logo
Home Why How Feature Help  

 
What's New

Originated from Chromium, Web Freer enhances the web browser with its unpararelled security and privacy protecting technology.

1. Access any website through secured https connections

2. Encrypted TCP connections to all websites

3. Fast browsing of all websites, in lightening speed

4. Protect internet users from online identity theft

5. Secure your data exchange with any information site or online stores.

Help us improve, report a problem

The browser can't access certain websites

Tell us the site you can't access :

The browser always crashes on me.

The browser is too slow

Other problems



Tell us how to contact you for bug fix and product updates:

Email:



Contact us to describe the problem in more details.

Why Web Freer

Online Security for Everyone

WWW, worldwide web, is designed decades ago upon standard transport protocol that lacks the strict security features today's internet users require for safe and worry-free online activities, such as secure data exchange, privacy protection, and identity protection.

Web Freer addresses the issue by making secured web browsing the standard feature, by default, it enables HTTPS connection when you use it to browse any website, including the non-secured HTTP sites, through a secured HTTPS proxy channel between your computer and our server. It is equivalent to establish a VPN tunnel for your computer, without you having to go through the complex setup process a VPN service would typically require.

Using Web Freer for web browsing means complete online security for you. The 256-bits HTTPS channel it creates protect you from hackers and ISPs to view your browsing logs, personal profile, credit card data, personal communication logs, or anything else you communicate between your computer and the open internet.

Tight Security is the New Standard

Open internet is good, open and secure internet is much better, we endeavor to make web a secure place after decades of its invention.

A HTTPS connection accross the web would be a smart and feasible evolution, a HTTPS browser that allows internet users to browse the web in HTTPS protocol would be a great option for millions of users.

Web Freer is adding a HTTPS connection to your web browser, you are secured even if you browse any standard non-secured HTTP websites, which are still the mass majority of the internet sites.

Web Freer is currently available for Windows system

Windows XP
Windows Vista
Windows 7


Web Freer for other computer operating systems are under development.

HTTPS - A Brief Introduction

HTTPS - Hyper Text Transfer Protocol Secure, is a secure protocol of the HTTP - Hyper Text Transfer Protocol. HTTPS is usually used for personal information exchange, such as login with a username and password, and secure ecommerce transactions, such as online shopping or online banking.

When a user connects to a website via HTTPS, the website encryptes the session with a digital certificate. In the case of using Web Freer, the session is encrypted by Web Freer's HTTPS connection.

HTTPS is a domain scheme that is, aside from the scheme token, syntactically identical to the HTTP scheme used for normal HTTP connections, but which signals the browser to use an added encryption layer of SSL/TLS to protect the session. SSL is especially suited for HTTP since it can provide some protection even if only one side of the communication is authenticated. This is the case with HTTP transactions over the Internet, where typically only the server is authenticated.

The main idea of HTTPS is to create a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and middle man's attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.

SSL - A Brief Introduction

SSL - Secure Sockets Layer, now TLS - Transport Layer Security, protocol runs above TCP/IP, are cryptographic protocols that add secure communication layers over the internet. TLS and SSL encrypt the network connections above the TCP/IP, using cryptography for privacy and a keyed message authentiction code. Many internet applications already adopt TLS such as web browsing, voice over IP.

The primary goal of the SSL Protocol is to provide privacy and security between two communicating applications. The protocol is composed of two layers. At the lowest level, layered on top of some reliable transport protocol (TCP), is the SSL Record Protocol. The SSL Record Protocol is used for encapsulation of various higher level protocols. One such encapsulated protocol, the SSL Handshake Protocol, allows the server and client to authenticate each other and to negotiate an encryption algorithm and cryptographic keys before the application protocol transmits or receives its first byte of data. One advantage of SSL is that it is application protocol independent. A higher level protocol can layer on top of the SSL Protocol transparently. The SSL protocol provides connection security that has three basic properties:

- The connection is private. Encryption is used after an initial handshake to define a secret key. Symmetric cryptography is used for data encryption.

- The peer's identity can be authenticated using asymmetric, or public key, cryptography.

- The connection is reliable. Message transport includes a message integrity check using a keyed MAC. Secure hash functions are used for MAC computing.

SSL is based on cryptography, the encoding of data in such a way that it can be decoded only by its intended recipient, not by a third party who might be able to intercept the information in transit. The simplest way to do this is for the sender and receiver to use a secret key, which can be used along with an agreed-upon algorithm to scramble the data in such a way that only someone with the key can descramble it. The secret key acts much like a password.

The use of a secret key implies that the participants in the conversation must have selected a key and communicated it among themselves in a secure manner. However, when establishing an Internet connection, there is usually no pre-arranged key, so a means must be provided of securely generating one. This would become a chicken-and-the-egg problem (how do you communicate a secret key with a secret key to encode it?) were it not for public key cryptosystems, of which RSA is the most used.

An SSL connection requires all information sent between a client and a server to be encrypted by the sending software and decrypted by the receiving software, thus providing a high degree of security. Security is important for both parties to any private transaction. In addition, all data sent over an encrypted SSL connection is protected with a mechanism for detecting tampering--that is, for automatically determining whether the data has been altered in transit.

VPN - A Brief Introduction

VPN - virtual private nework is a secure network that runs above the public internet to provide secured tunnel between a user's computer and a remote VPN server. VPN usually requires to authenticate the client computer and set up a virtual tunnel with data encryption.

VPN uses cryptographic tunneling protocols to provide confidentiality by blocking intercepts and packet sniffing, allowing sender authentication to block identity spoofing, and provide message integrity by preventing message alteration.

Some typical VPN protocols:

IPsec with encryption

L2TP inside of IPsec

SSL with encryption

For trusted VPNs, the technologies that VPNC supports are:

MPLS with constrained distribution of routing information through BGP ("layer 3 VPNs")

Transport of layer 2 frames over MPLS ("layer 2 VPNs")

IPsec (Internet Protocol Security) was developed by the Internet Engineering Task Force, and was initially developed for IPv6, which requires it.

This standards-based security protocol is also widely used with IPv4. Layer 2 Tunneling Protocol frequently runs over IPsec. Its design meet the most security goals-authentication, integrity, and confidentiality. IPsec functions by summarizing an IP packet in conjunction with a surrounding packet, and encrypting the outcome.

Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic, as it does in the OpenVPN project, or secure an individual connection. A number of vendors provide remote access VPN capabilities through SSL. An SSL VPN can connect from locations where IPsec runs into trouble with Network Address Translation and firewall rules.

Secure Web Proxy - A Brief Introduction

Secure web proxies commonly known as SSL web proxies; provide you with the confidentiality in secure browsing. Not only is your IP Address replaced with that of the proxy, but all of the data you transmit through the proxy is also encrypted. A typical secure web proxy will provide you with a https link.

© 2017, webfreer.com Contact | Privacy | Terms