What they're not telling you: # ORION BROWSER: THE PRIVACY COMPANY ASKING YOU TO TRUST THE CLOSED BOX Kagi's Orion browser is asking users to swallow an unverifiable claim of "zero telemetry" while refusing to open its source code, creating precisely the conditions under which government data harvesting—or corporate backdoors—become impossible to detect. The pitch is seductive. Users on r/privacy report that Orion, built by Kagi Inc., delivers something mainstream browsers won't: the ability to run both Firefox and Chrome extensions on iOS, a technical feat Apple's walled garden supposedly forbids.

What the Documents Show

It feels like freedom. But beneath the enthusiasm sits a confession buried in the same thread that should alarm anyone claiming to care about privacy: "closed source" and "they claim zero telemetry tho that cant be proven." That last phrase—"that can't be proven"—is the entire story. Kagi's leadership, including CEO Vladimir Prelovac, has staked the company's reputation on a promise it has structurally made impossible to verify. The company's own Reddit defenders acknowledge the logical problem: you cannot audit claims about data collection in closed-source software. This isn't a technical limitation.

🔎 Mainstream angle: The corporate press either ignored this story entirely or buried it in a 3-sentence brief. The framing, when it appeared at all, focused on process rather than impact.

Follow the Money

Prelovac and his team have decided that keeping the codebase proprietary—they claim staff size as justification—matters more than allowing independent security researchers to verify their privacy guarantees. That trade-off, presented as unfortunate necessity, is actually the business model. Here's what matters: without source code access, users have no mechanism to distinguish between Orion and any other browser that collects everything. The absence of evidence—no leaked telemetry, no disclosed data agreements—proves nothing. It only proves that if collection is happening, Kagi has successfully hidden it. That's plausible deniability with a marketing budget.

What Else We Know

The mainstream framing treats this as a feature gap, a small company making reasonable trade-offs. But r/privacy users themselves are identifying the actual stakes: "can't be proven" means users are operating on faith, not fact. Faith is what got us Chrome, Safari, and Edge—browsers where "zero telemetry" claims are regularly contradicted by network traffic analysis, leaked documents, and litigation. Kagi hasn't faced any disclosed data breach or privacy violation. There's no evidence of government access. But that absence is precisely why this matters.

Jordan Calloway
The Jordan Calloway Take
Government Secrets & FOIA

What strikes me about Orion isn't that it's malicious—I have no evidence it is. What strikes me is that Kagi has weaponized user desperation. Privacy advocates are so starved for functional alternatives to Chrome and Safari that they're willing to accept "trust me" instead of "verify me." That's not new. That's how every closed-source privacy claim works. But Kagi is profiting from the exact exhaustion that should make users demand better.

The pattern here is that companies positioning themselves as privacy alternatives can capture privacy-conscious users without ever opening their systems to scrutiny, because the alternative—using Google or Apple—feels so much worse. Kagi benefits from being the least-bad option, not the good option. Prelovac and his team get to market a privacy product without the accountability that transparency requires.

What readers need to understand: a privacy browser you can't audit is just another closed box. Watch whether Kagi ever opens its source. That single decision will tell you everything about whether this is a privacy company or a marketing operation.

Primary Sources

What are they not saying? Who benefits from this story staying buried? Follow the regulatory filings, the court dockets, and the FOIA releases. The truth is in the paperwork — it always is.

Disclosure: NewsAnarchist aggregates from public records, API feeds (Federal Register, CourtListener, MuckRock, Hacker News), and independent media. AI-assisted synthesis. Always verify primary sources linked above.