/tech/ - Technology

101010

Posting mode: Reply

Check to confirm you're not a robot
Name
Email
Subject
Comment
Password
Drawing x size canvas
File(s)

Remember to follow the rules

Max file size: 350.00 MB

Max files: 5

Max message length: 4096

Manage Board | Moderate Thread

Return | Catalog | Bottom

Expand All Images


(434.19 KB 1266x1509 1416575617064.png)
How to secure firefox forks post legacy Anonymous 10/22/2018 (Mon) 01:33:52 [Preview] No. 12908
Icecat now no longer supports LEGACY EXTENTIONS. Pic related is some of the extentions that are mostly legacy now.
Is the new firefox basically a waste of time? Is palemoon and waterfox the only forks that still support legacy extentions?


Anonymous Board owner 10/23/2018 (Tue) 10:07:46 [Preview] No.12913 del
New Icecat is good, you're pretty much stupid if you think that you need some of those Pre Australis addons in that image, some of it would only make you a target. The new CanvasBlocker does so much more shit than the "legacy" version, while uBlock Origin and that Searxes' Third Party Request Blocker addon that comes with Icecat 60 does the job of at least 7 individual addons that I've used to use. I can't emphasize how good that addon actually is. Everything else I use Violentmonkey for. I don't use some stupid addon to use the Tor Socks5 proxy, I turn it on manually.


Anonymous 10/23/2018 (Tue) 10:11:15 [Preview] No.12914 del
>>12913
>forgot to log out
Oh well oh well, eat it.

Read this if you really want to use normal Firefox: https://github.com/ghacksuserjs/ghacks-user.js/wiki


Anonymous 10/24/2018 (Wed) 05:46:15 [Preview] No.12918 del
>>12913
Well that actually makes sense aside from no refcontrol or randomagentspoofer (i might be wrong on that one). I also was wary to the new version because on /os/ there was a post about post firefox 52 that you had to manually edit a file (not user.js or prefs.js) to disable telemetry that could not be opted out via about:config. Also the way it looks graphically seems like a big leap and the same thing with the new tor browser that does not show the hops anymore. I have to check if the 6 hop tor mod from /os/ works by moving the tor executable to an old version of tor browser and load it up every time I update tor and its the general hassle that made me assume it was all going downhill. And it is icecat is no netrunner ideal type thing but the general issue of hardening is what I am concerned with. Google embedded analytics pings and whatnot.But regarding extentions I have changed my mind you are right the new icecat request block addon is wonderful.


Anonymous 10/24/2018 (Wed) 18:28:50 [Preview] No.12923 del
Icecat 60 is still in alpha. Legacy extensions should still work.
>Pic related is some of the extentions that are mostly legacy now.
That infographic doesn't tell you which addons are legacy. Some addons became web extensions so they're still usable in firefox 57+. And since there's no date there's a good chance your picture is outdated. Especially considering adblock edge was discontinued in favor of ublock around 2015.


Anonymous 10/25/2018 (Thu) 06:28:13 [Preview] No.12931 del
>>12918
Firefox 60.2.0 ESR is not the same as Firefox 52 while Icecat has telemetry shit removed or disabled by default. http://git.savannah.gnu.org/cgit/gnuzilla.git/log/


Anonymous 10/31/2018 (Wed) 09:22:41 [Preview] No.12966 del
Just switch to a lightweight browser like qutebrowser or surf. Rendering backend is very safe, while browsers allow usage of various extensions like ublock


Anonymous 11/01/2018 (Thu) 12:40:37 [Preview] No.12967 del
>>12966
>Rendering backend is very safe
How so? Qutebrowser seems okay, though I don't know if that'd be wise to use with Tor since Qutebrowser will be distinguishable from Tor Browser.

Regarding Tor Project and Mozilla I trust neither, I know the Tor Project is (or always was) comprimised, and Mozilla has become infiltrated. But I'm not sure what else to use.


Anonymous 11/01/2018 (Thu) 12:47:50 [Preview] No.12968 del
>>12966
>while browsers allow usage of various extensions like ublock
Assuming you meant Qutebrowser, it doesn't support uBlock Origin or similar extensions, though some work is being done on it:
https://github.com/qutebrowser/qutebrowser/issues/30


Anonymous 11/03/2018 (Sat) 00:35:52 [Preview] No.12969 del
>>12968
>use a browser you have to learn how to use which doesn't even support ublock and is also based on the google engine
Why? Just why?


Anonymous 11/03/2018 (Sat) 00:39:10 [Preview] No.12970 del
>>12966
>qutebrowser -> qtwebengine
Falkon
>surf -> webkitgtk
Midori, gnome web


Anonymous 11/03/2018 (Sat) 00:45:29 [Preview] No.12971 del
>>12969
Exactly. Not sure why people recommend using Surf or Qutebrowser.
>>12970
>Midori & Falkon
Are both similarly minimal and have both added an ad blocker based on AdBlock Plus.


