However, it can not be said that it works as well as many would like, so it is sometimes better to take advantage of third-party solutions in these leaders to avoid problems and data loss. That is why one of the most effective proposals of this type is a extension that we can use both in the mentioned Firefox as in Google Chromewe mean Session Manager tab.
It's a complement that will help us save the tabs and windows sessions with the browser and do not lose anything because of unexpected problems. Specifically, we are talking about a small program added to these browsers that automatically saves windows and tabs so we can not lose them. Once installed, the add-on adds a new icon to the toolbar which gives us a context menu with all the recent browsing sessions you have saved.
Thus, each session that the extension saves alone adds details such as last name eyelashes active, the total number of tabs, or the date and time of saving the session. At the same time, we will have the option to open this session that has been stored or delete it. Therefore, if the equipment stops suddenly or if Navigator it is closed or locked without waiting, when you click open in the extension we are talking about, a new window opens and the full list of registered tabs is loaded.
Of course, we have the ability to customize its behavior from the configuration section, which will allow us to change the behavior of the open button. At the same time, we can save the the contents of the private windows, set the time interval for automatic recording, the number of sessions to store simultaneously, and so on.
Finally, we will say that we have the opportunity to import sessions spent to be stored here, which will be very useful if we work with this extension on several computers, as well as export them.
Of course, the research giant also wanted to clarify that this function would increase the number of memory usage on an average of 20%. Therefore, at that time, Firefox users could enable Fission in the Nightly 69 program release, but this was limited to a series of internal feature tests. However, for the moment, thanks to launch of Firefox 70 also in its Nightly version, the software is already a new official flag of the company itself that will allow us to try the new isolation function as a whole.
This is called "Automatic Startup of Fission" and you have to keep in mind that it is a feature that is not enabled by default in Firefox, at least for the moment. For this reason, users must allow them to start testing their operation and performance under optimal conditions. Firefox Nightly 70. What is accomplished once it is active, is that Firefox loads any cross object iframe into its own content process, all to improve security when we move. Internet.
So, when fission is enabled, each iframe cross is loaded into a different content process, which means that independent processes participate in design of a single content tab. To know how it works, we will have the opportunity to fly over firefox tab After enabling the function to display the process IDs used to display the loaded website at that time.
Of course, we must keep in mind that this isolation system is still in full development and that, although we can already test its overall operation, Mozilla does not recommend to use it again at this time. day to day. to move on the Internet. This is mainly due to the fact that users can still do the experience of stability issues and functionality due to errors that need to be corrected before launch in the final version of the browser.
Written by David Onieva
To avoid this and that we can be informed at any time of the sites that we geolocate or not, according to our colleagues SOFTZone, Mozilla has developed a new function that will allow us to know if a website we visit has geolocated us if our permission. Something that will be easily detected, just by checking if you are using the famous API.
Therefore, Firefox 70 will include a indicator who will inform us of the last time that a website has accessed our site. To do this, simply click on the button shield icon in the address bar of the browser, a window appears in which we can see the permissions we have given to the site we opened and in case we had given access to our location, we will appear When was this website last geolocated?
As we have already indicated, this new feature will come in Firefox 70. So, once this version of the browser is launched by Mozilla, we can see the new icon in the address bar and we will have the opportunity to control websites better than accessing the site. our location and when they do it. At present, the arrival of this version of the browser is expected in just over two months, especially the October 23 next.
Written by Roberto Adeva
Among these possible integration problems, some experts wonder if the properties of Tor will be preserved or what would be the complete integration of the two models. With everything and with, just a few days ago and at a meeting of the Tor team, plans to create a "Super Private" browsing mode in Firefox have changed slightly, so that the new proposal, at least initially, is to create an extension that can be called "Tor Mode" in the own Mozilla browser.
So and mainly because of the complexity of the integration Tor directly on Firefox, Mozilla and the Tor team are studying the use of an extension to measure performance impact before integrating it fully into the database. code of the Navigator as such. Therefore, an idea was originally presented to Firefox to incorporate the new "Tor Mode" that would be used to pave the way, all in the form of a complement which would be installed in the browser.
Keep in mind that initially this new extension would not be added by default to the program, but would be an item that users could download from the company's official store to add to the program. software an activation buttonTor Mode"Or something similar. The system would allow users to experience what could be a complete integration with Tor going through Internet with its usual program, which would also make it possible to know the interest of the general public for this development.
