Documentation — v0.9.4

User Guide

170 MCP tools. 12 password adapters. Bidirectional audio. Trusted events. Zero telemetry — not a setting, a physical impossibility.

macOS arm64 170 MCP tools Fully on-device Arabic-first
User Guide Privacy Policy Download

Getting Started

Linux

  1. 1Download Saj-Browse-0.9.4-macos-arm64.dmg from sajbrowse.com (Linux x86_64 coming soon)
  2. 2Open the DMG and drag Saj Browse to your Applications folder:

    open Saj-Browse-0.9.4-macos-arm64.dmg
  3. 3Enter the extracted folder and launch:

    cd saj-browse
    ./saj-browse.sh

A Linux x86_64 installer will be available shortly. For now, use the macOS arm64 DMG. Both platforms get the full 170-tool binary.

macOS

  1. 1Download Saj Browse.dmg from sajbrowse.com
  2. 2Open the DMG and drag Saj Browse into your Applications folder
  3. 3Launch from Applications or Spotlight
macOS note

The macOS DMG is Developer ID signed and Apple notarised. On first launch, macOS may ask you to confirm you want to open a downloaded application. Click Open. This is a standard macOS security prompt — the app has been verified by Apple.

Windows

Coming soon. Check sajbrowse.com for availability.

First Launch

When Saj Browse opens, the shield in the toolbar shows 0 — this will increase as you browse and trackers are blocked. Everything is already protecting you from the first page you visit.

The sidebar on the left gives you access to your Password Vault, AI Assistant, Saj Link Messaging, and Settings.

Arabic note

Saj Browse supports full right-to-left (RTL) layout. The interface will mirror correctly if your system language is set to Arabic. All sidebar panels and settings are RTL-aware.


Home Page

When you open a new tab, you see the Saj Browse home page.

Search

The search bar in the centre routes your searches through DuckDuckGo by default — a privacy-respecting search engine that does not profile you. You can also type a URL directly to navigate.

Privacy Status

Below the search bar, four indicators show your active protections:

🛡️

Trackers blocked

Your ad and tracker blocker is active

🔒

HTTPS enforced

All connections are encrypted in transit

🌐

DNS encrypted

Your DNS queries are hidden from your ISP

🤖

On-device AI ready

The AI assistant is available

Saj Ecosystem

The home page includes links to other products in the Saj family — Saj Link, Saj Speak, Bella, Marty, and INEVARA. These are informational only and do not transmit data.

Setup Strip

On first launch, a dismissible setup strip appears with three quick actions: Import from Chrome, Choose security level, and Set default search. You can dismiss it at any time — it will not return once dismissed.


Privacy Shield — The Shield Button

The shield button sits in the address bar and shows a number — the count of tracking attempts blocked on the current page.

What the number means

Every time you load a page, companies try to run trackers inside it. These are small pieces of code that report your behaviour back to advertising networks, data brokers, and analytics platforms. Saj Browse blocks each attempt and counts them.

Clicking the shield opens the Threat Narrator panel — a plain-English breakdown of who tried to track you and why.

Reading the Threat Narrator Panel

Each tracker entry shows:

  • Company name — who owns the tracker (e.g. Facebook, Google Analytics, Oracle BlueKai)
  • Attempt count — how many times it tried (shown as x3, x12, etc.)
  • Colour dot — the risk category
  • Explanation — one sentence describing what this tracker was trying to do
Dot colour Category Description
● Red Hostile tracker Cross-site profiling, device fingerprinting, data broker
● Orange Commercial tracker Retargeting, ad networks
● Green Analytics tracker Session recording, page engagement
● Grey Unknown domain Blocked by default

Writing Style Warnings

If Saj Browse detects that a page's writing style does not match the brand it claims to be, a warning will appear in the shield panel. See Writing Style & Phishing Detection for details.

Arabic Phishing Warnings

If the current page contains Arabic text with suspicious characteristics, warnings also appear in the shield panel. See Arabic Language Intelligence for details.

Footer Actions

At the bottom of the Threat Narrator panel:

  • See detailed report — full list of every blocked request for this page load
  • Always block all on this site — applies a permanent site-level rule

Security Levels

Saj Browse gives you three levels of protection. You can change the active level at any time in Settings.

