Getting Started
Linux
- 1Download
Saj-Browse-0.9.4-macos-arm64.dmgfrom sajbrowse.com (Linux x86_64 coming soon) - 2Open the DMG and drag Saj Browse to your Applications folder:
open Saj-Browse-0.9.4-macos-arm64.dmg - 3Enter the extracted folder and launch:
cd saj-browse
./saj-browse.sh
A Linux x86_64 installer will be available shortly. For now, use the macOS arm64 DMG. Both platforms get the full 170-tool binary.
macOS
- 1Download
Saj Browse.dmgfrom sajbrowse.com - 2Open the DMG and drag Saj Browse into your Applications folder
- 3Launch from Applications or Spotlight
The macOS DMG is Developer ID signed and Apple notarised. On first launch, macOS may ask you to confirm you want to open a downloaded application. Click Open. This is a standard macOS security prompt — the app has been verified by Apple.
Windows
Coming soon. Check sajbrowse.com for availability.
First Launch
When Saj Browse opens, the shield in the toolbar shows 0 — this will increase as you browse and trackers are blocked. Everything is already protecting you from the first page you visit.
The sidebar on the left gives you access to your Password Vault, AI Assistant, Saj Link Messaging, and Settings.
Saj Browse supports full right-to-left (RTL) layout. The interface will mirror correctly if your system language is set to Arabic. All sidebar panels and settings are RTL-aware.
Home Page
When you open a new tab, you see the Saj Browse home page.
Search
The search bar in the centre routes your searches through DuckDuckGo by default — a privacy-respecting search engine that does not profile you. You can also type a URL directly to navigate.
Privacy Status
Below the search bar, four indicators show your active protections:
Trackers blocked
Your ad and tracker blocker is active
HTTPS enforced
All connections are encrypted in transit
DNS encrypted
Your DNS queries are hidden from your ISP
On-device AI ready
The AI assistant is available
Saj Ecosystem
The home page includes links to other products in the Saj family — Saj Link, Saj Speak, Bella, Marty, and INEVARA. These are informational only and do not transmit data.
Setup Strip
On first launch, a dismissible setup strip appears with three quick actions: Import from Chrome, Choose security level, and Set default search. You can dismiss it at any time — it will not return once dismissed.
Privacy Shield — The Shield Button
The shield button sits in the address bar and shows a number — the count of tracking attempts blocked on the current page.
Every time you load a page, companies try to run trackers inside it. These are small pieces of code that report your behaviour back to advertising networks, data brokers, and analytics platforms. Saj Browse blocks each attempt and counts them.
Clicking the shield opens the Threat Narrator panel — a plain-English breakdown of who tried to track you and why.
Reading the Threat Narrator Panel
Each tracker entry shows:
- Company name — who owns the tracker (e.g. Facebook, Google Analytics, Oracle BlueKai)
- Attempt count — how many times it tried (shown as x3, x12, etc.)
- Colour dot — the risk category
- Explanation — one sentence describing what this tracker was trying to do
| Dot colour | Category | Description |
|---|---|---|
| ● Red | Hostile tracker | Cross-site profiling, device fingerprinting, data broker |
| ● Orange | Commercial tracker | Retargeting, ad networks |
| ● Green | Analytics tracker | Session recording, page engagement |
| ● Grey | Unknown domain | Blocked by default |
Writing Style Warnings
If Saj Browse detects that a page's writing style does not match the brand it claims to be, a warning will appear in the shield panel. See Writing Style & Phishing Detection for details.
Arabic Phishing Warnings
If the current page contains Arabic text with suspicious characteristics, warnings also appear in the shield panel. See Arabic Language Intelligence for details.
Footer Actions
At the bottom of the Threat Narrator panel:
- See detailed report — full list of every blocked request for this page load
- Always block all on this site — applies a permanent site-level rule
Security Levels
Saj Browse gives you three levels of protection. You can change the active level at any time in Settings.
Standard
Blocks ads and trackers, enforces HTTPS, encrypts DNS, prevents WebRTC IP leaks, normalises canvas and WebGL fingerprints, strips GPS from saves. Full compatibility with all websites. The right level for everyday browsing.
Strong
Everything in Standard plus significantly increased fingerprint resistance approaching Tor-grade isolation. Most websites work normally. A small number may prompt you to lower your security level.
Maximum
Full fingerprint lockdown — your browser looks identical to every other Saj Browse user. Disables exploitable JavaScript capabilities. Intended for journalists, researchers, and high-risk conditions.
