Then one of us is confused and, looking through some of the replies, it seems we're not all on the same page, but Firefox explicitly does sandbox tabs.Firefox explicitly doesn't do this.
Didn't check to see if this was related: Mozilla Sandbox
Then one of us is confused and, looking through some of the replies, it seems we're not all on the same page, but Firefox explicitly does sandbox tabs.Firefox explicitly doesn't do this.
pkg info -D firefox
Code:firefox-68.0.1: Always: ====================================================================== Some features available on other platforms are not implemented: ... - Process sandboxing (requires Capsicum backend) ...
I mean, everyone suggested to run the browser in jail,
What exactly are you afraid you're going to pick up?
JavaScript trojan?
Let me restate the original question in a bit more relatable way. Suppose the aforementioned Capsicum backend for Firefox is finally implemented. Would you be comfortable with saying something like "Meh, FreeBSD doesn't need this. I feel safe enough as it is". Would you disable it?
FWIW, I also use NoScript. First, apparently WebExtensions are a bit flaky and (post-XUL) Firefox occasionally silently disables it until restart. Second, NoScript itself tends to allow small javascript snippets (such as inline onclick handlers in html), while reporting javascript being completely disabled.
Same here. I have always gone to any site my little heart desired. It is possible that I have some bad choice in my security related settings, but in any case I don't think that a malicious site would look like it was malicious if they were serious about compromising a slightly more advanced user than average.I've never been afraid to go to any site no matter what it was hosting as far as being infected or compromised. I'm no stranger to Russian sites and have visited many.
Ah, the golden age of script kiddies and their two favorite tools, Sub7 and Back Orifice, and the wonderfully secure Windows 98/SE/ME!!! The nineties were such aI wasn't as lucky as Wozzeck.Live with my WIn98 machine. My old chat m8t's used to be able to crash my browser at will. I'd log back into chat and they could tell me what AntiVirus software I was using and laugh about it. I'd unplug my modem and reformat.
I mean, everyone suggested to run the browser in jail, But I think it's hard to understand configuring jails.
sudo
to log in and run the web browser as that user, you will generally be pretty safe. With some scripting you can even reset the profile after each session.As for the Russian thing, that's a bit of a joke nowadays. I agree that there are lots of Russian sites that are good and relevant to us in the West.
Ah, the golden age of script kiddies and their two favorite tools, Sub7 and Back Orifice, and the wonderfully secure Windows 98/SE/ME!!! The nineties were such apiece of sgreat decade!
I think that basically nails the subject of this thread.I don't think a browser needs a sandbox. Unzipping files from the internet does.
Can you provide a link to show it allows small JS snippets?
I think that basically nails the subject of this thread.
Can you explain what you mean by that? I don't use a sandbox for my browser so I'm not familiar with its use as a messenger, or what information I could glean from it that I might need.I don't think shoot-the-messenger attitude will do us any good.
Can you explain what you mean by that?
This is the recommanded way according to the DragonFlyBSD Handbook : https://www.dragonflybsd.org/docs/handbook/RunSecureBrowser/I think if you just make a new user account specifically for web browsing
Thank you for pointing to the long awaited ASLR.FreeBSD got ASLR.., in 2019.
Please be advised that 13-CURRENT is NOT YET a supported version.https://wiki.freebsd.org/ASLR said:Address Space Layout Randomization (ASLR)
Support for Address Space Layout Randomization was added in FreeBSD HEAD (13-CURRENT) in base r343964. It is disabled by default.
Architectures
ASLR is enabled on a per-ABI basis, and currently only allowed on FreeBSD native i386 and amd64 (including compat 32bit) ABIs. Support for additional architectures will be added after further testing.
Trying to compensate the lack of security by plugins like NoScript,uMatrix or uBlock is not the thing I would do. It's like covering all window spaces with tape while all of them is open.
AFAIK, The sandbox is not only for keeping browser exploits away from the computer, it does protect individual tabs from each other too. This is how it works on Windows. I don't know how UNIX is different, though.
Hey, NoScript is very handy for blocking popups, autoplaying videos, animated advertisements and all kinds of junk. I wouldn't describe experience as inconvenient at all.
I hate FireFox Quantum Strangeness and what it's done to my extensions.
I'm sure it sends a list of which extensions you have installed back home.
To better predict what extensions you may find interesting, Firefox uses the Telemetry-Aware Add-on Recommender (TAAR) system—a Mozilla service that recommends extensions by examining basic browser Telemetry. This means TAAR analyzes usage statistics from a large number of other Firefox users, looks at other extensions you may have installed, and considers general characteristics about your Firefox profile (like language preference). Based on this information, TAAR surfaces extension recommendations tailored just for you.