Wow, Mozilla publishes a convenient List of Domains to Block for Firefox!
https://support.mozilla.org/en-US/kb/domains-allow-firefox
Except somehow they typo'd the title.
Wow, Mozilla publishes a convenient List of Domains to Block for Firefox!
https://support.mozilla.org/en-US/kb/domains-allow-firefox
Except somehow they typo'd the title.
@dalias "Tracking Protection (What exactly does it do)?"
@_@
@stephen0x2dfox @_ It tracks you for your protection 🤪
@dalias You should provide http://detectportal.firefox.com (though replacing it with a local version is sensible), and it looks like https://tracking-protection.cdn.mozilla.net is just an S3 bucket full of hashes. The others, though, I could do without.
@wizzwizz4 A list of hashes that could probably be used to break extensions...
@wizzwizz4 No, they cannot modify the source code on my machines *after I compiled it* (or rather after the distro I trust did). The whole violation is them having power to retroactively change things after I got it.
@dalias Mozilla could simply modify the source code of Firefox to do that. Your threat model should be data exfiltration, imo, not remote reconfiguration.
Check the source, to see if tracking protection is applied to extensions. I doubt it would be.
GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.
All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.