Open Settings (gear icon in the sidebar, or Cmd+,) and select Security Level. Changes take effect on the next page load.
Fingerprint Protection
Browser fingerprinting is a technique websites use to identify you without cookies. By collecting dozens of small details about your browser — your screen size, installed fonts, graphics hardware, timezone, and more — they can build a profile that is often unique enough to track you across the entire web.
Saj Browse neutralises fingerprinting at every layer, automatically and silently.
What is protected
WebRTC disabled
WebRTC can leak your real IP address even when using a VPN or proxy. Saj Browse disables this by default so your true location is never exposed through media connections.
Canvas randomised per session
Websites can draw invisible graphics and read the result to identify your specific hardware. Saj Browse adds subtle randomisation each session so the output is always different.
WebGL vendor hidden
Your graphics card model and driver version are commonly used as fingerprint signals. Saj Browse reports generic values so your hardware cannot be identified.
User-agent spoofed
Your browser's identity string is normalised to match the most common configuration, making you blend in with millions of other users.
What this means for you
Websites cannot build a unique profile of your browser. Every Saj Browse session looks different, and at the Strong and Maximum security levels, every Saj Browse user looks the same. You do not need to configure anything — fingerprint protection is active from the moment you first launch.
At the Strong level, fingerprint resistance approaches Tor-grade isolation. At Maximum, your browser is indistinguishable from every other Saj Browse user on Maximum. See Security Levels for more detail.
Per-Tab VPN
Saj Browse lets you route individual browser tabs through a VPN tunnel while the rest of your browsing stays on your normal connection. This means you can protect specific activities — banking, research, sensitive work — without changing how the rest of your tabs behave.
Per-Tab VPN is powered by Saj Loop, the VPN service from the Saj family. When Saj Loop is available, you will be able to subscribe at sajloop.com.
How to enable
- 1Click the VPN toggle in the shield popup for the tab you want to protect
- 2The shield icon changes to show a tunnel indicator, confirming the tab is now routed through the VPN
- 3Browse normally — all traffic in that tab goes through the encrypted tunnel
Session continuity
Once a tab is tunnelled, every page you navigate to within that tab keeps the same VPN connection and the same exit IP address. This prevents websites from seeing your IP change mid-session, which can trigger security warnings or logouts.
Domain rules
You can create rules that automatically tunnel specific domains. For example, you might set *.bank.com.au so that every time you visit your bank, the tab is automatically routed through the VPN — no manual toggle needed.
To create a domain rule, go to Settings > VPN > Domain Rules and add the domain pattern.
DNS leak protection
When a tab is tunnelled, DNS queries for that tab are also sent through the VPN tunnel. This prevents your ISP from seeing which websites you visit in protected tabs, even at the DNS level. DNS leak protection is always on and cannot be disabled for tunnelled tabs.
Other VPN services
If you already use a system-wide VPN (such as Proton VPN, NordVPN, Mullvad, or any WireGuard/OpenVPN configuration), Saj Browse respects that connection. Per-Tab VPN layers on top of your existing VPN when you need tab-level control.
Anonymous Proxy
The Anonymous Proxy setting controls how your internet traffic is routed. This is separate from the Per-Tab VPN.
| Mode | Routing | Speed | Plan |
|---|---|---|---|
| Direct | No proxy. Traffic goes directly to websites (or through your VPN). | Full speed | Free |
| Private | Single-hop proxy. Websites see the proxy's IP, not yours. | ~90% | Pro |
| Anonymous | Two-hop routing. No single point sees both who you are and where you're going. | ~70% | Pro |
| Maximum / Tor | Three-hop onion routing. Maximum anonymity. | 20–50% | Pro |
To change your proxy mode, open Settings and scroll to Anonymous Proxy, or click the proxy indicator button in the address bar.
Password Vault الخزنة
The Password Vault is secure, encrypted storage built into Saj Browse. It holds your passwords, saved files, screenshots, and web pages — all encrypted on your device, never uploaded anywhere.
Passwords and auto-fill
Save your login credentials directly in Saj Browse. When you visit a site you have saved credentials for, Saj Browse offers to fill the login form for you. You can also save passwords manually from the Vault panel.
- Save on login: When you log into a website, Saj Browse asks if you want to save the credentials. Click Save and they are encrypted immediately.
- Auto-fill: On your next visit, the login fields are filled automatically. You approve the fill with a single click or keyboard shortcut.
