tor-browser-build project on our gitlab, particularly the 'firefox' and 'browser' projects:

Mullvad-Browser is much closer to vanilla Firefox than Tor Browser is in terms of the amount of build customization, but there are still several things that we also package in the final firefox build including (and likely not limited to):

  • the allow-listed fonts
  • ublock origin
  • noscript
  • mullvad privacy companion

To verify any built package matches the official bins fingerprint, you can use TZP: https://github.com/arkenfox/TZP

The TZP maintainer (Thorin Oakenpants) will be working closely with us over the coming months to update the site with more fingerprinting vectors and official Mullvad Browser support.

NOTE: if the official release and the source calculated release fingers prints don't match, then you will be explicitly reducing the size of the fingerprinting bucket for users of the source package (ie: they will stand out as source-package Arch users to any malicious actors willing to check, making them easier to fingerprint and track).

We update our browsers (Mullvad and Tor Browser) monthly, so any source package will need an active maintainer lest it fall behind. Historical data suggests the majority of Tor Browser users are updated within about a 1 week window (based on update ping requests) so I would assume Mullvad Browser will follow the same approximate time frame. This means the Arch package will also need to update asap to avoid users falling behind on security updates and making themselves easier to track (again by virtue of being in a smaller fingerprint bucket as fingerprints can change between browser versions).

If this work sounds interesting to anyone out there, we'd be happy to help over in #tor-browser-dev on OFTC IRC, or you can find us on the tor-dev mailing list: https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-dev/

We would also be happy to add whomever wishes to maintain this to a list of downstream contacts whom we ping when new updates/signed tags are available!