Strong

مستوى قوي

Everything in Standard plus significantly increased fingerprint resistance approaching Tor-grade isolation. Most websites work normally. A small number may prompt you to lower your security level.

Maximum

الحد الأقصى للحماية

Full fingerprint lockdown — your browser looks identical to every other Saj Browse user. Disables exploitable JavaScript capabilities. Intended for journalists, researchers, and high-risk conditions.

Changing your security level

Open Settings (gear icon in the sidebar, or Cmd+,) and select Security Level. Changes take effect on the next page load.


Fingerprint Protection

Browser fingerprinting is a technique websites use to identify you without cookies. By collecting dozens of small details about your browser — your screen size, installed fonts, graphics hardware, timezone, and more — they can build a profile that is often unique enough to track you across the entire web.

Saj Browse neutralises fingerprinting at every layer, automatically and silently.

What is protected

🔌

WebRTC disabled

WebRTC can leak your real IP address even when using a VPN or proxy. Saj Browse disables this by default so your true location is never exposed through media connections.

🎨

Canvas randomised per session

Websites can draw invisible graphics and read the result to identify your specific hardware. Saj Browse adds subtle randomisation each session so the output is always different.

💻

WebGL vendor hidden

Your graphics card model and driver version are commonly used as fingerprint signals. Saj Browse reports generic values so your hardware cannot be identified.

🕵️

User-agent spoofed

Your browser's identity string is normalised to match the most common configuration, making you blend in with millions of other users.

What this means for you

Websites cannot build a unique profile of your browser. Every Saj Browse session looks different, and at the Strong and Maximum security levels, every Saj Browse user looks the same. You do not need to configure anything — fingerprint protection is active from the moment you first launch.

Higher security levels

At the Strong level, fingerprint resistance approaches Tor-grade isolation. At Maximum, your browser is indistinguishable from every other Saj Browse user on Maximum. See Security Levels for more detail.


Per-Tab VPN

Saj Browse lets you route individual browser tabs through a VPN tunnel while the rest of your browsing stays on your normal connection. This means you can protect specific activities — banking, research, sensitive work — without changing how the rest of your tabs behave.

Requires Saj Loop VPN

Per-Tab VPN is powered by Saj Loop, the VPN service from the Saj family. When Saj Loop is available, you will be able to subscribe at sajloop.com.

How to enable

  1. 1Click the VPN toggle in the shield popup for the tab you want to protect
  2. 2The shield icon changes to show a tunnel indicator, confirming the tab is now routed through the VPN
  3. 3Browse normally — all traffic in that tab goes through the encrypted tunnel

Session continuity

Once a tab is tunnelled, every page you navigate to within that tab keeps the same VPN connection and the same exit IP address. This prevents websites from seeing your IP change mid-session, which can trigger security warnings or logouts.

Domain rules

You can create rules that automatically tunnel specific domains. For example, you might set *.bank.com.au so that every time you visit your bank, the tab is automatically routed through the VPN — no manual toggle needed.

To create a domain rule, go to Settings > VPN > Domain Rules and add the domain pattern.

DNS leak protection

When a tab is tunnelled, DNS queries for that tab are also sent through the VPN tunnel. This prevents your ISP from seeing which websites you visit in protected tabs, even at the DNS level. DNS leak protection is always on and cannot be disabled for tunnelled tabs.

Other VPN services

If you already use a system-wide VPN (such as Proton VPN, NordVPN, Mullvad, or any WireGuard/OpenVPN configuration), Saj Browse respects that connection. Per-Tab VPN layers on top of your existing VPN when you need tab-level control.


Anonymous Proxy

The Anonymous Proxy setting controls how your internet traffic is routed. This is separate from the Per-Tab VPN.

Mode Routing Speed Plan
Direct No proxy. Traffic goes directly to websites (or through your VPN). Full speed Free
Private Single-hop proxy. Websites see the proxy's IP, not yours. ~90% Pro
Anonymous Two-hop routing. No single point sees both who you are and where you're going. ~70% Pro
Maximum / Tor Three-hop onion routing. Maximum anonymity. 20–50% Pro

To change your proxy mode, open Settings and scroll to Anonymous Proxy, or click the proxy indicator button in the address bar.


Password Vault الخزنة

The Password Vault is secure, encrypted storage built into Saj Browse. It holds your passwords, saved files, screenshots, and web pages — all encrypted on your device, never uploaded anywhere.

