(25.02.2020)
Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.
Nachrichtenagentur Radio Utopie
Nachrichten direkt von der Quelle. Im Kontext sehen. News Agency of Radio Utopie. News directly from the source. There is context in life. Deutsch, English. 24 h. – Democracy First!
(25.02.2020)
Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.
WebRTC leaks your actual IP addresses from behind your VPN, by default.
To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.
To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.
(20.12.2017)
This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.
Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.
In the search bar, type each of the following preferences and then set them to the value provided to the right:
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false
browser.ping-centre.telemetry = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
Kommt ihr NIE drauf!
Das Security-Team!
They killed [the] entire threat management team. Mozilla is now without detection and incident response.
The effort would effectively let Chrome and Mozilla users opt in to DNS encryption — making your browser data more secure from spying and monetization — assuming your DNS provider supports it. Needless to day, telecom giants that have made billions of dollars monetizing your every online behavior for decades now (and routinely lying about it) don’t much like that.
As a result, Comcast, AT&T, and others have been trying to demonize the Google and Mozilla efforts any way they can,
or Browser 8.5a12 is now available from the Tor Browser Alpha download page and also from our distribution directory.
Note: this is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.
This release fixes the issue which caused NoScript and all other Firefox extensions signed by Mozilla to be disabled.
If you used the workaround mentioned in our previous blog post, don’t forget to set the xpinstall.signatures.required entry in about:config back to true after installing this update.
Mozilla hat sich für das Problem entschuldigt. Derzeit wird daran gearbeitet es zu beheben. Wann es soweit ist, ist noch nicht bekannt.