- Search your vault: Open the Vault panel and type in the search bar to find any saved credential by site name, URL, or username.
Import your existing passwords
Switching from another browser or password manager? Saj Browse can import your credentials from a CSV export.
Chrome
Export from chrome://settings/passwords, then import the CSV into Saj Browse
Firefox
Export from about:logins, then import the CSV into Saj Browse
Edge
Export from edge://settings/passwords, then import the CSV into Saj Browse
Safari
Export from Safari > Preferences > Passwords, then import the CSV into Saj Browse
To import, go to Settings > Password Vault > Import and select your CSV file. Saj Browse will parse the file, encrypt every credential, and delete the original CSV from memory.
Connect external password managers
If you already use a dedicated password manager, you can connect it to Saj Browse instead of migrating your data.
- 1Password — connect via the 1Password browser integration
- Bitwarden — connect via the Bitwarden browser integration
- Apple Keychain — connect via macOS system credentials (macOS only)
- KeePass — connect by pointing Saj Browse to your KeePass database file
To connect an external manager, go to Settings > Password Vault > External Managers and follow the setup for your provider.
When an AI assistant fills a login for you, it never sees your password. The credential goes directly from the encrypted vault to the login form. The AI only knows which site you are on and that a credential exists — it never has access to usernames, passwords, or any other secret stored in your vault.
Saved files and media
The Vault also stores images, videos, PDFs, saved web pages, and screenshots. Right-click any image or video and select Save to Vault, or press Cmd+S (macOS) / Ctrl+S (Linux) while hovering over media.
All location data (GPS coordinates), camera model, and date/time metadata is removed before encryption. The saved copy contains no metadata that could identify where or when it was taken.
Vault encryption
Everything in the Vault is protected with NIST-standard encryption. New content uses the latest lightweight cryptography standard — faster and more efficient than traditional methods, especially on mobile and ARM devices. Older content is handled transparently with no action needed from you.
Per-category key isolation
The Vault separates your data into six categories, each protected by its own independent encryption key:
| Category | What it covers |
|---|---|
| Passwords | Saved login credentials |
| History | Your browsing history |
| Bookmarks | Saved bookmarks |
| Saved Pages | Web pages and media saved to the Vault |
| Form Data | Saved form entries |
| AI Context | Data from AI assistant interactions |
Crypto-shred
You can permanently and instantly destroy all data in a single category by deleting its encryption key. This is irreversible and immediate — the data becomes mathematically unrecoverable. No need to overwrite files or wait.
To crypto-shred a category, go to Settings > Vault Encryption and click the Shred button next to the category. You will be asked to confirm — this action cannot be undone.
Vault storage: The free tier holds up to 5 saved credentials and 100 media items. Upgrade to Personal or Pro for unlimited storage.
Passkeys — Passwordless Login
Passkeys are the modern replacement for passwords. Instead of typing a username and password, you authenticate with your device — using your fingerprint, face, or device PIN. No password to remember, no password to steal.
How passkeys work in Saj Browse
When a website offers passwordless login (you will see a "Sign in with passkey" option), Saj Browse handles the entire process:
- 1The website requests a passkey authentication
- 2Saj Browse prompts you to verify with your device (fingerprint, face, or PIN)
- 3A cryptographic proof is sent to the website — your biometric data never leaves your device
Supported sites
Passkeys work with any website that supports the WebAuthn standard. Major sites include:
- GitHub
- Microsoft
- Apple
- Coinbase
- PayPal
- And hundreds more — the list grows every month
Where passkeys are stored
Your passkeys are encrypted and stored on your device, inside the Saj Browse vault. They are never sent to a server, never synced to the cloud, and never accessible to websites or AI assistants. Only your biometric or device PIN can unlock them.
Passkeys cannot be phished — they are bound to the specific website that created them. Even if you visit a perfect clone of your bank's website, the passkey will not work because the domain does not match. They also cannot be leaked in a data breach because the website never has your private key.
Saj Link Messaging ساج لينك
Saj Browse includes a built-in messaging panel powered by Saj Link — the end-to-end encrypted messaging platform from the Saj family.
What it is
Saj Link provides military-grade end-to-end encrypted conversations. By connecting your Saj Link account to Saj Browse, you can send and receive encrypted messages directly from the browser sidebar — without switching to a separate app.