Passwords and auto-fill

Save your login credentials directly in Saj Browse. When you visit a site you have saved credentials for, Saj Browse offers to fill the login form for you. You can also save passwords manually from the Vault panel.

  • Save on login: When you log into a website, Saj Browse asks if you want to save the credentials. Click Save and they are encrypted immediately.
  • Auto-fill: On your next visit, the login fields are filled automatically. You approve the fill with a single click or keyboard shortcut.
  • Search your vault: Open the Vault panel and type in the search bar to find any saved credential by site name, URL, or username.

Import your existing passwords

Switching from another browser or password manager? Saj Browse can import your credentials from a CSV export.

🌐

Chrome

Export from chrome://settings/passwords, then import the CSV into Saj Browse

🔥

Firefox

Export from about:logins, then import the CSV into Saj Browse

🌊

Edge

Export from edge://settings/passwords, then import the CSV into Saj Browse

🍎

Safari

Export from Safari > Preferences > Passwords, then import the CSV into Saj Browse

To import, go to Settings > Password Vault > Import and select your CSV file. Saj Browse will parse the file, encrypt every credential, and delete the original CSV from memory.

Connect external password managers

If you already use a dedicated password manager, you can connect it to Saj Browse instead of migrating your data.

  • 1Password — connect via the 1Password browser integration
  • Bitwarden — connect via the Bitwarden browser integration
  • Apple Keychain — connect via macOS system credentials (macOS only)
  • KeePass — connect by pointing Saj Browse to your KeePass database file

To connect an external manager, go to Settings > Password Vault > External Managers and follow the setup for your provider.

Zero-knowledge AI fill

When an AI assistant fills a login for you, it never sees your password. The credential goes directly from the encrypted vault to the login form. The AI only knows which site you are on and that a credential exists — it never has access to usernames, passwords, or any other secret stored in your vault.

Saved files and media

The Vault also stores images, videos, PDFs, saved web pages, and screenshots. Right-click any image or video and select Save to Vault, or press Cmd+S (macOS) / Ctrl+S (Linux) while hovering over media.

Automatic metadata stripping

All location data (GPS coordinates), camera model, and date/time metadata is removed before encryption. The saved copy contains no metadata that could identify where or when it was taken.

Vault encryption

Everything in the Vault is protected with NIST-standard encryption. New content uses the latest lightweight cryptography standard — faster and more efficient than traditional methods, especially on mobile and ARM devices. Older content is handled transparently with no action needed from you.

Per-category key isolation

The Vault separates your data into six categories, each protected by its own independent encryption key:

Category What it covers
PasswordsSaved login credentials
HistoryYour browsing history
BookmarksSaved bookmarks
Saved PagesWeb pages and media saved to the Vault
Form DataSaved form entries
AI ContextData from AI assistant interactions

Crypto-shred

You can permanently and instantly destroy all data in a single category by deleting its encryption key. This is irreversible and immediate — the data becomes mathematically unrecoverable. No need to overwrite files or wait.

To crypto-shred a category, go to Settings > Vault Encryption and click the Shred button next to the category. You will be asked to confirm — this action cannot be undone.

Vault storage: The free tier holds up to 5 saved credentials and 100 media items. Upgrade to Personal or Pro for unlimited storage.


Passkeys — Passwordless Login

Passkeys are the modern replacement for passwords. Instead of typing a username and password, you authenticate with your device — using your fingerprint, face, or device PIN. No password to remember, no password to steal.

How passkeys work in Saj Browse

When a website offers passwordless login (you will see a "Sign in with passkey" option), Saj Browse handles the entire process:

  1. 1The website requests a passkey authentication
  2. 2Saj Browse prompts you to verify with your device (fingerprint, face, or PIN)
  3. 3A cryptographic proof is sent to the website — your biometric data never leaves your device

Supported sites

Passkeys work with any website that supports the WebAuthn standard. Major sites include:

  • Google
  • GitHub
  • Microsoft
  • Apple
  • Coinbase
  • PayPal
  • And hundreds more — the list grows every month

Where passkeys are stored

Your passkeys are encrypted and stored on your device, inside the Saj Browse vault. They are never sent to a server, never synced to the cloud, and never accessible to websites or AI assistants. Only your biometric or device PIN can unlock them.

