Quick start

  1. Get Safe Browsing lists and specify the threats and platforms that you're interested in.
  2. Select the interface:

    An easy-to-use interface. It neither enables data encryption nor guarantees server response time.

    Send the URL in the request and get a response on whether it poses a threat.

    A complex-to-implement interface. This interface enables high request frequency and low response times. The data you send to the server is encrypted.
    1. Get a local database of Safe Browsing lists.
    2. Compute the hash prefix for the URL and search the local database.
    3. If you found the hash prefix in the local database, Send a request to the server and get a response with the threat posed by the URL.