App Review Osprey Browser Protection Reviews

It is advised to take all reviews with a grain of salt. In extreme cases some reviews use dramatization for entertainment purposes.
Content created by
Shadowra

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
Actually, you don't need any data for false positives, just rank security vendors by popularity as the most popular ones tend to get very few FPs. But if you want data, take a look at already made tests by AV-Test and AV-Comparatives to determine "FP-free" security vendors. Both companies regularly test antivirus software and their web protection for false positives.

If you ask me, the three-level protection would function like this.

Easy: (almost no FPs)
  1. Microsoft SmartScreen
  2. Bitdefender Traffic Light
  3. Emsisoft Web Protection
  4. Quad9 Security DNS
Medium (security providers from easy +): (few FPs)
  1. Symantec Browser Protection
  2. Norton SafeWeb
  3. GDATA WebProtection
  4. Cloudflare Security DNS
  5. CleanBrowsing Security DNS
  6. AdGuard Security DNS
Hard: all security vendors (large number FPs)

False positives shouldn't be your job anyway. It's not like you're providing the protection service, you're just forwarding URLs to security vendors for analysis and showing the user result—that's it. This is the reason why I proposed those three levels of protection. Your job is only to warn users some security providers might wrongly detect safe websites and that's it. No need to scale down on security vendors; moreover, I'd add more of them.

Beside, protection levels make your extension extremely easy to use for all kinds of users. Because, currently, those security vendors mentioned in the extension don't mean anything to huge amount of people.
I agree
Btw about medium I think cloudflare is actually more like easy and I think that medium can be the default and then users can reduce or increase false positives based on their usage as a minority will need either easy or extreme settings like" high "
 

Harputlu

Level 6
Verified
Well-known
Dec 26, 2016
256
I'm content with the list of providers I have now, and I don't think it will change. They are all quite effective at blocking threats. There aren't any slouches in the lineup.
It's hard to do false-positive testing. If I had data for that, I would be able to set better default settings. I just don't have that kind of data.
I would like to ask a question if you don't misunderstand. Is there any legal problem in adding plugins of different companies to your own plugin? I hope it will not be a problem in the future.
 
  • Like
Reactions: Sorrento

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
I would like to ask a question if you don't misunderstand. Is there any legal problem in adding plugins of different companies to your own plugin? I hope it will not be a problem in the future.
You're allowed to do that and worst they will add auth to their api or limit it so you lose only one provider and not the whole extension as it will stay on the store since its fair use

Many examples of big tech doing the same and then referencing fair use

But it's up to a judge to decide what is fair use as it's a somewhat subjective metric and they all gain intelligence data from osprey (you send them url info , you vote on false positives ) and kinda free promotion(product and company that's blocking a site is mentioned)
 
Last edited:

Marko :)

Level 25
Verified
Top Poster
Well-known
Aug 12, 2015
1,455
I would like to ask a question if you don't misunderstand. Is there any legal problem in adding plugins of different companies to your own plugin? I hope it will not be a problem in the future.
That's a totally valid question; I myself wouldn't like to start using a service just so it would be shut down later.

Answer: if company made API publicly available and you're following their terms of usage, then it's completely legal for Osprey to use. But if the API isn't exactly publicly available and company didn't publish documentation for it, then it's illegal. Where does Osprey come in here? From what I see, it's a mixed bag.

When you open BrowserProtection.js file, there are all API URLs listed along with parameters. There's SmartScreen URL and by searching the web I couldn't find any information about Microsoft giving devs access to their SmartScreen APIs. The developer most likely captured requests made by Microsoft Edge along with parameters and added it to the extension. That isn't legal per se, because he never got Microsoft's approval to use it. Same goes for GDATA, Emsisoft and Bitdefender.

But not everything in this extension is illegal. Security DNS servers he uses as a source are completely legal and have their API URLs publicly available. They need to have them publicly available because DNS-over-HTTPS simply works this way.

