Blockade focuses on those who are often targeted via phishing attacks and may not have a substantial capability at their disposal. Using threat intelligence mined from multiple sources (and analysts), Blockade attempts to detect attacks that may exist in the browser by monitoring web traffic requests. The primary goal for the project is to detect and prevent as many attacks as possible for those who would otherwise go left unnoticed.
Getting Blockade in your browser is just a click away
Once installed, Blockade will automatically start running and begin searching for malicious websites. In the event a malicious site is detected, Blockade will redirect you to a warning page with more details about the content.
Blockade is split into two pieces, cloud infrastructure and the local Extension. Intelligence is passed from the cloud infrastructure directly into the browser’s local storage. Using special APIs available to extensions, Blockade will look for any web request matching a known indicator and block it from being loaded. Malicious events from Blockade are passed to the cloud infrastructure where analysts can review the findings and surface more attacks.
For more details, including an architecture diagram, click here.
Why a browse extension?
Browser extensions provide full visibility into the attack surface without requiring the user to change their natural processes. If we can detect and prevent attacks using analyst intelligence without changing human behavior, then we are one step closer to a less compromised world.
Will Blockade stop all attacks?
Unfortunately, no. Blockade is as good as its intelligence and will never be perfect. However, it’s a good first-start.
Can I help with the project?
Absolutely! If you have ideas, suggestions or want to work with the maintainers, just send us a message or file an issue!
For more answers, click here.