Archiv: Mozilla (foundation / corporation)

27.11.2020 - 16:35 [ ]

Mozilla enables DOH by default for all Firefox users in the US


Circa 2015, engineers at Cloudflare and Mozilla joined forces to create DNS-over-HTTPS, as a way to hide DNS queries using encryption.

27.11.2020 - 13:59 [ ]

Disable WebRTC

WebRTC leaks your actual IP addresses from behind your VPN, by default.

27.11.2020 - 13:58 [ ]

WebRTC Leak Test

To disable RTCPeerConnection and protect IP addresses leakage, go to about:config and toggle media.peerconnection.enabled to false.

To disable Media Devices, toggle media.navigator.enabled as well as media.peerconnection.enabled both to false.

27.11.2020 - 13:55 [ ]

Turn off WebRtc and surf anonymously


This little practical test proves that a simple script on a web page is sufficient to find out the actual IP address of a user.

27.11.2020 - 13:37 [ ]

How to See (and Disable) the Telemetry Data Firefox Collects About You

Type about:config into the address bar and then hit the Enter key. The page loads with a warning about the impacts of changing these preferences and the effect it can have on Firefox. Click the “Accept the risk and continue” button.

In the search bar, type each of the following preferences and then set them to the value provided to the right:

devtools.onboarding.telemetry.logged = false
toolkit.telemetry.updatePing.enabled = false
browser.newtabpage.activity-stream.feeds.telemetry = false
browser.newtabpage.activity-stream.telemetry = false = false
toolkit.telemetry.bhrPing.enabled = false
toolkit.telemetry.enabled = false
toolkit.telemetry.firstShutdownPing.enabled = false
toolkit.telemetry.hybridContent.enabled = false
toolkit.telemetry.newProfilePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.shutdownPingSender.enabled = false
toolkit.telemetry.unified = false
toolkit.telemetry.updatePing.enabled = false
toolkit.telemetry.reportingpolicy.firstRun = false
toolkit.telemetry.unified = false
toolkit.telemetry.archive.enabled = false
devtools.onboarding.telemetry.logged = false
toolkit.telemetry.bhrPing.enabled = false
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true
datareporting.healthreport.uploadEnabled = false
datareporting.policy.dataSubmissionEnabled = false
datareporting.sessions.current.clean = true

12.11.2019 - 16:59 [ Techdirt ]

Mozilla: ISPs Are Lying About Encrypted DNS, Should Have Privacy Practices Investigated

The effort would effectively let Chrome and Mozilla users opt in to DNS encryption — making your browser data more secure from spying and monetization — assuming your DNS provider supports it. Needless to day, telecom giants that have made billions of dollars monetizing your every online behavior for decades now (and routinely lying about it) don’t much like that.

As a result, Comcast, AT&T, and others have been trying to demonize the Google and Mozilla efforts any way they can,

08.05.2019 - 23:19 [ Tor Project ]

New Release: Tor Browser 8.5a12

or Browser 8.5a12 is now available from the Tor Browser Alpha download page and also from our distribution directory.

Note: this is an alpha release, an experimental version for users who want to help us test new features. For everyone else, we recommend downloading the latest stable release instead.

This release fixes the issue which caused NoScript and all other Firefox extensions signed by Mozilla to be disabled.

If you used the workaround mentioned in our previous blog post, don’t forget to set the xpinstall.signatures.required entry in about:config back to true after installing this update.

05.05.2019 - 11:51 [ Tionisla ‏/ Twitter ]

Ok, seems #firefox is working as intended now… BUT *having to* enable studies (I never intended to enable) to get it fixed, the fact add-ons are resolved by a central certificate made it clear #Mozilla has a different view on „privacy first“ than me.