Post

AI CERTS

3 hours ago

AI Search Browser Comet Hits iPhone Amid Security Debate

This report unpacks the timeline, architecture, risks, and market implications behind the headline. Along the way, we examine how Comet could reshape mobile search habits and business models. Moreover, guidance for professionals seeking competitive skills appears throughout. Together these insights provide an authoritative briefing for decision makers evaluating the emerging AI Search Browser category. In contrast, rivals from Google and Arc also prepare expanded agent assistants for smartphones. Consequently, the coming year will clarify winners, losers, and required safeguards.

AI Search Browser app discussed by security experts in office
Security experts analyze the impact of the AI Search Browser on mobile privacy.

Comet Reaches iPhone Users

The iOS launch finalizes Comet’s cross-platform roadmap that began on desktop in July 2025. Previously, Android users received the AI Search Browser in November 2025, giving Perplexity data on mobile engagement. Subsequently, Perplexity opened an App Store pre-order that listed 11 March in some regions. Apple’s US listing later settled on 18 March, and downloads started that morning.

Meanwhile, StatCounter shows Safari controlling about 25% of global mobile share, with Chrome above 65%. Therefore, any newcomer must fight entrenched defaults and restrictive iOS policies. Comet attempts differentiation through model choice, natural language commands, and deep integration of AI summaries. In contrast, Safari reserves on-device Siri suggestions, while Chrome leans on Gemini for cloud assistance. Early App Store reviews praise rapid content summarization yet critique sign-in friction for subscription tiers.

Overall, the iOS launch secures platform parity but exposes adoption hurdles on Apple hardware. Nevertheless, strong initial curiosity keeps Comet visible as the newest AI Search Browser challenger.

Agentic Browser Design Explained

Comet embeds an autonomous assistant able to read pages, click buttons, and perform multi-step tasks. Additionally, the agent can reference information from parallel tabs and user calendars to finish workflows. This capability turns the traditional browser into an execution environment for compound commands. Therefore, security boundaries based on explicit clicks become insufficient.

Comet’s designers argue that productivity gains outweigh the complexity. However, Zenity Labs warns that any agent operating with browser privileges inherits the user's full authority. Indirect prompt injection can quietly steer that authority toward malicious goals. For example, a calendar invite with hidden instructions may trigger file exfiltration without further interaction. Subsequently, the agent might leak unlocked password vaults or corporate tokens.

Comet mitigates some risks by blocking file:// URLs and prompting before sensitive actions. Nevertheless, experts state that deterministic boundaries alone cannot neutralize every scenario. Therefore, enterprise defenders must layer zero-trust principles, extension hardening, and monitoring around any AI Search Browser deployment. These architectural realities illuminate both innovation potential and systemic exposure. Consequently, security remains central to the broader discussion ahead.

Security Concerns Intensify Quickly

Zenity disclosed the PleaseFix vulnerability family on 3 March 2026 after coordinating patches with the company. Furthermore, researchers demonstrated zero-click attacks against the AI Search Browser that extracted local files and active session cookies. Perplexity confirmed closing the file exfiltration path on 13 February, one month before public disclosure. Nevertheless, Zenity CTO Michael Bargury argued the weakness is architectural, not a mere bug. In contrast, Perplexity maintains that layered confirmations limit real-world exploitation risk.

Consequently, enterprises now scrutinize agentic browsers during vendor assessments. Several password manager vendors, including 1Password, hardened extension behavior following the disclosure. Meanwhile, security outlets advise users to disable agent file access and restrict calendar integrations.

Key immediate mitigations include:

  • Update Comet to the latest version patched after 13 February.
  • Revoke unnecessary extension permissions, especially password manager vault access.
  • Avoid delegating calendar invites to agents until stricter parsing is deployed.

These steps reduce attack surface today. However, long-term defenses demand sandbox redesigns and formal verification of agent prompts. Security debate therefore runs parallel to every product announcement. Next, market forces shape adoption prospects.

Market Context And Challenges

Comet enters a mobile search landscape dominated by Safari and Chrome incumbents. Moreover, StatCounter reports Chrome at roughly 66% mobile share, while Safari holds near 25%. Therefore, capturing even single-digit percentage points would signify meaningful traction.

Perplexity told TechCrunch it handled 780 million queries in May 2025 with 20% monthly growth. Consequently, leadership believes the AI Search Browser can funnel queries directly into its answer engine. Revenue stems from subscription tiers and potential publisher sharing, not from display advertising volume. In contrast, Apple and Google protect search revenue streams tied to ad marketplaces.

Consequently, platform gatekeepers may resist deeper integration of external voice assistants or agentic automation. Developers also face WebKit restrictions that limit performance enhancements on iPhone. Nevertheless, power users value cross-model selection and integrated summarization, two sharp differentiators. Market data show tough odds yet reveal room for niche penetration. The financial model now deserves closer review.

Business Model And Pricing

Comet is free to download yet pushes Pro and Max subscriptions through in-app purchases. Additionally, pricing starts near $4.99 monthly and climbs toward $200 for enterprise plans. Subscribers receive higher model quotas, longer context windows, and early experimental features.

For power researchers, bundled neural reranking promises faster mobile search results within enterprise knowledge bases. Meanwhile, the AI Search Browser gathers engagement signals that could support revenue sharing with publishers. Consequently, content partners may view Comet as an additional monetization avenue without classic display ads. Analysts debate whether subscription growth alone can cover infrastructure costs for large-scale inference.

Nevertheless, the company claims payback periods shorten when users replace multiple standalone tools. Professionals can enhance their expertise with the AI+ Researcher™ certification to evaluate such economic assumptions. In summary, the financial blueprint relies on recurring revenue and differentiated value. Next, we examine enterprise adoption signals.

Adoption Outlook For Enterprises

Large organizations monitor agentic tooling but usually restrict production use until controls mature. However, forward-leaning teams already pilot the AI Search Browser in isolated research sandboxes. These pilots focus on knowledge management and rapid mobile search across internal portals.

Moreover, compliance leads demand auditable agent logs, deterministic prompts, and revocable permission scopes. Tool makers respond by adding configurable guardrails and integration hooks for SIEM platforms. Consequently, adoption speed depends on friction between productivity and residual risk.

Some CISOs still recall the sudden disclosure that preceded the iOS launch. Nevertheless, they acknowledge talent pressure from employees who already trust consumer agents. Subsequently, policies may shift toward limited-scope deployments rather than outright bans. Enterprise momentum therefore hinges on advancing security standards and proving ROI. Finally, we consolidate insights and offer next steps.

Key Takeaways

Comet’s arrival positions the AI Search Browser as a bold alternative to entrenched mobile platforms. However, Zenity’s disclosure underscores that agentic power invites novel attacks requiring systemic defenses. Market data demonstrates daunting competition, yet differentiated features and cross-model choice attract early adopters.

Consequently, enterprises should pilot the tool within contained scopes and enforce strict permissions. Meanwhile, professionals can deepen evaluation skills through the linked AI+ Researcher™ certification. These combined actions balance innovation hunger with responsible risk management. Moreover, continuous training on safe prompt patterns will further mitigate indirect injection tricks.

Stay informed by subscribing to our updates and testing emerging agentic browsers in controlled environments.