The Internet can be a dangerous place. One of Maxthon’s biggest goals is to provide users with safe and secure Internet browsing that won’t be compromised by hackers or third-party advertisers. We take several measures on our end to make sure your computer and your web history remains safe.
Here are just a few steps you can take when it comes to ensure you’re safely browsing the Internet and keeping important information – such as usernames, account information, chat logs, etc - out of the hands of others.
1st Step: Check the URL in the address bar
Typically, websites use the prefix ‘http://’, but secure websites will use ‘https://’ – the extra ‘s’ means your connection to the website is encrypted.
2nd Step: Check for the green briefcase symbol
In Maxthon, when a site is secure, you’ll see a green briefcase that will show the website is verified and certified. We confirm through third parties that websites really are who they say they are.
3rd Step: If you get an SSL warning, do not click through
If Maxthon believes the website you’re trying to connect to isn’t what it should be, a warning will be displayed about the site’s security certificate being untrusted. To be safe, you shouldn’t proceed unless you know or understand the technical reason why you’ve received the warning.
Maxthon’s EXTRA step: Triple threat security system
We have an arsenal of security systems and processes to keep you and your data safe, so you can freely enjoy your web the way you want it, when you want it, wherever you want it. We look at security across three major areas: (a) Encryption for over the air (OTA) processes; (b) Spreading out that data across multiple servers and (c) maintaining strict personnel practices.
Step A: Encryption for over the air (OTA) processes – Your web browsing history, passwords, messages, etc. are encrypted in the same method as used by the US government. This means anyone trying to ‘listen in’ or hack your information will be unable to decipher the message.
Step B: Spreading out that data throughout several different servers – Your (now-encrypted) data is then cryptographically ‘hashed’ and distributed to different servers in our architecture. Your information gets chopped up into multiple chunks, which are separately encrypted.
Step C: Maintaining strict personnel practices – Finally, we take a serious approach to personnel practices. Maxthon employs a small, core team of network operations specialists who can access any of the servers where your data (now-encrypted and now-hashed) lives.
Finally, there’s the ‘key’ – which is how to unlock this data. Some cloud services maintain the customer’s ‘key’ in their cloud. Maxthon keeps that key limited to the physical device – meaning you would have to have physical possession of the device in question to access decrypted Cloud content.
Simply put, we refuse to make it easy for hackers. If an unauthorized individual or government agency tries to hack your web browser looking for data or files, they will be met with a wall of security custom-designed by Maxthon, with the sole purpose of keeping your information safe.
Thank you again for supporting Maxthon Web Browsers.
The Maxthon Team