Now... what are the consequences for Osprey? Of course security companies can always send him DMCA notice on Github, cease & desist letter or even start a lawsuit against him. But in reality, I don't see that happening. Though they could change the API URL in the future, stopping Osprey from checking URLs with them, or they could start using some kind of authorization. This obviously won't happen for now, but if the extension becomes really popular, that could become problem.
 
  • Like
Reactions: Gandalf_The_Grey

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
That's a totally valid question; I myself wouldn't like to start using a service just so it would be shut down later.

Answer: if company made API publicly available and you're following their terms of usage, then it's completely legal for Osprey to use. But if the API isn't exactly publicly available and company didn't publish documentation for it, then it's illegal. Where does Osprey come in here? From what I see, it's a mixed bag.

When you open BrowserProtection.js file, there are all API URLs listed along with parameters. There's SmartScreen URL and by searching the web I couldn't find any information about Microsoft giving devs access to their SmartScreen APIs. The developer most likely captured requests made by Microsoft Edge along with parameters and added it to the extension. That isn't legal per se, because he never got Microsoft's approval to use it. Same goes for GDATA, Emsisoft and Bitdefender.

But not everything in this extension is illegal. Security DNS servers he uses as a source are completely legal and have their API URLs publicly available. They need to have them publicly available because DNS-over-HTTPS simply works this way.

Now... what are the consequences for Osprey? Of course security companies can always send him DMCA notice on Github, cease & desist letter or even start a lawsuit against him. But in reality, I don't see that happening. Though they could change the API URL in the future, stopping Osprey from checking URLs with them, or they could start using some kind of authorization. This obviously won't happen for now, but if the extension becomes really popular, that could become problem.
Microsoft and google have done exactly the same and used other companies API without permission and judges agreed for it to fall under fair use and I can't see osprey case different except it doesn't have an army of lawyers in case a company decided to take legal action and unless osprey gets popular and you don't consider this to fall under fair use as I do and actual judges decided similar in many cases then only then and maybe a company will decide to take action and even then it will only give osprey a dmca notice to remove their api and comply and if he does you lose only one provider and probably people will already fork it and run forks (again not really illegal till a judge rules any fork is not actually fair use of that api but still the company that owns that api )



Btw many of apis used by osprey are allowed to be used for filtering some encourage their use and majority have some form of documentation about auth like usually apis do to make sure its not public well I don't think any apis used by osprey have any auth or are designed against public use
 

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
You should add malwarebytes browser guard!
It's on the list of unsupported providers because it downloads a list locally rather then using an API to do the filtering (logic and generally the size of the database will be a performance issue for a far less effective Malwarebytes)


Basically personally I wouldn't use Malwarebytes an to me it's either osprey only or adding checkpoint (or any extension that has a technology against zero days )

Actually maybe if someone knows how to get links that weren't published into intelligence providers then please test Some extensions against zero day pishing as anything remotely similar to popular pages will easily get blocked by checkpoint
But a fake web store that doesn't try to emulate a different page usually passes checkpoint easily (some technologies in osprey providers should in real time understand better against this types but generally fake stores are hard to detect)
 
Mar 4, 2022
63
You should add malwarebytes browser guard!

And Google Safe Browsing. They give access to their API for free.
Both are on the list of unsupported providers, so they can't be added to the extension.
 

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
And Google Safe Browsing. They give access to their API for free.
He did try and was unable to but I will let him to re explain the reason
But only very a few browsers like edge will benefit from it as majority of browsers even Firefox , brave and other privacy ones include safe browsing and if you don't trust google with sending a url hash you wouldn't either what osprey does as it's the same except it can be tracked by the browser DNS since it isn't hashed
 
  • Like
Reactions: Sorrento

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
Both are on the list of unsupported providers, so they can't be added to the extension.
There are multiple providers that have done better in lab tests then google and osprey has them so even on edge with default smart screen (no osprey) you aren't missing anything as even smart screen in majority of tests does better then google
 
