Feeds

Fandroids get their very own PERVY SMUT browser

It's called Jerky, which sort of cancels out its privacy settings

Build a business case: developing custom apps

SFW Are you a pr0n-loving Fandroid who's sick of having to toggle the privacy button every time you view a grumble flick?

There's help, er, at hand, apparently, with the release of the world's first ever smut-focused web browser.

A developer called Steven Goh has designed a new mobile web browser which is unsubtly called Jerky, a name that presumably doesn't refer to the dried meat dish but the sort of physical action he intends men to perform as they use it.

Fresh from the success of his Chrome extension Go Away Cameron, which allowed users to bypass the PM's porn restrictions, Goh has stepped up his pro-porn mission to another level.

He fears that the crackdown on filth is part of a dirty tricks campaign which could have a chilling effect on internet freedom.

"The UK blocked goawaycameron.co.uk less than a month after it launched, even though it is not a porn site," the developer claimed in an email. "Isn't that quite a clear sign?"

"I don't think this movement of internet censorship will cease, let alone slow down. But the people can fight back. There is the dark internet and other mechanisms, but I think we can do better.

"With Jerky browser, plenty of users are using it not because of its porn bypass, but because it is a helluva browser just on its own.

The "porn bypass browser" features password protection and a built-in private proxy bypass to sidestep ISP filters worldwide.

These key privacy features should make sure no throbbing members accidentally pop up on screen as you try to show the family which hotel you've booked for the next holiday.

It will also stop ad-stalkers in their tracks, with a "permanently incognito" system which prevents the storage of cookies, files, history or other data.

The dev said that he wasn't so much interested in helping the world see more porn, as wanting to maintain an uncensored internet.

"The world does not need a porn browser. Rather, the world needs more browsers, which are our gateway to the internet, focusing on privacy," he said.

"Now, it also happens that in some parts of the world, the internet is nannied with censorship. I don't believe that power should lie with the government. With the desktop, we have the option of VPN, and even simple Chrome extensions like Go away Cameron that bypass internet filters. But it isn't that easy on a mobile device.

"This is a personal crusade, it is just that people actually like and want porn. And I happen to have zero awkwardness about this taboo. Personally, beyond porn, I believe that there is a lot of room for innovation in connecting people and websites. The fact the internet is so centralised now has brought about quite a few problems like NSA snooping and sniffing or susceptibility to DDoS attacks."

Of course, even the most inept of web surfers can probably figure out how to protect their privacy (up to a point) while browsing. Just click the privacy button, stupid, and clear the history and cookies before fondling your slab in public.

As for "Cameron's porn filter", tech-savvy onanists have pointed out that it is implemented through "opt-out" controls arranged by the UK's internet service providers, and thus is a problem which does not need an additional solution...

On a thread discussing Jerky, one Reddit user wrote: "There is no 'UK porn filter'. There are instead parental controls implemented by the ISP, which, and this bit is the only thing that is new or has been changed, are now enabled by default for new accounts on several major ISPs. You don't need some dodgy new browser to bypass the parental controls, you just need to disable them in your account settings."

An iOS version of Jerky is currently in development and will be rolled out later this year, depending on whether or not it bypasses Cupertino's own porn filter. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
Canadian ISP Shaw falls over with 'routing' sickness
How sure are you of cloud computing now?
Don't call it throttling: Ericsson 'priority' tech gives users their own slice of spectrum
Actually it's a nifty trick - at least you'll pay for what you get
Three floats Jolla in Hong Kong: Says Sailfish is '3rd option'
Network throws hat into ring with Linux-powered handsets
Fifteen zero days found in hacker router comp romp
Four routers rooted in SOHOpelessly Broken challenge
New Sprint CEO says he will lower axe on staff – but prices come first
'Very disruptive' new rates to be revealed next week
US TV stations bowl sueball directly at FCC's spectrum mega-sale
Broadcasters upset about coverage and cost as they shift up and down the dials
Trans-Pacific: Google spaffs cash on FAST undersea packet-flinging
One of 6 backers for new 60 Tbps cable to hook US to Japan
Tech city types developing 'Google Glass for the blind' app
An app and service where other people 'see' for you
UK mobile coverage is BETTER than EVER, networks tell Ofcom
Regulator swallows this line and parrots it back out at us. What are they playing at?
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.