Protocols:
TLS 1.3 Yes
TLS 1.2 Yes*
TLS 1.1 Yes
TLS 1.0 Yes*
(…)
Server hostname ec2-44-235-246-155.us-west-2.compute.amazonaws.com
Protocols:
TLS 1.3 Yes
TLS 1.2 Yes*
TLS 1.1 Yes
TLS 1.0 Yes*
(…)
Server hostname ec2-44-235-246-155.us-west-2.compute.amazonaws.com
(27.07.2020)
No replies
(…)
Why does make Firefox makes those connections?
What is transmitted?
And How can I disable them?
Redirects Twitter requests to Nitter, the privacy friendly alternative.
(October 21, 2019)
DoH not only encrypts the DNS request, but it also serves it to a “normal” web server rather than a DNS server, making the DNS request traffic essentially indistinguishable from normal HTTPS. This is a double-edged sword. While it protects the DNS request itself, just as DNSCrypt or DoT do, it also makes it impossible for the folks in charge of security at large firms to monitor DNS spoofing and it moves the responsibility for a critical networking function from the operating system into an application. It also doesn’t do anything to hide the IP address of the website that you just looked up — you still go to visit it, after all.
And in comparison to DoT, DoH centralizes information about your browsing in a few companies: at the moment Cloudflare, who says they will throw your data away within 24 hours, and Google, who seems intent on retaining and monetizing every detail about everything you’ve ever thought about doing.
Mozilla engineers have managed to annoy their users once again (…)
(Feb 6, 2010 / no specific date)
(25.02.2020)
Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.
WebRTC leaks your actual IP addresses from behind your VPN, by default.
To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.
To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.
(20.12.2017)
This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.
Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.
In the search bar, type each of the following preferences and then set them to the value provided to the right:
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false
browser.ping-centre.telemetry = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
Kommt ihr NIE drauf!
Das Security-Team!
They killed [the] entire threat management team. Mozilla is now without detection and incident response.
The effort would effectively let Chrome and Mozilla users opt in to DNS encryption — making your browser data more secure from spying and monetization — assuming your DNS provider supports it. Needless to day, telecom giants that have made billions of dollars monetizing your every online behavior for decades now (and routinely lying about it) don‘t much like that.
As a result, Comcast, AT&T, and others have been trying to demonize the Google and Mozilla efforts any way they can,
or Browser 8.5a12 is now available from the Tor Browser Alpha download page and also from our distribution directory.
Note: this is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.
This release fixes the issue which caused NoScript and all other Firefox extensions signed by Mozilla to be disabled.
If you used the workaround mentioned in our previous blog post, don‘t forget to set the xpinstall.signatures.required entry in about:config back to true after installing this update.
Mozilla hat sich für das Problem entschuldigt. Derzeit wird daran gearbeitet es zu beheben. Wann es soweit ist, ist noch nicht bekannt.