Anonymous 11/03/2018 (Sat) 00:58:11 [Preview] No.12972 del
>>12971
Though uBlock Origin does more than simply block ads, and the granular control over which domain can request which 3rd-party resources is a must-have for privacy.


Anonymous 11/03/2018 (Sat) 10:02:22 [Preview] No.12973 del
>>12972
By controlling which domains your browser connects to you make its fingerprint more unique which isn't helping you maintain privacy.
What you need for privacy is something like tor browser which simulates a normie browser and connects through some random proxy at least and better yet through tor/i2p/similar shit


Anonymous 11/03/2018 (Sat) 13:12:26 [Preview] No.12974 del
>>12973
I always run it like this unless a resource is required for styling or images. Plus, I disable Javascript.


Anonymous 11/04/2018 (Sun) 03:05:35 [Preview] No.12977 del
what a about AdGuard AdBlocker?


Anonymous 11/04/2018 (Sun) 03:18:17 [Preview] No.12978 del
>>12977
>AdGuard AdBlocker
Is proprietary and uBlock Origin is all you need for an extension. Though if you want to block advertisements on the system you're using then you could also consider using AdAway for Android or simply a hosts file-based blocker.


Anonymous 11/04/2018 (Sun) 18:18:09 [Preview] No.12981 del
>>12973
>By controlling which domains your browser connects to you make its fingerprint more unique which isn't helping you maintain privacy.

Come on! Pajeet devs gave us a favor to put analytics/tracking on different domains/subdomains, and yet you are trying to convince us a domain which I have not connected to will analyze the log of another domain I have not connected to, just to time-correlate to a 3rd domain I have connected to...

Did you know Tor Browser uses different circuits for different domains?


Anonymous 11/04/2018 (Sun) 18:38:04 [Preview] No.12982 del
>>12981
Right, I'm not going against my instincts here and block all trackers and advertisements.


Anonymous 11/04/2018 (Sun) 18:46:32 [Preview] No.12983 del
>>12973
>By controlling which domains your browser connects to you make its fingerprint more unique which isn't helping you maintain privacy.
Most websites aren't going to go out of their way to track people by how they connect to their trackers. Not only that, but since you're connecting to a third party website, the main websites won't be able to tell without some kind of javascript. And even then all they'll probably do is bitch about adblock.
Most of the tracking data is "willingly" handed over to companies. They're not going to out of their way to get the few stray fish smart enough to not swim into the belly of the beast.


Anonymous 11/06/2018 (Tue) 08:50:09 [Preview] No.12985 del
>>12983
>Most websites aren't going to go out of their way to track people by how they connect to their trackers.
They don't need to. Their technologies do it for them.
Why would you think google &co don't care about adblockers? They do, they even wanted to integrate one into chrome at some point, I'm pretty sure as part of the "Embrace, extend, and extinguish" strategy.
It's 2018, all major websites record your every fucking mouse movement.
>>12981
>a domain which I have not connected to will analyze the log of another domain I have not connected to, just to time-correlate to a 3rd domain I have connected to...
Not what I meant, also suggests that you probably don't know much about how websites work, but still possible because different domains != different entities.
>>12982
Good goy. The more you follow your instincts the easier you are to manipulate.


Anonymous 11/06/2018 (Tue) 16:37:44 [Preview] No.12987 del
(3.48 KB 76x76 icon38@2x.png)
>>12985
Just do not leave Javascript enabled, and block all non-essential third-party resources. It's incredibly counter-intuitive to do otherwise.
If enough people would do that that would increase the anonymity set and solves the problem you're raising.
Then again, Tor, I2P, and VPNs aren't secure anyway because those are low latency networks so it is incredibly easy for the MI5, NSA, GCHQ, whatever to correlate ingoing and outgoing traffic.
So anyway, you are suggestion that we sent our URL referrers to every single advertisement, tracker, and third-party server that a web page contains? Very smart ...


Anonymous 11/07/2018 (Wed) 04:42:08 [Preview] No.12993 del
(20.70 KB 680x503 c16.jpg)
>>12987
>all non-essential third-party resources
Again, you doing that by hand increases your browser's fingerprint uniqueness drastically.
> It's incredibly counter-intuitive to do otherwise.
<Good goy. The more you follow your intuition the easier you are to manipulate.
>If enough people would do that that
>if
You get it.
>Then again, Tor, I2P, and VPNs aren't secure anyway because those are low latency networks so it is incredibly easy for the MI5, NSA, GCHQ, whatever to correlate ingoing and outgoing traffic.
Gosh, the traffic is easy to correlate precisely because they aren't low latency networks. I2p however is also constantly routing other people's traffic so if you leave your i2p router 24/7 you make traffic correlation (the kind your are talking about) impossible.
>So anyway, you are suggestion that we sent our URL referrers to every single advertisement, tracker, and third-party server that a web page contains? Very smart ...
Yes, that's how anonymity works, you need to blend in. Just don't do that from your IP.


Anonymous 11/07/2018 (Wed) 04:49:24 [Preview] No.12994 del
i just do the private browsing



Top | Return | Catalog | Post a reply