Why passkeys are more secure than passwords

Passkeys cannot be phished — they are bound to the specific website that created them. Even if you visit a perfect clone of your bank's website, the passkey will not work because the domain does not match. They also cannot be leaked in a data breach because the website never has your private key.



Saj AI Assistant

The AI Assistant is built into Saj Browse and runs entirely on your device. It never sends your browsing activity, page content, or questions to any external server.

Opening the Assistant

  • Click the robot icon in the sidebar
  • Press Cmd+J (macOS) or Ctrl+J (Linux)
  • Right-click on any page and select Ask Saj

Quick Suggestions

📄

Summarise this page

Extract and condense the current page's content

🔍

Who tracks me here?

Explain blocked trackers in conversational format

🛡️

Is this page safe?

Run phishing and deception analysis

🌐

Translate to Arabic

Translate page content to Arabic

🔗

Find similar pages

Discover related content from your history

What you can ask

  • Tracker analysis: "Who tracks me here?" — explains blocked trackers conversationally
  • Phishing detection: "Is this page safe?" — analyses URL and page content for phishing signals
  • Page summarisation: "Summarise this page" — works immediately without any model download
  • Privacy score: "How private am I?" — calculates a score with specific recommendations
  • Writing style analysis: "Does this email match my bank?" — compares against known brand profiles
  • Browsing context search: "Find pages I read about renewable energy" — searches your encrypted browsing context index

Language Toggle

The AI Assistant includes a language toggle (AR/EN) in the top-right corner. Switch to Arabic for full RTL support and Arabic-language responses. The Assistant responds in whichever language you use to ask your question.

Local AI — Optional Model Download (Off by Default)

Saj Browse is MCP-first: connect Claude, Cursor, or any MCP-compatible client to 170 native browser tools — no model download required. For users who want conversational AI with zero network dependency, a local model is available as an opt-in.

  • Default model: Qwen2.5-1.5B Instruct Q4_K_M
  • Size: approximately 1.1 GB
  • Download: one time only, triggered explicitly by the user
  • Hardware required: 2 GB free RAM minimum
  • Works offline: once downloaded, inference has no network access
  • Additional models: Qwen2.5-3B (~1.9 GB) and Phi-4 Mini (~2.5 GB) selectable in Settings → AI → Model

To enable, open the AI sidebar and click Enable local AI. The browser will prompt for the download. Restart Saj Browse after downloading to activate. You can disable it at any time in Settings > AI. All AI features other than conversational chat work without the local model.


Voice Input البحث الصوتي

Saj Browse supports voice input in the AI Assistant sidebar.

Push-to-Talk

Click the microphone button next to the text input in the AI sidebar to start listening. The button pulses while the microphone is active. Speak your question, and the recognised text appears in the input field.

How it works

Voice input uses your browser's built-in speech recognition. No audio is sent to Saj Browse servers — Saj Browse does not operate any speech processing servers.

Arabic Dialect Support

When speaking in Arabic, Saj Browse detects which dialect you are using and displays a dialect badge:

  • Modern Standard Arabic — الفصحى
  • Gulf Arabic — خليجي
  • Egyptian Arabic — مصري
  • Levantine Arabic — شامي
  • Maghrebi Arabic — مغربي
  • Iraqi Arabic — عراقي

Enabling Voice Input

  1. 1Open Settings
  2. 2Scroll to the AI (On-Device) section
  3. 3Toggle Voice search to on
Coming soon — Pro

A future Pro update will include fully on-device speech-to-text processing, removing any dependency on the browser's built-in speech recognition. Your voice will never leave your device under any circumstances.


Writing Style & Phishing Detection

Saj Browse includes an advanced phishing detection system that goes beyond checking URLs — it analyses the writing style of pages you visit.

How it works

When you visit a login page or a page that appears to be from a well-known brand, Saj Browse automatically analyses the writing style of the page content. The analysis examines:

  • How formal or informal the language is
  • Sentence structure and length patterns
  • Word choice patterns
  • Punctuation habits
  • Overall tone and directness

These are compared against built-in profiles for commonly impersonated brands (major banks, PayPal, Amazon, Apple, Microsoft, and others).

What you see

If the writing style matches the claimed brand, nothing happens. If it does not match, a warning appears in the Shield popup and in the AI Assistant.