How to set it up
- 1Open Settings and scroll to the Saj Link section
- 2Toggle Enable Saj Link messaging to on
- 3Enter your Saj Link email and password
- 4Click Sign in
- 5The status badge will change from "Not connected" (grey) to "Connected" (green)
Using Saj Link in the sidebar
Once connected, click the link icon in the sidebar to open the messaging panel. You will see your contact list, the chat view, and the encrypted message input. Messages are identical in security to those sent through the Saj Link app — encryption happens on your device before transmission.
What Saj Link does NOT do in the browser
- It does not read your browsing history
- It does not share page content with contacts
- It does not send notifications about your browsing activity
- The messaging panel is completely separate from your browsing session
Saj AI Assistant
The AI Assistant is built into Saj Browse and runs entirely on your device. It never sends your browsing activity, page content, or questions to any external server.
Opening the Assistant
- Click the robot icon in the sidebar
- Press Cmd+J (macOS) or Ctrl+J (Linux)
- Right-click on any page and select Ask Saj
Quick Suggestions
Summarise this page
Extract and condense the current page's content
Who tracks me here?
Explain blocked trackers in conversational format
Is this page safe?
Run phishing and deception analysis
Translate to Arabic
Translate page content to Arabic
Find similar pages
Discover related content from your history
What you can ask
- Tracker analysis: "Who tracks me here?" — explains blocked trackers conversationally
- Phishing detection: "Is this page safe?" — analyses URL and page content for phishing signals
- Page summarisation: "Summarise this page" — works immediately without any model download
- Privacy score: "How private am I?" — calculates a score with specific recommendations
- Writing style analysis: "Does this email match my bank?" — compares against known brand profiles
- Browsing context search: "Find pages I read about renewable energy" — searches your encrypted browsing context index
Language Toggle
The AI Assistant includes a language toggle (AR/EN) in the top-right corner. Switch to Arabic for full RTL support and Arabic-language responses. The Assistant responds in whichever language you use to ask your question.
Local AI — Optional Model Download (Off by Default)
Saj Browse is MCP-first: connect Claude, Cursor, or any MCP-compatible client to 170 native browser tools — no model download required. For users who want conversational AI with zero network dependency, a local model is available as an opt-in.
- Default model: Qwen2.5-1.5B Instruct Q4_K_M
- Size: approximately 1.1 GB
- Download: one time only, triggered explicitly by the user
- Hardware required: 2 GB free RAM minimum
- Works offline: once downloaded, inference has no network access
- Additional models: Qwen2.5-3B (~1.9 GB) and Phi-4 Mini (~2.5 GB) selectable in Settings → AI → Model
To enable, open the AI sidebar and click Enable local AI. The browser will prompt for the download. Restart Saj Browse after downloading to activate. You can disable it at any time in Settings > AI. All AI features other than conversational chat work without the local model.
Voice Input البحث الصوتي
Saj Browse supports voice input in the AI Assistant sidebar.
Push-to-Talk
Click the microphone button next to the text input in the AI sidebar to start listening. The button pulses while the microphone is active. Speak your question, and the recognised text appears in the input field.
How it works
Voice input uses your browser's built-in speech recognition. No audio is sent to Saj Browse servers — Saj Browse does not operate any speech processing servers.
Arabic Dialect Support
When speaking in Arabic, Saj Browse detects which dialect you are using and displays a dialect badge:
- Modern Standard Arabic — الفصحى
- Gulf Arabic — خليجي
- Egyptian Arabic — مصري
- Levantine Arabic — شامي
- Maghrebi Arabic — مغربي
- Iraqi Arabic — عراقي
Enabling Voice Input
- 1Open Settings
- 2Scroll to the AI (On-Device) section
- 3Toggle Voice search to on
A future Pro update will include fully on-device speech-to-text processing, removing any dependency on the browser's built-in speech recognition. Your voice will never leave your device under any circumstances.
Writing Style & Phishing Detection
Saj Browse includes an advanced phishing detection system that goes beyond checking URLs — it analyses the writing style of pages you visit.
How it works
When you visit a login page or a page that appears to be from a well-known brand, Saj Browse automatically analyses the writing style of the page content. The analysis examines:
- How formal or informal the language is
- Sentence structure and length patterns
- Word choice patterns
- Punctuation habits
- Overall tone and directness
These are compared against built-in profiles for commonly impersonated brands (major banks, PayPal, Amazon, Apple, Microsoft, and others).
What you see
If the writing style matches the claimed brand, nothing happens. If it does not match, a warning appears in the Shield popup and in the AI Assistant.
