<s>
Comodo	B-Protocol
Dragon	I-Protocol
is	O
a	O
freeware	B-License
web	B-Application
browser	I-Application
.	O
</s>
<s>
It	O
is	O
based	O
on	O
Chromium	B-Language
and	O
is	O
produced	O
by	O
Comodo	O
Group	O
.	O
</s>
<s>
Sporting	O
a	O
similar	O
interface	O
to	O
Google	B-Application
Chrome	I-Application
,	O
Dragon	O
does	O
not	O
implement	O
Chrome	B-Application
's	O
user	O
tracking	O
and	O
some	O
other	O
potentially	O
privacy-compromising	O
features	O
,	O
replacing	O
them	O
with	O
its	O
own	O
user	O
tracking	O
implementations	O
,	O
and	O
provides	O
additional	O
security	B-Application
measures	O
,	O
such	O
as	O
indicating	O
the	O
authenticity	O
and	O
relative	O
strength	O
of	O
a	O
website	O
's	O
Secure	B-Protocol
Sockets	I-Protocol
Layer	I-Protocol
(	O
SSL	B-Protocol
)	O
certificate	O
.	O
</s>
<s>
Upon	O
installation	O
,	O
Comodo	B-Protocol
Dragon	I-Protocol
offers	O
the	O
opportunity	O
to	O
configure	O
either	O
the	O
Comodo	B-Protocol
Dragon	I-Protocol
or	O
the	O
user	O
's	O
entire	O
computer	O
to	O
use	O
Comodo	O
's	O
own	O
DNS	B-Protocol
servers	B-Application
instead	O
of	O
the	O
user	O
's	O
Internet	O
service	O
provider	O
.	O
</s>
<s>
Comodo	B-Protocol
Dragon	I-Protocol
performs	O
additional	O
checks	O
on	O
the	O
SSL	B-Protocol
digital	O
certificates	O
of	O
secure	O
websites	O
,	O
and	O
informs	O
users	O
if	O
a	O
site	O
's	O
certificate	O
may	O
be	O
of	O
insufficient	O
strength	O
.	O
</s>
<s>
Instead	O
of	O
Google	B-Application
Updater	O
,	O
Comodo	B-Protocol
Dragon	I-Protocol
features	O
its	O
own	O
built-in	O
updater	O
.	O
</s>
<s>
If	O
Dragon	O
is	O
uninstalled	B-Application
,	O
users	O
are	O
given	O
the	O
option	O
of	O
keeping	O
Dragon	O
's	O
cache	B-Protocol
and	O
cookie	B-Application
files	I-Application
or	O
deleting	O
them	O
.	O
</s>
<s>
In	O
addition	O
,	O
the	O
following	O
Google	B-Application
Chrome	I-Application
features	O
are	O
removed	O
or	O
disabled	O
in	O
Dragon	O
:	O
</s>
<s>
A	O
Google	B-Application
engineer	O
publicly	O
disclosed	O
a	O
serious	O
security	B-Application
vulnerability	O
in	O
Comodo	B-Protocol
Dragon	I-Protocol
after	O
Comodo	O
failed	O
to	O
respond	O
to	O
the	O
issue	O
within	O
the	O
90	O
days	O
Google	B-Application
provides	O
software	O
vendors	O
.	O
</s>
<s>
The	O
advisory	O
warns	O
users	O
who	O
install	O
Comodo	B-Protocol
Dragon	I-Protocol
that	O
Dragon	O
replaces	O
their	O
default	O
browser	B-Application
,	O
hijacks	O
DNS	B-Protocol
settings	O
,	O
and	O
disables	O
the	O
same-origin	B-Protocol
policy	I-Protocol
,	O
which	O
exposes	O
users	O
by	O
allowing	O
malicious	O
websites	O
to	O
access	O
private	O
data	O
.	O
</s>
<s>
Comodo	O
tracks	O
each	O
user	O
's	O
time	O
spent	O
using	O
the	O
browser	B-Application
,	O
its	O
operating	O
system	O
,	O
and	O
browser	B-Application
inquiries	O
about	O
certificate	O
revocation	O
,	O
which	O
reveal	O
the	O
sites	O
visited	O
.	O
</s>
<s>
Comodo	O
and	O
its	O
partners	O
use	O
cookies	B-Application
and	O
Google	B-Application
Analytics	O
.	O
</s>
<s>
Comodo	O
creates	O
log	O
files	O
which	O
track	O
users	O
,	O
identifiable	O
by	O
cookie	B-Application
or	O
browser	B-Application
features	O
(	O
and	O
IP	O
address	O
outside	O
California	O
)	O
:	O
"	O
Comodo	O
uses	O
log	O
files	O
non-personally	O
identifiable	O
information	O
to	O
...	O
track	O
movements	O
throughout	O
the	O
site	O
...	O
and	O
gather	O
broad	O
demographic	O
information	O
for	O
aggregate	O
use.	O
"	O
</s>
<s>
The	O
browser	B-Application
is	O
supported	O
by	O
ads	O
which	O
"	O
relate	O
to	O
the	O
content	O
of	O
the	O
information	O
as	O
part	O
of	O
the	O
Product	O
or	O
queries	O
made	O
through	O
the	O
Product.	O
"	O
</s>