Example warning

"Writing style mismatch detected. This page claims to be from ANZ Bank, but the writing style is significantly different from ANZ's verified communications. Exercise caution before entering credentials."

Automatic and Manual

  • Automatic: Saj Browse analyses writing style on login pages (pages with password fields or sign-in forms)
  • Manual: Ask the AI Assistant "Does this match [brand name]?" to analyse any page on demand

Arabic Language Intelligence

Saj Browse has specialised intelligence for Arabic-language browsing — protecting against threats that specifically target Arabic speakers.

Arabic Phishing Detection

Arabic text on the web is vulnerable to unique phishing techniques that standard browsers do not detect:

↩️

RTL Override Attacks

Malicious pages embed invisible Unicode characters that make text appear to read in one direction while the actual content runs the other way. Saj Browse detects these hidden characters.

🔤

Mixed-Script Domains

Attackers register domain names that mix Arabic and Latin characters to create convincing fakes of legitimate websites. Saj Browse flags suspicious script mixing.

🔍

Character Substitution

Some Arabic characters look visually similar to Latin characters. Attackers exploit this to create domain names that look like trusted brands. Saj Browse identifies these substitutions.

Six-Dialect Awareness

Saj Browse recognises six Arabic dialects to improve voice transcription accuracy and Arabic-language AI response quality. This detection is not used for tracking or profiling. No dialect information leaves your device.


Behavioral Lock

Behavioral Lock is an optional security feature that uses your natural browsing patterns as a continuous form of authentication.

How it works

When enabled, Saj Browse observes the rhythm of how you interact with the browser — not what you type or where you browse, but the timing patterns of your keystrokes, clicks, and scrolling. These patterns are unique to each person, like a fingerprint.

Important

Saj Browse only collects timing distributions (statistical summaries), never individual keystrokes or the content of what you type. It knows that your average keystroke interval is, say, 120 milliseconds — it does not know what keys you pressed.

Enrollment

After enabling Behavioral Lock, Saj Browse begins building your behavioral profile. This takes approximately 7 days of normal browsing. A progress bar in Settings shows your enrollment percentage.

What it protects

If someone else uses your browser — even if they have your password — their browsing rhythm will be different from yours. When a mismatch is detected:

  • Vault access is temporarily suspended
  • A notification appears asking you to verify your identity
  • Normal access resumes when your behavioral pattern is recognised again

Duress Detection

Behavioral Lock includes an optional duress detection feature. If your browsing behaviour changes dramatically (same person under stress or coercion), Saj Browse can suspend access to sensitive features. This is designed for high-risk users who may face physical coercion.

Enabling Behavioral Lock

  1. 1Open Settings
  2. 2Scroll to the Behavioral Lock section
  3. 3Toggle Behavioral authentication to on
  4. 4Optionally toggle Duress detection to on
  5. 5Browse normally for approximately 7 days to complete enrollment

INVA Identity

INVA Identity is a decentralised identity feature that will be available in a future Pro update.

What it will do

  • Provide a decentralised identity wallet built into your browser
  • Allow you to prove your identity to websites without revealing unnecessary personal information
  • Use threshold cryptographic signatures — your identity is split across multiple keys so no single point of compromise can steal it
  • Remember which identity to use for each site, so you do not need to reconnect your wallet every visit
Current status

INVA Identity settings are visible in Settings as a preview. The feature is not yet active. When it becomes available, it will be announced through the browser's update notification. Pro subscription required.


Bella Intelligence

If you use Bella — the Executive Operating System — you can connect it to Saj Browse for contextual intelligence while you browse.

What it does

When connected, Bella can receive limited, opt-in context from your browsing. For example: surface related notes from your executive workspace when reading a tender document, show your relationship history when visiting a contact's company website, or connect research to your ongoing projects.

Privacy controls

Toggle What it shares Default
Share tracker data Blocked tracker domain names and company names (no browsing history) Off
Share page metadata Page title, URL, and heading structure Off
Share text excerpts First 500 characters of page text (no form fields, no credentials) Off
Auto-submit on page load Automatically send context when you navigate Off

How to connect

  1. 1Open Settings and scroll to the Bella Intelligence section
  2. 2Toggle Enable Bella to on
  3. 3Enter your Bella account credentials
  4. 4Click Sign in
  5. 5Configure your sharing preferences using the toggles above

What Bella can never access

  • Your passwords or credentials
  • Form field content
  • Vault contents
  • Browsing history beyond the current page (unless you enable auto-submit)
  • Any data from toggles you have not explicitly enabled

AI Agent Control

Saj Browse supports the Model Context Protocol (MCP) — an open standard that lets AI assistants on your computer interact with your browser. Think of it as giving your AI tools a pair of eyes and hands inside Saj Browse, while you stay in control of what they can see and do.