"Writing style mismatch detected. This page claims to be from ANZ Bank, but the writing style is significantly different from ANZ's verified communications. Exercise caution before entering credentials."
Automatic and Manual
- Automatic: Saj Browse analyses writing style on login pages (pages with password fields or sign-in forms)
- Manual: Ask the AI Assistant "Does this match [brand name]?" to analyse any page on demand
Arabic Language Intelligence
Saj Browse has specialised intelligence for Arabic-language browsing — protecting against threats that specifically target Arabic speakers.
Arabic Phishing Detection
Arabic text on the web is vulnerable to unique phishing techniques that standard browsers do not detect:
RTL Override Attacks
Malicious pages embed invisible Unicode characters that make text appear to read in one direction while the actual content runs the other way. Saj Browse detects these hidden characters.
Mixed-Script Domains
Attackers register domain names that mix Arabic and Latin characters to create convincing fakes of legitimate websites. Saj Browse flags suspicious script mixing.
Character Substitution
Some Arabic characters look visually similar to Latin characters. Attackers exploit this to create domain names that look like trusted brands. Saj Browse identifies these substitutions.
Six-Dialect Awareness
Saj Browse recognises six Arabic dialects to improve voice transcription accuracy and Arabic-language AI response quality. This detection is not used for tracking or profiling. No dialect information leaves your device.
Behavioral Lock
Behavioral Lock is an optional security feature that uses your natural browsing patterns as a continuous form of authentication.
How it works
When enabled, Saj Browse observes the rhythm of how you interact with the browser — not what you type or where you browse, but the timing patterns of your keystrokes, clicks, and scrolling. These patterns are unique to each person, like a fingerprint.
Saj Browse only collects timing distributions (statistical summaries), never individual keystrokes or the content of what you type. It knows that your average keystroke interval is, say, 120 milliseconds — it does not know what keys you pressed.
Enrollment
After enabling Behavioral Lock, Saj Browse begins building your behavioral profile. This takes approximately 7 days of normal browsing. A progress bar in Settings shows your enrollment percentage.
What it protects
If someone else uses your browser — even if they have your password — their browsing rhythm will be different from yours. When a mismatch is detected:
- Vault access is temporarily suspended
- A notification appears asking you to verify your identity
- Normal access resumes when your behavioral pattern is recognised again
Duress Detection
Behavioral Lock includes an optional duress detection feature. If your browsing behaviour changes dramatically (same person under stress or coercion), Saj Browse can suspend access to sensitive features. This is designed for high-risk users who may face physical coercion.
Enabling Behavioral Lock
- 1Open Settings
- 2Scroll to the Behavioral Lock section
- 3Toggle Behavioral authentication to on
- 4Optionally toggle Duress detection to on
- 5Browse normally for approximately 7 days to complete enrollment
INVA Identity
INVA Identity is a decentralised identity feature that will be available in a future Pro update.
What it will do
- Provide a decentralised identity wallet built into your browser
- Allow you to prove your identity to websites without revealing unnecessary personal information
- Use threshold cryptographic signatures — your identity is split across multiple keys so no single point of compromise can steal it
- Remember which identity to use for each site, so you do not need to reconnect your wallet every visit
INVA Identity settings are visible in Settings as a preview. The feature is not yet active. When it becomes available, it will be announced through the browser's update notification. Pro subscription required.
Bella Intelligence
If you use Bella — the Executive Operating System — you can connect it to Saj Browse for contextual intelligence while you browse.
What it does
When connected, Bella can receive limited, opt-in context from your browsing. For example: surface related notes from your executive workspace when reading a tender document, show your relationship history when visiting a contact's company website, or connect research to your ongoing projects.
Privacy controls
| Toggle | What it shares | Default |
|---|---|---|
| Share tracker data | Blocked tracker domain names and company names (no browsing history) | Off |
| Share page metadata | Page title, URL, and heading structure | Off |
| Share text excerpts | First 500 characters of page text (no form fields, no credentials) | Off |
| Auto-submit on page load | Automatically send context when you navigate | Off |
How to connect
- 1Open Settings and scroll to the Bella Intelligence section
- 2Toggle Enable Bella to on
- 3Enter your Bella account credentials
- 4Click Sign in
- 5Configure your sharing preferences using the toggles above
What Bella can never access
- Your passwords or credentials
- Form field content
- Vault contents
- Browsing history beyond the current page (unless you enable auto-submit)
- Any data from toggles you have not explicitly enabled
AI Agent Control
Saj Browse supports the Model Context Protocol (MCP) — an open standard that lets AI assistants on your computer interact with your browser. Think of it as giving your AI tools a pair of eyes and hands inside Saj Browse, while you stay in control of what they can see and do.