It should be noted that this add-on would configure the browser to use Tor as a proxy and would use other features very similar to the default ones of Tor Browser. Thus, by clicking on the button that would be added corresponding to the "Tor Mode", you will probably open a new window in which a dedicated profile and "Ultra Secure" is used.
In addition, this mode would necessarily require the use of HTTPS, although, as we have said for the moment, all this is in the early stages of development to see what would be the best way to achieve full integration after passing the mentioned extension. What is certain is that all this, that is to say integrate Tor in Firefox, it would bring an experience private navigation real and more secure for a large number of Internet users around the world, which could be an important precedent in this software sector.
When we visit a website and present our identification information, we believe that these sites are secure and private. However, thanks to DataSpii, an extensions creator for Chrome (and part of Firefox) has managed to collect browsing history of 4.1 million users. Specifically, he collected the visited URLs, the title of these pages and the hypertext links therein. Once the data was obtained, they published it on a payment platform called Nacho Analytics.
Although you need a username and password to access many pages, there are private pages with unique links tokens in the URL. This URL is known only to the user, but if the extension obtains it, it can be accessed later from another PC without the user's account to obtain private data or files. This type of practice has been discouraged for years, but unfortunately continues to be used.
With this, the researcher who discovered the case saw how, in 7 months, the following data were collected:
These links could be viewed without even having an account in the service. Others were much more sensitive, but they needed a username and password to access them. Despite this, many continued to disclose sensitive information, such as car identification numbers and Tesla errors, internal URLs from medical companies, cybersecurity companies, and so on.
The discoverer, Sam Jadali, founder of the Host Duplex Web Hosting service, discovered some private message URLs in Nacho Analyticsand, thinking that some extensions were filtering the data, he was testing up to 200, but he found none. After analyzing when the URLs were obtained, Jadali asked the three users whose URLs had been filtered what extensions they had installed, and that's when he discovered that the Extension was Hover Zoom.
To check how he collected the data, he installed Windows from scratch on a PC with Chrome and extension, and then analyzed the data. After three weeks of inactivity, the extension compiled all the visited URLs and appeared after two hours in Nacho Analytics, where other users downloaded the content of the websites they had visited. . Thus, it tested more extensions of the developer and others, besides doing it with Firefox and in the macOS and Ubuntu installations. The extensions were:
Google and Mozilla have removed extensions as soon as they learned their activities. Some of the companies involved have confirmed that they have installed extensions on computers on their internal network, such as Symantec. Therefore, we recommend, if you plan to install a dubious extension, to do it in a Chrome installation that you will not use. For example, you can to install Chrome Beta and do your tests there, by visiting only the sensitive websites of the stable version.
The change will begin to apply from Firefox 70, which will be available from October 22nd. The latest stable version of Firefox 68 It was launched on July 9 and at that time they are testing the news of the next two releases. Among them is the one that concerns us today.
Until now, Firefox showed that a web page was not secure if it contained forms or login fields. However, they will now extend it to all because websites have had enough time to migrate to HTTPS in the last two years. Currently, over 80% of websites are in HTTPS. Users therefore no longer need an indicator indicating that the website is secure but that warns the user that the page they are visiting is not there. .
Mozilla has been working on this feature since December 2017. Although Firefox 70 is available in the next three months, you can enable this feature by going to about: config and looking for the following commands:
To activate them, simply double click on it or right-click and modify. The first thing he does is to show the broken padlock icon, and the second thing to show the text of the broken padlock Not sure. The last two do the same thing, but for the private browsing mode.
In this way, when we enter a web page after it has been activated, a text saying "Unsafe" will appear, which is very similar to what Chrome is currently displaying.
We also remind you that the fact that a web page is in HTTPS does not mean that it is safe. More than half of phishing websites use HTTPS to trust the user, but it simply means that the connection between your device and the server on which the Web is hosted is secure. Once it has reached its destination, the content is decrypted and can end up directly in the hands of a hacker who uses your data to impersonate you or steal money from your account. .
Firefox is still betting on an increasingly secure browser. In fact, Mozilla was named "Villain of the Year" by UK operators for implementation DNS on HTTPS secure the DNS resolutions of the users and that none of the operators can know where we navigate.