https://github.com/MrAlex94/Waterfox

On 07/05/19 08:18, Paul Kosinski wrote:
> I had been reluctant to use Firefox spinoffs because I had worried
> about their likely lack of timely bug and (especially) security fixes.
> But this disaster, coupled with the declining power-user-friendliness of
> post-XUL versions of Firefox (even ESR), sort of moot that issue for me.
> 
> P.s. Waterfox apparently is equally as Open Source as Firefox, but where
> is the source kept? I didn't see any obvious source download link (but
> I thought I saw a GitHub reference).
> 
> 
> On Mon, 6 May 2019 00:04:29 -0300
> Artur Quaglio <[email protected]> wrote:
> 
>> That is one of the raisons d'etre of Waterfox. It's Firefox, but with
>> the power in the user's hands.
>>
>> On Sun, May 5, 2019 at 11:19 PM Paul Kosinski <[email protected]>
>> wrote:
>>
>>> I am appalled and dismayed by what has happened to Firefox in the
>>> past years. It has gone from being the obviously best browser to
>>> being unpleasant -- and now, sufddenly, even dangerous -- to use.
>>>
>>> We use Firefox for two main reasons, it's Open Source, which give me
>>> more confidence that it can be trusted, and it has the NoScript
>>> Add-on, which adds security to browsing sessions.
>>>
>>> What just happened with NoScript is, in my judgment, a security
>>> *emergency*, not a mere security bug. Security bugs in a new
>>> version of software can often be avoided by reverting to the
>>> previous version. That does not seem to apply here, as it is not a
>>> bug in a new version of Firefox, but a bug in the Mozilla
>>> infrastructure.
>>>
>>> On Saturday May 4, it was stated that Mozilla is working on a fix.
>>> However, my running instance of NoScript was disabled on Sunday May
>>> 5. This indicates that Mozilla does not view this as an emergency,
>>> but as an annoyance. It is hard to think of any analogs to this
>>> situation: it's on the order of a Windows Update that cripples the
>>> OS.
>>>
>>> Granted, Mozilla then published a workaround that suggested setting
>>> "xpinstall.signatures.required" to "false" in "about:config", but
>>> that hardly compensates for the fact that suddenly and without
>>> warning *all* Javascript is enabled in active browsing sessions,
>>> putting private information at risk. (And users of the Firefox
>>> derivative TOR might possibly even have their lives endangered.)
>>>
>>> Also, in my opinion, the requirement that Add-ons be signed by
>>> Mozilla is a violation of the intent of Open Source software if not
>>> of the details of the MPL (and other Open Source licenses). Because
>>> it disallows arbitrary Add-ons, it removes final control of Firefox
>>> from the hands of the user and places it in the hands of Mozilla.
>>> It also makes Firefox unsuitable for organizations which wish to
>>> develop proprietary Add-ons which they either do not want revealed
>>> to Mozilla or perhaps even are legally forbidden to reveal them.
>>> (And the idea that nightly builds or local builds could be used is
>>> usually impractical or even legally forbidden for such
>>> organizations.)
>>>
>>> A much better approach would be something along the lines of the way
>>> Firefox handles normal HTTPS certificate problems, such as expired,
>>> or no chain of trust. Running or installing an Add-on which is not,
>>> or no longer, "properly" signed should give rise to a stern
>>> warning, and then allow the user to proceed to use the Add-on
>>> temporarily or even add a permanent exception. And, since some
>>> organizations might not want users to run unsigned Add-ons, there
>>> should be a "policy" mechanism to prevent that. In conjunction with
>>> this, there should be a way to allow local signing of Add-ons
>>> private to the organization. (The Firefox or OS certificate
>>> mechanism must already handle this sort of thing.)
>>>
>>> P.S. The details reported in the article at
>>>
>>> https://www.zdnet.com/article/mozilla-announces-ban-on-firefox-extensions-containing-obfuscated-code/
>>> suggest that Mozilla's latest policies are moving further away from
>>> allowing the user or organization to control their own browser --
>>> all in the name of "security" of course.
>>>
>>> ----------------
>>>
>>> On Sat, 4 May 2019 09:29:22 +0200
>>> Sylvestre Ledru <[email protected]> wrote:
>>>
>>>> Hello,
>>>>
>>>> Le 04/05/2019 à 03:15, Stephen Carville (Mozilla List) a écrit :
>>>>> What the heck just happened? I was informed in the middle of a
>>>>> session that that No Script and Blur are no longer compatible
>>>>> with Firefox.  Now all my add-ons except Web Developer are
>>>>> disabled.
>>>>
>>>> This is probably this issue
>>>> https://bugzilla.mozilla.org/show_bug.cgi?id=1548973 and we are
>>>> working on a fix.
>>>>
>>>> Sylvestre
> _______________________________________________
> Enterprise mailing list
> [email protected]
> https://mail.mozilla.org/listinfo/enterprise
> 
> To unsubscribe from this list, please visit 
> https://mail.mozilla.org/listinfo/enterprise or send an email to 
> [email protected] with a subject of "unsubscribe"
> 


-- 
James Andrewartha
Network & Projects Engineer
Christ Church Grammar School
Claremont, Western Australia
Ph. (08) 9442 1757
Mob. 0424 160 877
_______________________________________________
Enterprise mailing list
[email protected]
https://mail.mozilla.org/listinfo/enterprise

To unsubscribe from this list, please visit 
https://mail.mozilla.org/listinfo/enterprise or send an email to 
[email protected] with a subject of "unsubscribe"

Reply via email to