  • Like
Reactions: Sorrento

TairikuOkami

Level 38
Verified
Top Poster
Content Creator
Well-known
May 13, 2017
2,763
Anyway, the biggest mistake this extension made is the name, just like Opera and Vivaldi. It does not want to get popular, it just wants to exist. But it will fail, I will bet on it. Pure and simple. 🤷‍♂️
 

CyberDevil

Level 10
Verified
Well-known
Apr 4, 2021
452
Anyway, the biggest mistake this extension made is the name, just like Opera and Vivaldi. It does not want to get popular, it just wants to exist. But it will fail, I will bet on it. Pure and simple. 🤷‍♂️
What kind of failure can a hobby project suffer that parses third-party security services and costs nothing to either the creator or the user? о_О
 

Foulest

Level 1
Apr 4, 2025
27
Actually, you don't need any data for false positives, just rank security vendors by popularity as the most popular ones tend to get very few FPs. But if you want data, take a look at already made tests by AV-Test and AV-Comparatives to determine "FP-free" security vendors. Both companies regularly test antivirus software and their web protection for false positives.

If you ask me, the three-level protection would function like this.

Easy: (almost no FPs)
  1. Microsoft SmartScreen
  2. Bitdefender Traffic Light
  3. Emsisoft Web Protection
  4. Quad9 Security DNS
Medium (security providers from easy +): (few FPs)
  1. Symantec Browser Protection
  2. Norton SafeWeb
  3. GDATA WebProtection
  4. Cloudflare Security DNS
  5. CleanBrowsing Security DNS
  6. AdGuard Security DNS
Hard: all security vendors (large number FPs)

False positives shouldn't be your job anyway. It's not like you're providing the protection service, you're just forwarding URLs to security vendors for analysis and showing the user result—that's it. This is the reason why I proposed those three levels of protection. Your job is only to warn users some security providers might wrongly detect safe websites and that's it. No need to scale down on security vendors; moreover, I'd add more of them.

Beside, protection levels make your extension extremely easy to use for all kinds of users. Because, currently, those security vendors mentioned in the extension don't mean anything to huge amount of people.
I can add something like that in the next update.
 

badboy

Level 2
Jan 20, 2025
74
Thanks Shadowra! Just the other day I accidentally found out about this extension, but was confused by too few users. :) Now I see it more and more often in different IT blogs and channels. Of course, I installed it and activated all the engines.

I wonder another thing: are the engines from Symantec and Bitdefender really the best? Maybe other engines see bad links too, it's just that these two react faster? What do you think?

Yes, and also, dear Shadowra, it is possible to test each engine separately (disabling the others) on your little link build, isn't it? :) A test like this would be interesting. :)
 
Last edited by a moderator:

Vitali Ortzi

Level 30
Verified
Top Poster
Well-known
Dec 12, 2016
1,969
Thanks Shadowra! Just the other day I accidentally found out about this extension, but was confused by too few users. :) Now I see it more and more often in different IT blogs and channels. Of course, I installed it and activated all the engines.

I wonder another thing: are the engines from Symantec and Bitdefender really the best? Maybe other engines see bad links too, it's just that these two react faster? What do you think?
Symantec(Broadcom ) and bitdefender did the best in my testing as well
So it's not a coincidence and they react faster then some other providers too hence you get faster results from them so they will detect a malicious page first before you get a response back from other providers but the difference is milliseconds
 

Shadowra

Level 38
Thread author
Verified
Top Poster
Content Creator
Malware Tester
Well-known
Sep 2, 2021
2,763
Thanks Shadowra! Just the other day I accidentally found out about this extension, but was confused by too few users. :) Now I see it more and more often in different IT blogs and channels. Of course, I installed it and activated all the engines.

I wonder another thing: are the engines from Symantec and Bitdefender really the best? Maybe other engines see bad links too, it's just that these two react faster? What do you think?

Symantec and Bitdefender are the most responsive :)

I don't know if I'll ever test the engines one by one, I'll have to think about it :D
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top