For journalists

A privacy browser for sources, research, and reporting

Your search history is a record of what you suspected, what you fact-checked, and what you almost looked into. Dazr is the European privacy browser built so that record stays yours: no telemetry to a US company, no fingerprint trail across the sites you research, no tracking parameters added to the URLs you copy into your notes.

What journalism actually needs from a browser

The things that matter when your research is the story.

Your research stays yours

No telemetry to the browser vendor. No "Suggested Stories" pulled from your history. No Google account quietly cataloguing what you searched. Dazr doesn't phone home.

Anti-fingerprinting on by default

Sites you research can't easily build a unique device ID for you and follow you across other sites. Canvas, WebGL, audio, and font signals all get per-domain randomisation.

EU jurisdiction, EU servers

Dazr's services run on European infrastructure under European privacy law. US laws like the CLOUD Act don't reach us, and no US agency can compel a record of your browsing through a sealed warrant.

Tracking codes stripped from URLs

When you copy a URL into your notes, you don't want to also copy the utm_source, fbclid, or gclid attached to it. Dazr removes those automatically before you ever see them.

A search engine that doesn't profile you

Dazr Search runs on our own EU-hosted backend. No queries logged to your account (there is no account). No personalised filter bubble. The results you get are the same anyone else would get.

Encrypted DNS to a non-profit

Your DNS lookups (the queries that turn site names into IP addresses) are encrypted by default and go to a French/German non-profit, not Google or Cloudflare. Your ISP can't trivially log which sites you visited.

What changes day-to-day

Open a Private Window for sensitive research

Ctrl/Cmd+Shift+N opens a Private Window. Cookies, history, and storage from the session are wiped on close. Combined with Dazr's defaults, anti-fingerprinting, encrypted DNS, no telemetry, no tracking parameters, it's a clean session for the sensitive parts of a story.

  • Per-window history isolation
  • Storage wiped on close
  • Same anti-tracking defaults as the regular browser

The browser doesn't talk to Big Tech

Most "privacy browsers" still ping Google services for safe-browsing, fonts, and updates. Dazr's defaults route every connection it originates through European servers. Phishing protection uses open-source feeds (OpenPhish, PhishTank, URLhaus). Update checks go to dazr.eu. There is no Google traffic from the browser, full stop.

  • No Google Safe Browsing
  • No Google Fonts
  • No Google Maps in the search infobox
  • No US cloud anywhere in the data path

What it isn't: anonymity from a state actor

If your threat model includes a state-level adversary watching your network, or if a source is trying to reach you anonymously, use Tor Browser or Tails. Dazr is the browser you use the other 90% of the time, when you need privacy from advertisers, trackers, ISPs, and the casual "let me see who looked us up" of any given website. It's a daily driver, not an anonymity tool.

  • For source contact: SecureDrop, Signal, Tor
  • For your daily research, fact-checking, reading: Dazr
  • The two complement each other; they're not interchangeable

Frequently asked questions

Is Dazr a replacement for Tor Browser?

No. Tor Browser is still the right tool when you need anonymity from the network itself (sources contacting you over Tor, accessing onion services, blending into the Tor crowd). Dazr is a daily-driver privacy browser. Most of your reporting work, research, reading, social media, video, email web, doesn't need Tor's anonymity properties, and Tor is too slow to use for everything. Dazr is what you use the other 90% of the time.

Can sources contact me through Dazr?

For initial source contact, use SecureDrop or Signal, those are the right tools. Dazr is for the work you do after: researching the source, fact-checking, reading public records, writing. Dazr keeps your research private from advertisers, your ISP, and the sites you visit; it's not designed to anonymise you against a state-level adversary.

Does Dazr leave less of a fingerprint than Chrome?

Yes. Anti-fingerprinting is on by default, canvas, WebGL, audio, and font measurements all get small per-domain randomisation. Sites can still see you used a browser; they can't easily tie your browsing across sites by device fingerprint.

Will my password manager work?

Yes. Bitwarden, 1Password, Dashlane, and KeePassXC all work via their browser extensions.

Is there a privacy mode for sensitive research sessions?

Open a Private Window (Ctrl/Cmd+Shift+N). Cookies, history, and storage from the session are wiped on close. Combined with Dazr's defaults (no telemetry, anti-fingerprinting, encrypted DNS), it's a clean session for sensitive work.

The browser for the work between the leaks

Free, no account, no telemetry, no Big Tech. Built in Europe.

Download Dazr