Skip to content
This repository has been archived by the owner on Mar 20, 2019. It is now read-only.


Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?

Latest commit


Git stats


Failed to load latest commit information.
Latest commit message
Commit time

Inox Browser (inox-patchset)

NOTE: This repository is no longer maintained. Please see ungoogled-chromium.

Inox patchset is applied on the chromium source code and tries to prevent data transmission to Google to get a minimal Chromium based browser. The patches are split up based on features, so it's easy to patch only a subset of them.

Table of Contents


It is possible that some data is still transmitted (but down to a minimum) this is because Chromium is a quite large and complex codebase which changes each day.


  • Arch Linux: Pre-built binaries are hosted in the AUR: inox-bin

  • Ubuntu, Debian, OSX, Windows: See ungoogled-chromium, it offers pre-built binaries with inox-patchset and various other patches.


These patches are tested and functional on Arch Linux x86_64, but should run on any Linux/BSD distribution.

The build process takes about 3 hours on a i5-3550 CPU @ 3.90GHz and 16GB ram. (without ccache)

  • Arch Linux: If you are running Arch Linux you can download and build the source from AUR: inox

  • Ubuntu, Debian, OSX, Windows: See ungoogled-chromium, it offers build scripts to compile Chromium with inox-patchset and various other patches.

  • Build manually: If you want to build it yourself check out the Chromium Build Instructions or view the PKGBUILD to get an idea how chromium is built.



Restores old NTP (New Tab Page). The default NTP loads data from a web server to modify the appearance and inject a Google Search bar with a unique identifier.


Adds DuckDuckGo as default search engine, it's still changeable in settings.


Enabled user-modification for all extensions. Disabled extensions:

  • Hotword (incl. Shared Module)
  • Google Now
  • Google Feedback
  • Cloud Print
  • Google Webstore
  • Network Speech synthesis
  • Google Hangout

Disables HTML-Form AutoFill data transmission. I don't know exactly when this is triggered, but it synchronizes the saved Form data with Google.


Disables URLTracker, which checks in which country you are to provide the closest google server for search lookups. I know this class has a bad naming, but nevertheless it connects to Google.


Disables ipv6 probes to Google servers. Google pings its own DNS server to check if ipv6 is available. Changed this to RIPE NCC 2001:7fd::1 (anycasted).


Disables Google Cloud-Messaging status probes. GCM provides an interface to send messages directly to single devices, groups of devices, or devices subscribed to topics.


Disables warning dialog about missing Google API key. This key is usually set on compile time and unique per distribution. See ArchLinux chromium PKGBUILD on how it's applied or this HOWTO for an in-depth API key explanation.

Since we don't want to use these APIs at all, the keys are not set (at least for inox package on AUR).

  • Disables language fetching when settings are opened for the first time
  • Disables TranslateRankerQuery and TranslateRankerEnforcement (connects to

Disables update pings to which is used for component updates.


Hardening the sandbox with Position Independent Code(PIE) against ROP exploits. This patch is originally from openSUSE.


Disables Google's new Avatar and signin menu.


Modifies the first-run behaviour to prevent data leakage.


The W3C Battery Status API[1] has quite a laughable statement:

"The information disclosed has minimal impact on privacy or fingerprinting, and therefore is exposed without permission grants".

Along comes a paper "The leaking battery, A privacy analysis of the HTML5 Battery Status API."

Clean up after the W3C and disable the battery status updater which could be used to identity users[2].



Modifies following default settings (can be changed anytime):

User setting new value
EnableHyperLinkAuditing false
CloudPrintSubmitEnabled false
NetworkPredictionEnabled false
BackgroundModeEnabled false
BlockThirdPartyCookies true
AlternateErrorPagesEnabled false
SearchSuggestEnabled false
AutofillEnabled false
Send feedback to Google if preferences are reset false
BuiltInDnsClientEnabled false
SignInPromoUserSkipped true
SignInPromoShowOnFirstRunAllowed false
ShowAppsShortcutInBookmarkBar false
ShowBookmarkBar true
PromptForDownload true
SafeBrowsingEnabled false
EnableTranslate false
LocalDiscoveryNotificationsEnabled false


Build flags

The PKGBUILD uses chromium GN build system. The following config flags are applied:

Feature Build config
Disable google now enable_google_now=false
Disable WebRTC enable_webrtc=false
Disable Remote service enable_remoting=false
Disable safe browsing safe_browsing_mode=0*
Disable RLZ Identifier enable_rlz=false, enable_rlz_support=false
Disable google hangouts enable_hangout_services_extension=false
Disable print preview enable_print_preview=false

* Builds only with fix-building-without-safebrowsing.patch.

