Blockade extends existing browser security controls like Google Safe Browsing. Unlike traditional closed processes, Blockade users are given complete control over what they block, when they block it and how their data is used.
|Capability||Blockade||Google Safe Browsing|
|Blocks threats with no change to behavior|
|Transparent and automatically updated|
|Instantly block any threat|
|Focused on specific threats you care about|
|Gain insight into blocked content|
|Complete control of all processing|
Getting Blockade in your browser is just a click away
Once installed, Blockade will automatically start running and begin searching for malicious websites. In the event a malicious site is detected, Blockade will redirect you to a warning page with more details about the content.
Blockade is split into two pieces, cloud infrastructure and the local Extension. Intelligence is passed from the cloud infrastructure directly into the browser’s local storage. Using special APIs available to extensions, Blockade will look for any web request matching a known indicator and block it from being loaded. Malicious events from Blockade are passed to the cloud infrastructure where analysts can review the findings and surface more attacks.
For more details, including an architecture diagram, click here.
Why a browser extension?
Browser extensions provide full visibility into the attack surface without requiring the user to change their natural processes. If we can detect and prevent attacks using analyst intelligence without changing human behavior, then we are one step closer to a less compromised world.
Will Blockade stop all attacks?
Unfortunately, no. Blockade is as good as its intelligence and will never be perfect. However, it’s a good first-start.
Can I help with the project?
Absolutely! If you have ideas, suggestions or want to work with the maintainers, just send us a message or file an issue!
For more answers, click here.