-
64 votes
-
Technical details on the recent Firefox add-on outage
11 votes -
Firefox 66.0.4 has been released - fixes disabled extensions/add-ons
16 votes -
It’s Complicated: Mozilla’s 2019 Internet Health Report
8 votes -
Former Mozilla exec: Google has sabotaged Firefox for years
50 votes -
Protections against fingerprinting and cryptocurrency mining available in Firefox Nightly and Beta
16 votes -
Standardizing WASI: A system interface to run WebAssembly outside the web
8 votes -
Today’s Firefox release aims to reduce your online annoyances
38 votes -
Open Source Doesn’t Make Money Because It Isn’t Designed To Make Money
13 votes -
How secure and private is Firefox?
I was browsing r/privacy today and I came across this guy going on about how Mozilla was just pretending to be privacy focused. Here's his comment. Now I don't really know what to think of this,...
I was browsing r/privacy today and I came across this guy going on about how Mozilla was just pretending to be privacy focused. Here's his comment. Now I don't really know what to think of this, and frankly, I'm getting really exhausted of hearing about how all the things I'm using aren't actually trustworthy. So can so someone put my mind to rest? Does this guy's claims have any truth to them? Thanks.
20 votes -
Mozilla releases Iodide, an open source browser tool for publishing dynamic data science
14 votes -
Firefox Send's free encrypted file transfers are now available to all
21 votes -
By summer 2019, the Firefox browser will also block, by default, all cross-site third-party trackers
@jensimmons: By summer 2019, the Firefox browser will also block, by default, all cross-site third-party trackers, strengthening privacy without your having to do a thing." https://t.co/cqpQbSe9Ko
69 votes -
Firefox 66 to block automatically playing audible video and audio
49 votes -
Firefox 65 release notes
24 votes -
Leaving Mozilla and (most of) the Rust project
7 votes -
Firefox: Moving to a Profile per Install Architecture
12 votes -
thank u, next
20 votes -
Firefox 64 release notes
For general users: https://www.mozilla.org/firefox/64.0/releasenotes/ For web developers: https://hacks.mozilla.org/2018/12/firefox-64-released/
31 votes -
Project Code Rush - The beginnings of Netscape/Mozilla
19 votes -
Tech suffers from lack of humanities, says Mozilla head
10 votes -
Firefox Color V2 released
17 votes -
Introducing Firefox Monitor, helping people take control after a data breach
24 votes -
Firefox just installed two addons into my browser without consent... again
Here is what just happened to me: Firefox installed two addons - fxmonitor@mozilla.org.xpi and telemetry-coverage-bug1487578@mozilla.org into my browser silently, even though I've explicitly...
Here is what just happened to me:
Firefox installed two addons - fxmonitor@mozilla.org.xpi and telemetry-coverage-bug1487578@mozilla.org into my browser silently, even though I've explicitly turned all the telemetry off.
This have happened before, and Mozilla apologized for it, however it seems that they learned nothing and are willing to do so again.
There goes the last scrap of my trust into Firefox. I suggest you check your browsers too.21 votes -
Firefox 62.0 release notes
43 votes -
Mozilla: Changing our approach to anti-tracking
34 votes -
Mozilla files arguments against the FCC – latest step in fight to save net neutrality
14 votes -
Any Rustaceans in the House?
I'm just starting to get into the ecosystem by going through the Book of Rust, and then maybe playing with Parity. Just wondering if anyone else has been through this yet and is up for some...
I'm just starting to get into the ecosystem by going through the Book of Rust, and then maybe playing with Parity. Just wondering if anyone else has been through this yet and is up for some conversation!
11 votes -
Firefox is getting a new logo and wants your feedback
43 votes -
Project Code Rush - The beginnings of Netscape/Mozilla
6 votes -
Project Code Rush - The beginnings of Netscape/Mozilla
6 votes -
Mozilla funds top research projects
7 votes -
Firefox and the four-year battle to have Google treat it as a first-class citizen
17 votes -
Firefox 61.0.0 released
29 votes -
"We're baking Have I Been Pwned into Firefox and 1Password"
15 votes -
Firefox 62 Nightlies: Improving DNS Privacy in Firefox
Firefox recently introduced DNS over HTTPS (DoH) and Trusted Recursive Resolver (TRR) in nightly builds for Firefox 62. DoH and TRR are intended to help mitigate these potential privacy and...