What is MCP?

MCP is a standard way for AI tools to communicate with applications. Instead of each AI tool building its own browser integration, MCP provides a single, secure interface. When you grant permission, an AI assistant can read pages, fill forms, and take actions in Saj Browse — all under your explicit control and through the same privacy protections that apply to your own browsing.

170 tools across 8 domains

Saj Browse exposes 170 specialised tools through MCP — more than any other browser in the world. Tools are organised into 8 capability domains:

🌐

Navigate and read

Open URLs, read page content, extract structured data, traverse pagination, take screenshots

📝

Trusted events

Click and type with isTrusted:true — passes any site's bot-detection checks. Kernel-level input dispatch indistinguishable from a human.

🛡️

Security & privacy (D2)

Supply chain audit, fingerprint exposure, API key scanner, prompt injection detection, dependency vulnerability scan

📷

Accessibility (D1)

Screen reader simulation, cognitive load index, colour blindness simulation, WCAG compliance, ARIA validation

🗄️

Data extraction (D3)

Entity extraction, table intelligence, schema inference, paginated scraping, structured data export

📊

Developer tools (D4)

Performance flame graph, bundle analyser, API mock, SPA route map, cascade trace, render bottleneck

💳

Commerce (D7)

Checkout auditor, price tracker, ad fraud detection, dark pattern scanner, payment SDK allowlist enforcement

🔍

AI / ML detection (D8)

AI-generated content detection, synthetic media detection, prompt leak detection, model fingerprinting, LLM watermark scan

Bidirectional audio and video

AI agents can stream audio and video in both directions. The agent can hear what the page plays, see a live video frame, and speak responses back through the browser. No cloud relay is involved — the audio stream stays on your device.

Zero-knowledge password bridge — 12 adapters

Saj Browse connects to 12 password managers: Proton Pass, 1Password, Bitwarden, KeePass, LastPass, Dashlane, Enpass, NordPass, RoboForm, Keeper, Zoho Vault, and the built-in vault. When an AI agent fills a login form, it never sees your password. A one-time token is issued from the vault directly to the form field. The credential is never exposed to the agent, the page, or any log.

Compatible AI tools

Any AI tool that supports the MCP standard can connect to Saj Browse. Currently compatible with:

  • Claude Code — Anthropic's command-line AI assistant
  • Claude Desktop — Anthropic's desktop application
  • Cursor — AI-powered code editor
  • Windsurf — AI-powered code editor
  • Cline — AI assistant for VS Code

Zero-knowledge credential handling

When an AI agent fills a login form for you, it never sees your password. The credential flows directly from the encrypted vault to the form field. The AI only knows that a credential exists for the current site — it never has access to the actual username, password, or any other secret.

Concurrent sessions

Multiple AI agents can work simultaneously in Saj Browse, each in its own isolated session. One agent can be researching in one tab while another fills out a form in a different tab. Sessions are fully isolated — agents cannot see each other's activity.

Setup

Run the included setup script to configure your AI tools:

  1. 1Open a terminal and navigate to your Saj Browse installation
  2. 2Run the setup script: ./setup-mcp.sh
  3. 3The script detects which AI tools you have installed and configures them automatically
  4. 4Restart your AI tool — it will now show Saj Browse as an available MCP server

Your consent is always required

No AI agent can access Saj Browse without your explicit approval. When an agent requests access, Saj Browse presents a consent prompt showing which AI tool is requesting access, what specific capabilities it needs, how long the access would last, the maximum number of actions, and the risk level. You approve or deny each request.

What agents can never do

  • Access your saved passwords or credentials without a vault unlock and your explicit approval
  • Act without your consent for sensitive operations
  • Bypass the privacy protection that Saj Browse applies to all web requests
  • Access your browsing history or Vault contents silently
  • Read or modify other agents' sessions

Agent history and revocation

All agent actions are written to an audit log. Go to Settings > AI > Agent History to see all active and past sessions, review what actions each agent performed, and revoke any active session immediately. Access tokens expire automatically.