What is MCP?
MCP is a standard way for AI tools to communicate with applications. Instead of each AI tool building its own browser integration, MCP provides a single, secure interface. When you grant permission, an AI assistant can read pages, fill forms, and take actions in Saj Browse — all under your explicit control and through the same privacy protections that apply to your own browsing.
170 tools across 8 domains
Saj Browse exposes 170 specialised tools through MCP — more than any other browser in the world. Tools are organised into 8 capability domains:
Navigate and read
Open URLs, read page content, extract structured data, traverse pagination, take screenshots
Trusted events
Click and type with isTrusted:true — passes any site's bot-detection checks. Kernel-level input dispatch indistinguishable from a human.
Security & privacy (D2)
Supply chain audit, fingerprint exposure, API key scanner, prompt injection detection, dependency vulnerability scan
Accessibility (D1)
Screen reader simulation, cognitive load index, colour blindness simulation, WCAG compliance, ARIA validation
Data extraction (D3)
Entity extraction, table intelligence, schema inference, paginated scraping, structured data export
Developer tools (D4)
Performance flame graph, bundle analyser, API mock, SPA route map, cascade trace, render bottleneck
Commerce (D7)
Checkout auditor, price tracker, ad fraud detection, dark pattern scanner, payment SDK allowlist enforcement
AI / ML detection (D8)
AI-generated content detection, synthetic media detection, prompt leak detection, model fingerprinting, LLM watermark scan
Bidirectional audio and video
AI agents can stream audio and video in both directions. The agent can hear what the page plays, see a live video frame, and speak responses back through the browser. No cloud relay is involved — the audio stream stays on your device.
Zero-knowledge password bridge — 12 adapters
Saj Browse connects to 12 password managers: Proton Pass, 1Password, Bitwarden, KeePass, LastPass, Dashlane, Enpass, NordPass, RoboForm, Keeper, Zoho Vault, and the built-in vault. When an AI agent fills a login form, it never sees your password. A one-time token is issued from the vault directly to the form field. The credential is never exposed to the agent, the page, or any log.
Compatible AI tools
Any AI tool that supports the MCP standard can connect to Saj Browse. Currently compatible with:
- Claude Code — Anthropic's command-line AI assistant
- Claude Desktop — Anthropic's desktop application
- Cursor — AI-powered code editor
- Windsurf — AI-powered code editor
- Cline — AI assistant for VS Code
Zero-knowledge credential handling
When an AI agent fills a login form for you, it never sees your password. The credential flows directly from the encrypted vault to the form field. The AI only knows that a credential exists for the current site — it never has access to the actual username, password, or any other secret.
Concurrent sessions
Multiple AI agents can work simultaneously in Saj Browse, each in its own isolated session. One agent can be researching in one tab while another fills out a form in a different tab. Sessions are fully isolated — agents cannot see each other's activity.
Setup
Run the included setup script to configure your AI tools:
- 1Open a terminal and navigate to your Saj Browse installation
- 2Run the setup script:
./setup-mcp.sh - 3The script detects which AI tools you have installed and configures them automatically
- 4Restart your AI tool — it will now show Saj Browse as an available MCP server
Your consent is always required
No AI agent can access Saj Browse without your explicit approval. When an agent requests access, Saj Browse presents a consent prompt showing which AI tool is requesting access, what specific capabilities it needs, how long the access would last, the maximum number of actions, and the risk level. You approve or deny each request.
What agents can never do
- Access your saved passwords or credentials without a vault unlock and your explicit approval
- Act without your consent for sensitive operations
- Bypass the privacy protection that Saj Browse applies to all web requests
- Access your browsing history or Vault contents silently
- Read or modify other agents' sessions
Agent history and revocation
All agent actions are written to an audit log. Go to Settings > AI > Agent History to see all active and past sessions, review what actions each agent performed, and revoke any active session immediately. Access tokens expire automatically.
