Our Security Philosophy
Security at Orbit is built on three core principles:
Defense in Depth
We don't rely on a single security measure. Orbit uses multiple layers of protection—sandboxing, process isolation, secure defaults, and regular updates—to ensure that a vulnerability in one layer doesn't compromise your system.
Secure by Default
Orbit ships with security features enabled out of the box. You don't need to be a security expert to browse safely. HTTPS-only mode, third-party cookie blocking, and tracker protection are all active from the first launch.
Transparency
We believe you should understand how your browser protects you. This page explains our security architecture in plain language. Our changelog documents every security fix. And our code is open for review.
Chromium Security Model
Orbit is built on Chromium, the same open-source foundation used by Google Chrome, Microsoft Edge, and Brave. This gives us access to industry-leading security architecture:
Sandboxing
Chromium uses a multi-layer sandbox to isolate web content from your system:
- Renderer sandbox: Each tab runs in a restricted process that cannot access files, network, or other system resources directly
- GPU sandbox: Graphics processing is isolated to prevent driver exploits
- Network sandbox: Network requests go through a dedicated broker process
On Windows, we use the OS-native sandbox (Windows Sandbox API) for maximum compatibility and security.
Site Isolation
Each website runs in its own process, isolated from other sites. This means:
- A malicious site cannot read data from your banking site
- Cross-site scripting attacks are contained
- Spectre-style attacks are mitigated
Multi-Process Model
Orbit separates different functions into distinct processes:
- Browser process: UI, navigation, storage (privileged)
- Renderer processes: Web content (sandboxed)
- GPU process: Graphics rendering (limited privileges)
- Utility processes: Audio, networking, extensions (restricted)
If one process crashes or is compromised, the others remain protected.
Electron Hardening
Orbit uses Electron to provide native desktop functionality. We've implemented several hardening measures to ensure this doesn't compromise security:
Context Isolation
Context isolation is enabled for all renderer processes. This creates a separate JavaScript context for preload scripts and web content, preventing websites from accessing Electron APIs even if they escape the sandbox.
No Node.js in Web Content
Node.js integration is disabled in renderer processes. Web pages cannot access the filesystem, execute system commands, or use Node modules. This is enforced at the Electron configuration level.
Secure IPC
Communication between the renderer and main process uses a carefully designed IPC bridge:
- Only explicitly whitelisted channels are allowed
- All messages are validated before processing
- No arbitrary code execution is possible through IPC
Content Security Policy
Orbit enforces strict CSP headers on all internal pages (settings, new tab, etc.) to prevent injection attacks:
- Inline scripts are prohibited
- Only local resources can be loaded
- Eval and similar functions are blocked
Update Policy
Security Patches Prioritized
When Chromium releases a security update, we aim to ship an Orbit update within 48 hours for critical vulnerabilities, and within one week for high-severity issues. Our changelog clearly marks all security-related updates.
Auto-Updates
Orbit checks for updates automatically (you can disable this in Settings). When an update is available:
- The update is downloaded in the background
- Updates are signed with our code signing certificate
- The signature is verified before installation
- Orbit restarts to apply the update on next launch
Version Transparency
You can always see what version of Chromium and Electron Orbit is running:
- Settings > About shows all version numbers
- The changelog documents every Chromium/Electron update
- Security advisories are posted for critical issues
Safe Browsing & Phishing Protection
Orbit can optionally use Google's Safe Browsing API to protect you from malicious websites:
What It Does
- Checks URLs against Google's database of known phishing and malware sites
- Warns you before visiting dangerous pages
- Blocks downloads of known malicious files
What Data Is Shared
When Safe Browsing is enabled:
- A partial hash of the URL is sent to Google (not the full URL)
- Your IP address is visible to Google (as with any web request)
- No cookies, account data, or browsing history is transmitted
Note: Safe Browsing is enabled by default but can be disabled in Settings > Privacy. Disabling it does not affect other security features.
Download Safety
Mark-of-the-Web
On Windows, Orbit applies the Mark-of-the-Web (MOTW) to all downloaded files. This Windows security feature:
- Tags files as "from the internet"
- Triggers Windows Defender SmartScreen warnings for executable files
- Requires explicit user action to run potentially dangerous files
No Auto-Execution
Orbit never automatically runs downloaded files. Even safe file types require you to explicitly open them. This prevents drive-by download attacks.
Download Warnings
Orbit warns you before downloading:
- Executable files (.exe, .msi, .bat)
- Files from insecure (HTTP) sources
- Files flagged by Safe Browsing
Vulnerability Disclosure
We take security vulnerabilities seriously. If you discover a security issue in Orbit, we ask that you follow responsible disclosure practices.
How to Report
Send vulnerability reports to:
Email: security@orbitbrowser.com
Please include:
- A clear description of the vulnerability
- Steps to reproduce the issue
- Your assessment of the impact
- Any suggested fixes (optional)
PGP Key
For sensitive communications, you can encrypt your message with our PGP key:
-----BEGIN PGP PUBLIC KEY BLOCK-----
mQINBGaXhQMBEACnPwExampleKeyForOrbitBrowser
ThisIsAPlaceholderPGPKeyForDemonstration
PurposesOnlyDoNotUseForActualEncryption
[...]
-----END PGP PUBLIC KEY BLOCK-----
Our Commitment
- We will acknowledge receipt of your report within 48 hours
- We will provide a timeline for a fix within 7 days
- We will credit you in the changelog (unless you prefer anonymity)
- We will not take legal action against researchers following responsible disclosure
Transparency
We believe security claims should be verifiable. Here's how you can verify ours:
Release Notes
Our changelog documents every update, including security fixes. We reference specific CVEs when applicable.
Open Source
Orbit's source code is available for review. You can inspect our security implementation, verify our claims, and even build the browser yourself.
Security Advisories
For critical security issues, we publish detailed advisories explaining:
- The nature of the vulnerability
- Which versions are affected
- How to update to a fixed version
- Workarounds (if available)
Independent Verification
We welcome independent security audits. If you're a security researcher interested in auditing Orbit, please contact us at security@orbitbrowser.com.
Security Checklist
Want to maximize your security with Orbit? Here's a quick checklist:
- Keep Orbit updated (enable auto-updates)
- Use HTTPS-only mode (enabled by default)
- Enable Safe Browsing for phishing protection
- Block third-party cookies (enabled by default)
- Use a password manager (Orbit's built-in or external)
- Be cautious with extensions—only install from trusted sources
- Review site permissions regularly (Settings > Privacy > Site Settings)