Overview
Free enterprise-grade protection for your personal browser.
Join the rebellion against cyber threats with ThreatSlayer. Our security browser extension uses advanced AI threat detection and a collaborative network of cyber rebels to block dangerous websites and protect you from phishing attacks, scams and bad downloads. Plus, our blockchain-enabled version, rewards you for helping the community fight back. (coming soon) Features * Instant protection from browser-based threats: dangerous websites, phishing attacks and bad downloads * A.I. Threat Detection detects novel urls and dangerous sites in real-time * Blocks wallet drainers automatically * Rewards you for making the community safer About our A.I. Threat Detection ThreatSlayer uses A.I. Threat Detection to protect you from harmful websites. It works by comparing a list of trusted and untrusted websites to a trained system called a classifier. This classifier uses supervised learning to understand the differences between safe and dangerous sites, and can accurately identify potential threats, in real time, to keep you safe online. Most security products use static databases, so they're unable to detect attacks in real time. ThreatSlayer is one step ahead of the cyber criminals. What Data Does ThreatSlayer Collect? ThreatSlayer collects no personal information. The only data it sends is a URL, which we then scan with our threat detecting AI. ThreatSlayer saves anonymized URLs that cannot be associated with any individual user.
Details
- Version0.0.10
- UpdatedJune 27, 2023
- Size720KiB
- Languages14 languages
- Developer
- TraderThis developer has identified itself as a trader per the definition from the European Union.
Privacy
ThreatSlayer: Security & Phishing Protection has disclosed the following information regarding the collection and usage of your data. More detailed information can be found in the developer's privacy policy.
ThreatSlayer: Security & Phishing Protection collects the following:
This developer declares that your data is
- Not being sold to third parties, outside of the approved use cases
- Not being used or transferred for purposes that are unrelated to the item's core functionality
- Not being used or transferred to determine creditworthiness or for lending purposes