I am very embarrassed to report that I have found the cause of the apparent malfunction to be due to me. I have been working on configuration of this computer over several days and one part of this is to set up firejail, so that the machine can run sandboxed. Seemingly, I had an instance of Vivaldi still running in this mode whilst I used another incarnation when I tried to collect extensions. I apologise profoundly for my stupid error and can only hope I have not caused too much inconvenience to other users.
I discovered my error yesterday evening but I have been unable to post from Vivaldi, even though Blockers and my VPN are disabled.. I can log on to this forum and see the thread but at about this time, your system reports that connection has been lost. When I log out, the Forum reports that I cannot be validated. I have tried to reach the forum several times this morning, without success. I am now using Firefox and this is working perfectly. I cannot offer any explanation since yesterday, I could post from Vivaldi , even though I was in the error condition reported above.
Best regards to all,
@D35J Hi, to actually answer your question instead of just giving an opinion on Avast itself:
It's really up to you. If you feel you need the extra features of the extension, like the site reputation rankings, then by all means use it. Just be aware that extensions sometimes cause issues with web-sites that are not always easy to figure out for the user.
Note that Vivaldi's tracker blocker is for privacy, not security, even if the ad-blocker lists will block requests to some known malicious sites.
If running Avast locally it should also block access and warn when attempting to access a malicious site. And I assume the lists it uses are updated more regularly than the public lists used by Vivaldi.
So my opinion is you don't need the extension itself, unless you need the site reputation ranking feature. But keep Avast running locally for overall system security.
I've heard nothing but bad things about AVG and how unstable it is, and how it screws up a lot of systems pretty bad.
I've given up on most AV programs and their massive local databases and the constant need to update them. I've been hit by stuff before that goes right through that.
I currently recommend zero-day cloud-based scanners like here - https://www.qualys.com/offer/zero-day-vulnerabilities-require-defense-depth-strategy The databases are online, so no updating. They are always updated as soon as new stuff is discovered. Some of these programs will download a small database every few hours on their own to help detect the current top malware faster. They are also very small.
I'm also using Avira https://thinkmobiles.com/blog/best-free-antimalware/ with an edit to stop the pops and windows defender and also "Hosts" edited to prevent pops and redirects from taking over my computer as well. So A/V and malware will work but if you edit your host's file that will kill most pops that come one other web sites trying to redirect or make you click on them thinking they are legit or giving you any relevant help. But I read that AVG has insider hacking or that someone inside has a grudge against AVG as the Virus that attacks it seems to knows what exact codes to go after. If that isn't scary enough one has to ask how secure is AVG now that it's got insiders attacking their own program?
I agree, the current solution is not ideal.
What I think happened was, a lot of people (me included) were complaining that Vivaldi didn't remember the Site Settings for Flash. My guess is that this was actually done on purpose by Chromium devs to make it harder to playback flash.
Next year Flash will be out of support and probably the Allow Flash setting per site will be removed in Chromium sooner or later. So Vivaldi devs decided to make a global flag to enable/disable flash instead of a per-site setting, it was easier.
What I've done, is to create a policy object in the registry for Vivaldi:
Windows Registry Editor Version 5.00
Than you can add the sites you want Flash to always run on in this list by creating a new string value for this key.
Easy, right? 😉
At the outset, absolute privacy does not exist on the network, nor using TOR.
I think that each user has a different concept of privacy needs, nor can the best browser fully protect it, if the user searches with Google or posts on Facebook.
Therefore, the most logical thing is that each user uses the extensions they deem appropriate, apart from the basic privacy protections that Vivaldi undoubtedly has, far superior to almost all other browsers.
Things like this are no longer possible as an extension, which is why HTTPS Everywhere lost a bunch of the security features it used to add.
An extension would also run a whole new instance of the browser, which is totally overkill for such a feature.
As for usefulness I remember people saying similar things about showing any form of HTTPS or cert info at all, due to worry that users won't understand.
Users lack understanding because they are kept in the dark all the time. This is the big difference between the old Amiga world and the Windows world.
On the Amiga OS you get lots of visual feedback and so learn passively what the normal operation to expect is.
When the feedback differs from normal or shows something unusual, you do not need to be an expert to realise something is amiss and needs to be checked.
Lets say you land on a site and see the message in the browser that the encryption has been downgraded. What does this mean ?
Downgraded from what to what, and where does the user see that this is normal or abnormal behaviour for the site in question ?
Unless a user tests the site they do not know what cyphers should normally be in use on a site they frequent.
Just having a small amount of visual feedback somewhere obvious is enough to teach people to pay attention.
It can help all of us spot if something has been compromised in the browser or site.
Another OSINT tool out there is theHarvester it's an effective tool designed to be used in the early. stages of a penetration test. Use it for open source intelligence gathering and helping. to determine a company's external threat landscape on the internet.
It has the following features
Is it all sites, and what do you mean by "blocks the site from opening" ?
Are you sure it isn't protecting you from bad web sites, because you can disable "Google Phishing and Malware protection" in the privacy section of the settings, but you probably should not !
If you insist on disabling it, I would advise a second opinion from an AV extension that will do the same job.
Take your pick.
I would recommend having the power of VirusTotal automatically scan anything you download.
Despite of several Loud Throats here I completely agree with the subj and with thouse who named present state as "security theater", as with who pointed that Google isn't Idol in the UI.
If the fact of this EV presence is such important just move detailed info into tooltip or "Site info" popup and use a different padlock icon with a big fat checkmark over it.
I'm just reporting,
I did it with outlook and yahoo, deleting cookies on both sites outlook was the only one that remembered the PW.
Like I said I think it's MSN, I deleted cookies and logging back in to test it for about 2 hours and every time MSN remembered the PW but other sites did not.
But I don't care about it and it doesn't bother me I'm just saying it happens to me as well.