Frequently-asked questions

Install extensions from Google WebStore

Since there is no WebStore plugin, you cannot install extensions directly from the store, but there are two options to install an extension.

Keep in mind extensions are not updated automatically, so make sure you update them on a regular base.

  • Extension downloader

    The most convenient way is via the extension downloader inoxunpack, it's a small python script to download and unpack extensions from Google WebStore.

    Example usages:

    $ inoxunpack ublock-origin
    $ inoxunpack cjpalhdlnbpafiamejdnhcphjbkeiagm

    Both of the commands will download but not install ublock origin. After executing you will se an instruction how to install the extension in developer mode. See inoxunpack for more details.

  • Download manually[EXTENSION_ID]%26installsource%3Dondemand%26uc

  To download a extension just replace [EXTENSION_ID] with the extension-id from the WebStore (For example cjpalhdlnbpafiamejdnhcphjbkeiagm is the extension id of uBlock Origin).

Drag and Drop

Open chrome://extensions and drop the file from the download bar into the extensions tab. Note: Under some circumstances this method does not work on KDE Plasma.

Preferences File

Alternatively you can also install the extension via a preferences file.

For example to install the extension cjpalhdlnbpafiamejdnhcphjbkeiagm create a file called: /usr/share/inox/extensions/cjpalhdlnbpafiamejdnhcphjbkeagm.json with following content:

    "external_crx": "/path/to/extension/extension_1_0_0.crx",
    "external_version": "1.0.0"

If you restart Inox the extension should be loaded automatically. For more details go here.

Use widevine

Though it might not be ideal to use DRM technologies, Inox supports widevine if you provide To activate it, create a symlink from a chromium setup.

# ln -s /usr/lib/chromium/ /usr/lib/inox/

Use a proxy

As mentioned in Foreword it is still possible that some data is leaked to Google, so use if want to use a proxy to achieve a high level of anonymity it would be better to use TorBrowser.

The --proxy-server flag supports HTTP, HTTPS and SOCKS proxies. The --host-resolver-rules flag forces DNS requests through the proxy (prevents DNS leakage), the EXCLUDE option lets Inox resolve the domain name.



inox --proxy-server="socks5://localhost:9050" --host-resolver-rules="MAP *, EXCLUDE localhost, EXCLUDE *.local"


inox --proxy-server="" --host-resolver-rules="MAP *, EXCLUDE localhost, EXCLUDE *.local"

Use firejail

Firejail is a SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf. It supports Inox out of the box, you just need to run inox with firejail: firejail inox.

Reduce memory footprint

Enabling process per site

By default Chrom* heavily isolates each tab regardless of it's domain. While doing this arguably improves security by some extent, downside is that as number of tabs increase, the RAM bloat due to duplication reaches absurd levels. This can end up with Chrom* using >4.5GB of RAM on a machine with 8GB thus preventing other heavy programs from running at the same time. This can be fixed by making Chrom* use one process per site/domain and not per tab. This greatly reduces RAM bloat while (probably) not sacrificing much from security. Use the following command-line argument: inox --process-per-site

For more details go here.


Inox Browser

Here you can find more screenshots.


Use the Issue Tracker for problems, suggestions, and questions, or visit the Inox Browser thread in the Arch forums.

You may also contribute by submitting pull requests.





Donations are welcome and keep me motivated :-)

  • ETH: 0x00bE42851D8F4dE8DEAAbF91a4D93dD4b44Dcf8E
  • BTC: 1EsahKzwNgZF56gmZZz8NVQJ4SWdGnshv4


Inox patchset tries to provide a minimal Chromium based browser with focus on privacy by disabling data transmission to Google.








No packages published