Keyboard Shortcuts

Action macOS Linux
Open / close AI Assistant Cmd+J Ctrl+J
Open / close Vault Cmd+Shift+V Ctrl+Shift+V
Save to Vault (over media) Cmd+S Ctrl+S
Quick command palette Cmd+K Ctrl+K
New tab Cmd+T Ctrl+T
Settings Cmd+, Ctrl+,
Find on page Cmd+F Ctrl+F

Settings Reference

Open Settings from the gear icon in the sidebar, or with Cmd+, (macOS) / Ctrl+, (Linux).

Privacy

SettingDefaultWhat it does
Block trackers and adsOnFour-layer blocking engine
HTTPS-only modeOnRefuses unencrypted connections
Encrypted DNS (DoH)OnHides DNS queries from your ISP
Auto-reject cookie bannersOnDetects and rejects non-essential cookies
Strip metadata on saveOnRemoves GPS and camera info from saved files
Encrypted clipboardOnEncrypts clipboard contents, clears after paste
Threat NarratorOnShows tracker explanations in plain English

AI (On-Device)

SettingDefaultWhat it does
Smart ShieldOnAutomatically repairs site breakage from privacy settings
Phishing detectionOnAnalyses URLs and pages for phishing signals — all on-device
Writing assistanceOffGrammar and style suggestions — no keystrokes leave your device
Voice searchOffPush-to-talk mic in AI sidebar
MCP agent accessOffAllow AI tools to interact with Saj Browse via MCP

Behavioral Lock

SettingDefaultWhat it does
Behavioral authenticationOffYour browsing rhythm becomes a continuous encryption key
Duress detectionOffSuspends vault access if behaviour changes dramatically

INVA Identity

SettingDefaultWhat it does
INVA walletOffDecentralised identity with threshold signatures (Pro)
Per-site identity memoryOffRemember which identity to use for each site

Proxy

SettingDefaultWhat it does
Anonymous proxyOffTwo-hop routing — no single node sees both you and your destination (Pro)
Tor integrationOffThree-hop onion routing for maximum anonymity (Pro)

Updates

SettingWhat it does
Check for updates automaticallyToggle automatic 12-hour background checks on/off
Check NowManually trigger an immediate check
Last checkedWhen the last check ran
Update cardShown when an update is available — includes version, changelog, and download buttons
Skip This VersionSuppress this specific version notification
Download manuallyAlways available at sajbrowse.com

Updates

Saj Browse checks for updates automatically, every 12 hours. You can also check at any time from Settings.

How updates work

  1. 1Saj Browse contacts a static update manifest — not a server that tracks you
  2. 2Only three values are sent: your current version number, operating system (linux/mac/win), and CPU architecture (x86_64/aarch64). Nothing else.
  3. 3If an update is available, a notification bar appears showing what has changed before you decide anything
  4. 4You choose: Update Now, Remind Later, or Skip This Version

The update check routes through your configured proxy if you have one active — your update check goes through your privacy protection, not around it.

Verifying an update

Every release is signed with Ed25519. The signature is checked before anything is downloaded. You can verify any release yourself using the minisign tool — the public key is printed in Settings under the Updates section.

Rolling back

If an update causes a problem, the previous version download link is included in the update manifest. Open Settings > Updates to access it.


FAQ

Is any of my data sent to a server?

No, by default. Tracker blocking, vault, fingerprint protection, and security analysis run entirely on your device. The only outbound activity is: (1) if you connect an external MCP client (Claude, Cursor, etc.), your queries go to that client's service under their privacy policy; (2) the optional local AI model download (~1.1 GB, triggered only if you explicitly enable local AI); (3) the update check, which sends only your version, OS, and architecture. There is no telemetry, no analytics, and no account.

Why does a website look broken or behave strangely?

At the Strong or Maximum security level, some sites may not render correctly. To fix this for a specific site: open Settings, change your Security Level to Standard for that session, and reload the page. You can switch back to Strong or Maximum afterwards.

What is the difference between the Vault encryption and regular browser storage?

Regular browsers store your bookmarks, history, passwords, and saved data in plain text on your device. Anyone with access to your computer can read them. Saj Browse encrypts all stored data with military-grade encryption — each data category has its own encryption key, and you can instantly and permanently destroy any category by deleting its key (crypto-shred).