Keyboard Shortcuts
| Action | macOS | Linux |
|---|---|---|
| Open / close AI Assistant | Cmd+J | Ctrl+J |
| Open / close Vault | Cmd+Shift+V | Ctrl+Shift+V |
| Save to Vault (over media) | Cmd+S | Ctrl+S |
| Quick command palette | Cmd+K | Ctrl+K |
| New tab | Cmd+T | Ctrl+T |
| Settings | Cmd+, | Ctrl+, |
| Find on page | Cmd+F | Ctrl+F |
Settings Reference
Open Settings from the gear icon in the sidebar, or with Cmd+, (macOS) / Ctrl+, (Linux).
Privacy
| Setting | Default | What it does |
|---|---|---|
| Block trackers and ads | On | Four-layer blocking engine |
| HTTPS-only mode | On | Refuses unencrypted connections |
| Encrypted DNS (DoH) | On | Hides DNS queries from your ISP |
| Auto-reject cookie banners | On | Detects and rejects non-essential cookies |
| Strip metadata on save | On | Removes GPS and camera info from saved files |
| Encrypted clipboard | On | Encrypts clipboard contents, clears after paste |
| Threat Narrator | On | Shows tracker explanations in plain English |
AI (On-Device)
| Setting | Default | What it does |
|---|---|---|
| Smart Shield | On | Automatically repairs site breakage from privacy settings |
| Phishing detection | On | Analyses URLs and pages for phishing signals — all on-device |
| Writing assistance | Off | Grammar and style suggestions — no keystrokes leave your device |
| Voice search | Off | Push-to-talk mic in AI sidebar |
| MCP agent access | Off | Allow AI tools to interact with Saj Browse via MCP |
Behavioral Lock
| Setting | Default | What it does |
|---|---|---|
| Behavioral authentication | Off | Your browsing rhythm becomes a continuous encryption key |
| Duress detection | Off | Suspends vault access if behaviour changes dramatically |
INVA Identity
| Setting | Default | What it does |
|---|---|---|
| INVA wallet | Off | Decentralised identity with threshold signatures (Pro) |
| Per-site identity memory | Off | Remember which identity to use for each site |
Proxy
| Setting | Default | What it does |
|---|---|---|
| Anonymous proxy | Off | Two-hop routing — no single node sees both you and your destination (Pro) |
| Tor integration | Off | Three-hop onion routing for maximum anonymity (Pro) |
Updates
| Setting | What it does |
|---|---|
| Check for updates automatically | Toggle automatic 12-hour background checks on/off |
| Check Now | Manually trigger an immediate check |
| Last checked | When the last check ran |
| Update card | Shown when an update is available — includes version, changelog, and download buttons |
| Skip This Version | Suppress this specific version notification |
| Download manually | Always available at sajbrowse.com |
Updates
Saj Browse checks for updates automatically, every 12 hours. You can also check at any time from Settings.
How updates work
- 1Saj Browse contacts a static update manifest — not a server that tracks you
- 2Only three values are sent: your current version number, operating system (linux/mac/win), and CPU architecture (x86_64/aarch64). Nothing else.
- 3If an update is available, a notification bar appears showing what has changed before you decide anything
- 4You choose: Update Now, Remind Later, or Skip This Version
The update check routes through your configured proxy if you have one active — your update check goes through your privacy protection, not around it.
Verifying an update
Every release is signed with Ed25519. The signature is checked before anything is downloaded. You can verify any release yourself using the minisign tool — the public key is printed in Settings under the Updates section.
Rolling back
If an update causes a problem, the previous version download link is included in the update manifest. Open Settings > Updates to access it.
FAQ
Is any of my data sent to a server?
No, by default. Tracker blocking, vault, fingerprint protection, and security analysis run entirely on your device. The only outbound activity is: (1) if you connect an external MCP client (Claude, Cursor, etc.), your queries go to that client's service under their privacy policy; (2) the optional local AI model download (~1.1 GB, triggered only if you explicitly enable local AI); (3) the update check, which sends only your version, OS, and architecture. There is no telemetry, no analytics, and no account.
Why does a website look broken or behave strangely?
At the Strong or Maximum security level, some sites may not render correctly. To fix this for a specific site: open Settings, change your Security Level to Standard for that session, and reload the page. You can switch back to Strong or Maximum afterwards.
What is the difference between the Vault encryption and regular browser storage?
Regular browsers store your bookmarks, history, passwords, and saved data in plain text on your device. Anyone with access to your computer can read them. Saj Browse encrypts all stored data with military-grade encryption — each data category has its own encryption key, and you can instantly and permanently destroy any category by deleting its key (crypto-shred).
