Terms of Service


Terms of Service


Acceptance

Browser Surrogate is a Web Browsing Proxy service offering additional Security and Privacy over normal Web Browsing. The terms for using this service are outlined on this webpage:

  • Please read these Terms of Service carefully, your use of this site and its Services constitutes acceptance of these Terms of Service.
  • If you do not agree with all of these Terms of Service set forth below, you may not use this site or its services.

Changes to this agreement

By using this service you understand the present ‘Terms of Service’ are subject to change made by Browser Surrogate at any time at its sole discretion, and you agree to be bound by any and all modifications, changes and/or revisions. You understand it is your responsibility to periodically review this webpage in order to account for any changes made, as they will be binding once updated.


Acceptable Use


Welcome to Browser Surrogate (“we,” “our,” “us”). Our service is intended for legitimate web activities, including general web browsing, research, remote academic work, remote employment, and other lawful uses. Violations of this Acceptable Use Policy may result in restricted access to the Browser Surrogate service, account termination, forfeiture of subscription fees, or other actions deemed appropriate by Browser Surrogate in response to the breach of these Terms and Acceptable Use.

  1. Compliance with Laws

    You agree to use our service in accordance with all applicable laws and regulations. You must not engage in any activities that are illegal or prohibited by law or under this policy.

  2. Prohibited Uses

    The Following activities are some examples of, but not limited to, activities that are strictly Prohibited:

    • Web Exploitation and Attacks: This includes any form of cyber attacks such as Denial of Service (DoS), Cross-Site Scripting (XSS), SQL Injection (SQLi), and other similar activities targeting any Internet connected device.
    • Web and Data Enumeration: Do not use our service for scraping, mining, or extracting data from websites on the Internet.
    • Bandwidth Abuse: Excessive downloading of large files may lead to bandwidth limitations or blocking of access to the service.
    • Sharing Proxy Authentication Credentials: Sharing your credentials with others is prohibited. If unauthorized use is detected, your access will be blocked, and your account can be suspended and you will forfeit your subscription fees. You are responsible for safeguarding your credentials and must report any potential breaches to us immediately. We will take steps to remove unauthorized users and issue new credentials as needed.
    • Port and Service Scanning: Scanning or probing ports and services of any internet-connected system is not allowed.
    • Hacking and Unauthorized Activities: This includes spoofing, spamming, phishing, intercepting, or monitoring communications.
    • Resource Abuse: Excessive use of resources such as CPU, memory, or disk space is not permitted. Cryptocurrency mining, which places high demands on CPU resources, is an example of such abuse.

  3. Enforcement

    Any violation of this policy may result in corrective actions, including but not limited to suspension or termination of your access to the service. We reserve the right to take appropriate measures to address any breaches.



Registration


To access this service you must Register for an account by filling out the registration form and paying the service fee. Upon successful Registration and payment of the service fee you will receive access credentials and Proxy configuration data to the email address you Registered with.

This is a Privacy focused service, we only collect information we need to make the experience using this service as smooth as possible. When registering for an account we only collect an email address, the location you want your Browser Surrogate, and the subscription type you want. The email address is for communication, we need a way to get into contact with you for things like server maintenance, changes, and important service information that may affect your access. We may also contact you using the email address you provided to offer promotional deals or inform you of new service offerings. The payment processor(s) used may require additional information, Browser Surrogate does not capture or record that Personally Identifiable Information(PII) data on our servers.

When choosing a Surrogate Location it is generally recommended to choose a location that is physically close to you. This will result in the best experience. If you choose a Surrogate Location far away from your physical location you may experience slower web browsing.


Authentication


Upon successful Registration, you will receive your Surrogate Proxy information via email which will include your Proxy configuration data and login credentials.

Browser Surrogate staff will be creating credentials for users. The main reason for this is to ensure strong and unique passwords are utilized for every single user. Another reason is if the credentials are compromised, they will not allow access to any other account you control. The credentials are not protecting your data or anything sensitive, they are only used to access the Browser Surrogate Service so your personal data is not at risk.

It is expected you can properly store and secure your credentials to prevent unauthorized access. It is recommended to use a Password Manager to securely store your password and proxy configuration information. If you lose your credentials you are responsible for notifying Browser Surrogate so we can remove the old credentials from our systems and generate you new credentials to restore your access.

Typically computer systems and Web Browsers can save these credentials enabling you to only enter them once. But if you are changing to a new computer system and want to configure the new system with the Browser Surrogate you need to re-enter those credentials. This is why its important to save and secure your credentials.




Termination


To terminate your use of this Service simply cancel your subscription monthly payment. The account will remain active for the remainder of your billing cycle.




Security


  1. Overview:

    Browser Surrogate is designed to enhance your web browsing security and privacy. While our service provides significant improvements in these areas, it cannot guarantee 100% protection or complete privacy. As with any security tool, it is important to understand its limitations and consider additional measures to protect your privacy.

  2. Service Limitations:

    Browser Surrogate offers specific security enhancements but does not cover all potential privacy or security risks. It is essential to recognize what our service does and does not do in terms of privacy protection:
    • Security Enhancements: We provide added layers of security to help secure your web browsing, for example each instance of Browser Surrogate is hosted on hardened servers and the proxy service running is also hardened and configured securely. However, no service can offer absolute security.
    • Privacy Limitations: Our service cannot ensure complete privacy. There are various ways your privacy might still be compromised despite using our service. It is recommended to assess your specific privacy needs and implement appropriate protections as you see necessary.

  3. User Account Credentials:

    Your user credentials are solely for accessing the Browser Surrogate service. If your credentials are compromised, it poses minimal risk as it will not grant unauthorized access to your personal information or to Browser Surrogate’s systems and data. The credentials only allow you to use the service.

  4. Potential Privacy Risks to consider:

    There are certain scenarios where our service may not fully protect your privacy:

    • Social Media: If you log into social media or your personal email accounts while using our service, your browsing activities could be linked to your online identities.
    • DNS Traffic Correlation: DNS is necessary for web usage, but in some cases, correlating DNS traffic with your web activity might compromise your privacy. To better cover this risk it is recommended to use a privacy focused Browser, such as ‘Brave Browser’, and configure the DNS settings to use DNS+TLS.

  5. Recommended Actions:

    • Implement additional privacy practices and tools as needed based on your personal privacy risk assessment and your specific risk tolerance.



Privacy


Your privacy is our top priority. We are focused on Privacy and Security and bringing you a great service to promote those features. We will never sacrafice your Privacy or Security, we will never sell your data, we cant even access your data.

Logs - Our servers do generate logs which are used for analytics, identifying any issues with the servers or running services, identifying malicious behavior, and enforcing our terms. Our servers are setup to rotate their logs every month, so any log files will be on the server for a month or less before being analyzed and deleted. We dont keep log files for longer than they are needed by our team. Again, we cannot access your private data in your web requests, but if you are browsing from your home we can see your source IP Address. If you dont want our logs to capture your IP address you can access this service using a VPN, TOR or similar technology to anonimize your source IP in our logs.

Personal Data - Our service is designed to only collect necessary information to provide you with our services. We are currently using Stripe payment provider, which requires a credit card or other payment form, but we are investigating different options to provide a more private payment method for users. The data collected by the payment provider is not stored on our servers, systems, logs, no PII from the payment provider is stored on Browser Surrogate systems. Any breach to our systems will not put your private data at risk.

Security - Our service is setup using hardened systems running services that are configured to be as secure as possible while still offering you the best in privacy and security for your web browsing.