What is crypto-shred?

Crypto-shred is the ability to permanently destroy data by deleting its encryption key rather than overwriting the data itself. This is instant and mathematically irreversible — without the key, the encrypted data is indistinguishable from random noise. In Saj Browse, you can crypto-shred individual categories (Passwords, History, Bookmarks, Saved Pages, Form Data, AI Context) independently.

How does Behavioral Lock know it is me without tracking what I type?

Behavioral Lock only measures the timing between your actions — how fast you typically type, how you scroll, your click rhythm. It stores these as statistical summaries (distributions), never as individual events or content. It knows your average keystroke interval is 120ms — it does not know you typed anything specific.

Can I install browser extensions in Saj Browse?

Yes. Saj Browse supports standard browser extensions. You can install extensions from addons.mozilla.org or by loading extension files directly from your device. Note that third-party extensions may have their own data collection practices — Saj Browse cannot control what extensions do.

Can AI agents see my passwords?

No. When an AI agent fills a login form, the credential flows directly from the encrypted vault to the form field. The AI never sees the actual password, username, or any other vault secret. This zero-knowledge design means your credentials are safe even if an AI tool is compromised.

How do I export or back up my Vault?

Open the Vault panel (folder icon in the sidebar) and click the export button (the arrow icon at the top right of the panel). This creates an encrypted export file you can store or transfer.

What are passkeys and should I use them?

Passkeys are the modern replacement for passwords. They use your device's biometric authentication (fingerprint or face) to log you into websites. They are more secure than passwords because they cannot be phished, leaked in data breaches, or guessed. If a website offers passkey login, we recommend using it.

Is Saj Browse open source?

Saj Browse is proprietary software developed by Sajdak Group Holdings. The browser engine incorporates components under the Mozilla Public License 2.0. Independent security audits are conducted periodically and published at sajbrowse.com/security. You can verify our privacy claims yourself by monitoring network traffic — see the Network Verification section in the AI User Guide.

What Arabic dialects are supported?

Six: Modern Standard Arabic, Gulf, Egyptian, Levantine, Maghrebi, and Iraqi. Dialect detection improves voice transcription accuracy and AI response quality.

Does Saj Browse work on Windows or mobile?

Windows and mobile versions are planned. At present, Saj Browse is available for Linux and macOS. Check sajbrowse.com for updates on availability.

How do I update Saj Browse?

Saj Browse checks for updates automatically and shows a notification when one is available. You will see what changed before you accept. You can also check at any time: Settings > Updates > Check Now. Updates are cryptographically signed and verified before download.

I have a question not answered here.

Contact support at [email protected]. All support inquiries are handled privately — your email is not stored beyond what is needed to respond to you.


Licence & Pricing

Saj Browse is free to use with generous core features. Upgrade for unlimited storage, VPN, advanced AI tools, and multi-device support.

Free
$0 forever
  • Core privacy (tracker blocking, HTTPS, encrypted DNS)
  • Fingerprint resistance (three security levels)
  • 5 saved credentials in the Password Vault
  • 14-day Pro trial included
  • On-device AI (tracker analysis, phishing, summarisation)
  • Writing style phishing detection
  • Arabic language intelligence and phishing protection
  • Metadata stripping on all saved files
  • Encrypted clipboard
  • Passkey support
  • Saj Link messaging (requires Saj Link account)
  • Automatic updates with cryptographic verification
Pro
$9.99 / month
  • Everything in Personal
  • 170 MCP tools — full AI agent control for Claude Code, Cursor, Windsurf, Cline. Bidirectional audio/video. Trusted events. 12 password adapters.
  • Security audits — AI-powered security analysis of any page
  • Design capture — extract visual layouts and page structure
  • 3 devices — use on up to three computers simultaneously
  • Anonymous proxy — single-hop and two-hop routing
  • Tor integration — three-hop onion routing
  • INVA Identity — decentralised identity wallet (when available)
Enterprise
$29.99 / user / month
  • Everything in Pro
  • Managed deployment — centralised configuration and policy management
  • API access — programmatic control for automation workflows
  • Unlimited devices per user
  • Priority support — dedicated response channel
  • Custom domain rules — organisation-wide VPN and proxy policies
  • Audit log export — compliance-ready agent activity logs