What is crypto-shred?
Crypto-shred is the ability to permanently destroy data by deleting its encryption key rather than overwriting the data itself. This is instant and mathematically irreversible — without the key, the encrypted data is indistinguishable from random noise. In Saj Browse, you can crypto-shred individual categories (Passwords, History, Bookmarks, Saved Pages, Form Data, AI Context) independently.
How does Behavioral Lock know it is me without tracking what I type?
Behavioral Lock only measures the timing between your actions — how fast you typically type, how you scroll, your click rhythm. It stores these as statistical summaries (distributions), never as individual events or content. It knows your average keystroke interval is 120ms — it does not know you typed anything specific.
Can I install browser extensions in Saj Browse?
Yes. Saj Browse supports standard browser extensions. You can install extensions from addons.mozilla.org or by loading extension files directly from your device. Note that third-party extensions may have their own data collection practices — Saj Browse cannot control what extensions do.
Can AI agents see my passwords?
No. When an AI agent fills a login form, the credential flows directly from the encrypted vault to the form field. The AI never sees the actual password, username, or any other vault secret. This zero-knowledge design means your credentials are safe even if an AI tool is compromised.
How do I export or back up my Vault?
Open the Vault panel (folder icon in the sidebar) and click the export button (the arrow icon at the top right of the panel). This creates an encrypted export file you can store or transfer.
What are passkeys and should I use them?
Passkeys are the modern replacement for passwords. They use your device's biometric authentication (fingerprint or face) to log you into websites. They are more secure than passwords because they cannot be phished, leaked in data breaches, or guessed. If a website offers passkey login, we recommend using it.
Is Saj Browse open source?
Saj Browse is proprietary software developed by Sajdak Group Holdings. The browser engine incorporates components under the Mozilla Public License 2.0. Independent security audits are conducted periodically and published at sajbrowse.com/security. You can verify our privacy claims yourself by monitoring network traffic — see the Network Verification section in the AI User Guide.
What Arabic dialects are supported?
Six: Modern Standard Arabic, Gulf, Egyptian, Levantine, Maghrebi, and Iraqi. Dialect detection improves voice transcription accuracy and AI response quality.
Does Saj Browse work on Windows or mobile?
Windows and mobile versions are planned. At present, Saj Browse is available for Linux and macOS. Check sajbrowse.com for updates on availability.
How do I update Saj Browse?
Saj Browse checks for updates automatically and shows a notification when one is available. You will see what changed before you accept. You can also check at any time: Settings > Updates > Check Now. Updates are cryptographically signed and verified before download.
I have a question not answered here.
Contact support at [email protected]. All support inquiries are handled privately — your email is not stored beyond what is needed to respond to you.
Licence & Pricing
Saj Browse is free to use with generous core features. Upgrade for unlimited storage, VPN, advanced AI tools, and multi-device support.
- Core privacy (tracker blocking, HTTPS, encrypted DNS)
- Fingerprint resistance (three security levels)
- 5 saved credentials in the Password Vault
- 14-day Pro trial included
- On-device AI (tracker analysis, phishing, summarisation)
- Writing style phishing detection
- Arabic language intelligence and phishing protection
- Metadata stripping on all saved files
- Encrypted clipboard
- Passkey support
- Saj Link messaging (requires Saj Link account)
- Automatic updates with cryptographic verification
- Everything in Free
- Unlimited Password Vault — no credential or media limits
- Per-Tab VPN — route individual tabs through a VPN tunnel
- AI sidebar — enhanced model with longer document analysis
- Voice search — push-to-talk with Arabic dialect support
- Import from Chrome, Firefox, Edge, Safari
- External password manager connections
- Everything in Personal
- 170 MCP tools — full AI agent control for Claude Code, Cursor, Windsurf, Cline. Bidirectional audio/video. Trusted events. 12 password adapters.
- Security audits — AI-powered security analysis of any page
- Design capture — extract visual layouts and page structure
- 3 devices — use on up to three computers simultaneously
- Anonymous proxy — single-hop and two-hop routing
- Tor integration — three-hop onion routing
- INVA Identity — decentralised identity wallet (when available)
- Everything in Pro
- Managed deployment — centralised configuration and policy management
- API access — programmatic control for automation workflows
- Unlimited devices per user
- Priority support — dedicated response channel
- Custom domain rules — organisation-wide VPN and proxy policies
- Audit log export — compliance-ready agent activity logs