Local-first classifier
The phishing classifier is a small model that runs entirely in the browser process, adding under 15ms of latency to page load. No cloud round-trips.
SnareEdge works entirely inside the browser. Everything happens on-device, at the moment a user lands on a page or enters a credential. Here's exactly how.
SnareEdge runs continuously while a browser tab is active, but the decisive moments are these four.
When a user navigates to a page, SnareEdge compares the URL against a locally-cached reputation list. Typosquats, homograph domains, newly-registered lookalikes, and suspicious SSL patterns are flagged within the first 200ms.
For pages that pass URL reputation but still look suspicious (hosted on legitimate cloud infrastructure, for example), SnareEdge runs on-device classification on the rendered page for phishing indicators. Still entirely local: nothing leaves the browser.
When a user enters a password, SnareEdge computes a one-way hash locally and checks it against known-good-site hashes it has cached. If the same credential has been used on a legitimate site, the user is warned before submit: the phishing page never gets the credential.
If any of the above triggers, the user sees a full-page warning banner and can choose to stay or go back. The event is logged for the admin dashboard (aggregated metadata only: no URLs, no credentials).
Most enterprise phishing protection runs in the cloud. SnareEdge runs in the browser. These are the trade-offs we made.
The phishing classifier is a small model that runs entirely in the browser process, adding under 15ms of latency to page load. No cloud round-trips.
The URL-reputation list updates every 15 minutes from our reputation service over signed channels. Your browser cache always has the most recent threats.
Password reuse is checked via a locally-stored one-way hash table. Your real passwords never leave the browser, even to SnareEdge: it's architecturally impossible.
Specific questions about the how-it-works details. If yours isn't here, email hello@snaredge.com.
The classifier adds under 15ms per page load on typical hardware. Most users cannot detect it perceptually. We benchmark this on every release against a mixed device fleet.
Users can dismiss the warning on a per-event basis; the dismissal is logged. Admins can add domain allow-lists. Current false-positive rate is below 0.3%, tuned deliberately.
Yes, the extension runs in private browsing if the user enables it during install. Admin-pushed installations include the Incognito permission by default.
Currently Chrome and Edge only. Firefox support is on the 2026 roadmap. Safari's extension APIs don't currently support the content-level inspection needed for phishing detection.
Install yourself in 90 seconds. No account, no admin console. See a warning the first time you hit a suspicious URL, which is usually sooner than you'd expect.
Free up to 10 seats, no credit card