build your own browser (crazy SECURE)
NetworkChuck
12 min, 37 sec
Network Chuck demonstrates setting up a self-hosted secure browser using Chasm and addresses concerns regarding his Network Chuck Cloud browser.
Summary
- Network Chuck partners with Chasm to offer a secure browser service and addresses community concerns regarding security and self-hosting.
- The video provides a step-by-step guide to setting up a secure browser using Chasm in a cloud environment, specifically with Linode.
- Network Chuck explains the costs and convenience of self-hosting versus using his cloud browser service.
- Security concerns are addressed, emphasizing that neither Network Chuck nor Chasm tracks users' browsing activities within the secure browser containers.
Chapter 1
Network Chuck commits to demonstrating the setup of a secure browser and discloses his product launch.
- He announces his plan to demonstrate setting up a secure browser, the 'world's most secure' in his opinion.
- Network Chuck reveals his product, the Network Chuck Cloud browser, launched two weeks prior.
- He addresses the criticism received and his partnership with Chasm, which hosts the product.
Chapter 2
Tutorial on setting up the secure browser for free via self-hosting.
- Network Chuck wants users to be safe online, whether using his browser or a self-hosted one.
- He acknowledges the video might seem counterintuitive to his business but prioritizes user safety.
- A brief coffee break is taken before starting the tutorial.
Chapter 3
Network Chuck guides viewers through setting up Chasm in the Linode Cloud.
- The setup involves creating a new instance in Linode and choosing the appropriate plan.
- A four-gigabyte plan is recommended for Chasm, costing $20 a month.
- He outlines the hourly pricing model of Linode and initiates the setup process.
Chapter 4
The process of installing Chasm on a Linode instance is detailed.
- After creating a Linode instance, Network Chuck accesses it using SSH and updates repositories.
- He installs Chasm with a single command, which initializes the setup and configuration.
- A coffee break is suggested while Chasm installs.
Chapter 5
Instructions on accessing and using the Chasm secure browser are provided.
- Once Chasm is installed, Network Chuck demonstrates how to access the browser via a reverse DNS address.
- A secure browsing session can be launched inside a Docker container that is streamed to the user's local browser.
- The session can be deleted for security after use.
Chapter 6
Explanations on how to use the Chasm Chrome extension for self-hosted secure browsing.
- Network Chuck demonstrates how to install and configure the Chasm Chrome extension for use with the self-hosted browser.
- Users can adjust settings in the extension to connect it to their own self-hosted Chasm server.
- The extension allows opening any link securely within the self-hosted Chasm browser.
Chapter 7
Comparison between the costs and convenience of self-hosting and using the Network Chuck Cloud browser.
- Self-hosting Chasm incurs hardware, internet, and storage costs, while the Network Chuck Cloud browser offers a simpler solution.
- The Network Chuck Cloud browser is cost-effective and does not require IT skills.
- The convenience factor is emphasized for those who do not wish to handle the technicalities of self-hosting.
Chapter 8
Network Chuck addresses security concerns and clarifies privacy policies.
- He assures that neither Network Chuck nor Chasm tracks users' browsing activities within the secure browser containers.
- The service complies with legal requirements and does not support illegal activities.
- Network Chuck affirms the focus is on user security, anonymity, and privacy.
More NetworkChuck summaries
bad USBs are SCARY!! (build one with a Raspberry Pi Pico for $8)
NetworkChuck
A detailed look at the dangers of Bad USBs, demonstrations of hacking with them, and how to protect against such threats.
Docker networking is CRAZY!! (you NEED to learn it)
NetworkChuck
A detailed explanation of Docker networking, including various network types and their features.