Firefox recently introduced DNS over HTTPS (DoH) and Trusted Recursive Resolver (TRR) in nightly builds for Firefox 62.
DoH and TRR are intended to help mitigate these potential privacy and security concerns:
- Untrustworthy DNS resolvers tracking your requests, or tampering with responses from DNS servers.
- On-path routers tracking or tampering in the same way.
- DNS servers tracking your DNS requests.
DNS over HTTPs (DoH) encrypts DNS requests and responses, protecting against on-path eavesdropping, tracking, and response tampering.
Trusted Recursive Resolver (TRR) allows Firefox to use a DNS resolver that's different from your machines network settings. You can use any recursive resolver that is compatible with DoH, but it should be a trusted resolver (one that won't sell users’ data or trick users with spoofed DNS). Mozilla is partnering with Cloudflare (but not using the 1.1.1.1 address) as the initial default TRR, however it's possible to use another 3rd party TRR or run your own.
Cloudflare is providing a recursive resolution service with a pro-user privacy policy. They have committed to throwing away all personally identifiable data after 24 hours, and to never pass that data along to third-parties. And there will be regular audits to ensure that data is being cleared as expected.
Additionally, Cloudflare will be doing QNAME minimization where the DNS resolver no longer sends the full original QNAME (foo.bar.baz.example.com) to the upstream name server. Instead it will only include the label for the zone it's trying to resolve.
For example, let's assume the DNS resolver is trying to find foo.bar.baz.example.com, and already knows that ns1.nic.example.com is authoritative for .example.com, but does not know a more specific authoritative name server.
- It will send the query for just baz.example.com to ns1.nic.example.com which returns the authoritative name server for baz.example.com.
- The resolver then sends a query for bar.baz.example.com to the nameserver for baz.example.com, and gets a response with the authoritative nameserver for bar.baz.example.com
- Finally the resolver sends the query for foo.bar.baz.example.com to bar.baz.example.com's nameserver.
In doing this the full queried name (foo.bar.baz.example.com) is not exposed to intermediate name servers (bar.baz.example.com, baz.example.com, example.com, or even the .com root nameservers)
Collectively DNS over HTTPs (DoH), Trusted Recursive Resolver (TRR), and QNAME Minimization are a step in the right direction, this does not fix DNS related data leaks entirely:
After you do the DNS lookup to find the IP address, you still need to connect to the web server at that address. To do this, you send an initial request. This request includes a server name indication, which says which site on the server you want to connect to. And this request is unencrypted.
That means that your ISP can still figure out which sites you’re visiting, because it’s right there in the server name indication. Plus, the routers that pass that initial request from your browser to the web server can see that info too.So How do I enable it?
DoH and TRR can be enabled in Firefox 62 or newer by going to about:config:- Set network.trr.mode to 2
- Here's the possible network.trr.mode settings:
- 0 - Off (default): Use standard native resolving only (don't use TRR at all)
- 1 - Race: Native vs. TRR. Do them both in parallel and go with the one that returns a result first.
- 2 - First: Use TRR first, and only if the name resolve fails use the native resolver as a fallback.
- 3 - Only: Only use TRR. Never use the native (after the initial setup).
- 4 - Shadow: Runs the TRR resolves in parallel with the native for timing and measurements but uses only the native resolver results.
- 5 - Off by choice: This is the same as 0 but marks it as done by choice and not done by default.
- Here's the possible network.trr.mode settings:
- Set network.trr.uri to your DoH Server:
- Cloudflare’s is https://mozilla.cloudflare-dns.com/dns-query
(but you can use any DoH compliant endpoint)
- Cloudflare’s is https://mozilla.cloudflare-dns.com/dns-query
- The DNS Tab on about:networking will show which names were resolved using TRR via DoH.
Links:
A cartoon intro to DNS over HTTPS
Improving DNS Privacy in Firefox
DNS Query Name Minimization to Improve Privacy
TRR PreferencesI'm not affiliated with Mozilla or Firefox, I just thought ~ would find this interesting.
13 votes -
Mozilla will not update its privacy policy: It doesn't need to.
17 votes -
Mozilla to remove “meritocracy” from governance docs because it's “problematic”
12 votes