Technical Inspection Agency
(TÜV) Saarland, 05/2009
Once a loophole or a security problem is reported on one of the security portals, the necessary countermeasures are integrated into SaferSurf. Thus, with all functionality running on the SaferSurf server, all protection functionality is updated with instant effect. Users are not required to take action in order to be protected from current dangers.
On 5 September 2008, heise security reported on privacy groups' concerns about the beta version of Google's new browser Chrome.
Using cookies, Chrome and Google constantly exchange data. While the use of cookies is not unusual, Chrome's "Call Home" sends a unique ID number per user per computer. Even uninstalling Chrome does not remove this ID in the user's data record.
The anonymity functionality of SaferSurf prevents ID transmission, thus preventing Google from matching user information.
On 28 May 2008, heise security reported on a critical vulnerability in Adobe's Flash Player. Chinese servers deliver code utilizing a loophole to slip the users Trojans. The fake links are smuggled in via hacked websites.
Until Adobe provides updates for the affected Flash Player version 9.0.124.0, heise security has recommended users various possibilities for protecting themselves from malicious swf files.
SaferSurf blocked access to the relevant domains instantly after the vulnerability was made public, amongst them wuqing17173.cn, woai117.cn, and play0nlnie.com. SaferSurf users are therefore automatically protected from the loophole in Adobe Flash Player without having to take security measures themselves.