Sysop: | Amessyroom |
---|---|
Location: | Fayetteville, NC |
Users: | 23 |
Nodes: | 6 (0 / 6) |
Uptime: | 49:47:58 |
Calls: | 583 |
Files: | 1,138 |
Messages: | 111,303 |
The links if you're interested that I'm trying to reproduce for Firefox, if possible, would be the following (but these are only for chromium browsers) <https://al.howardknight.net/?STYPE=msgid&MSGI=%3C105ptvs%242ihi%241%40nnrp.usenet.blueworldhosting.com%3E>
<https://al.howardknight.net/?STYPE=msgid&MSGI=%3C105vlel%241r72%241%40nnrp.usenet.blueworldhosting.com%3E>
<https://al.howardknight.net/?STYPE=msgid&MSGI=%3C1061op9%242kch%241%40nnrp.usenet.blueworldhosting.com%3E>
Is there a de-mozilla'd Firefox (similar to degoogled chromium)?
The reason I ask is when the chromium-based free Epic Privacy Browser died,
I wrote a tutorial for building your own chromium-based privacy browser out of common components and I was next naturally wondering if I could extend that tutorial to building your own privacy-based mozilla browser next...
Is there a de-mozilla'd Firefox (similar to degoogled chromium)?
The reason I ask is when the chromium-based free Epic Privacy Browser died,
I wrote a tutorial for building your own chromium-based privacy browser out of common components and I was next naturally wondering if I could extend that tutorial to building your own privacy-based mozilla browser next...
a. no telemetry, no phoning home, no data collection, etc.
d. no internal connections whatsoever to the mothership
e. no safe-browsing checking back to the mothership
f. no account sync, click-to-call, geolocation, etc.
g. binary pruning, etc.
<reference links in the sig>
I think there's even multiple ones. Android has Fennec as a debranded Firefox for example.
On Sat, 26 Jul 2025 15:49:35 +0200, Kyonshi wrote:
I think there's even multiple ones. Android has Fennec as a debranded
Firefox for example.
But not in Play Store?
On 7/26/2025 4:20 PM, s|b wrote:
On Sat, 26 Jul 2025 15:49:35 +0200, Kyonshi wrote:
I think there's even multiple ones. Android has Fennec as a debranded
Firefox for example.
But not in Play Store?
It's on F-Droid. I keep forgetting that not everyone uses that because
for the last few years I always check that one first.
Marion <marion@facts.com> wrote:
Is there a de-mozilla'd Firefox (similar to degoogled chromium)?
The reason I ask is when the chromium-based free Epic Privacy Browser died, >> I wrote a tutorial for building your own chromium-based privacy browser out >> of common components and I was next naturally wondering if I could extend
that tutorial to building your own privacy-based mozilla browser next...
Sounds similar to the Arkenfox project here: https://github.com/arkenfox/user.js
It's on all platforms at https://librewolf.net/installation/
You only need to add the hide.me vpn extension to extend your tutorial.
Other times LibreWolf works fine with the "Hide.Me VPN" extension; so I'm still in the agonizing throes of debugging - but I'll solve it I hope.
curl -x http://proxy.example.com:8080 http://ipinfo.io/ipWhere some have a horrid response time so they're essentially useless.
curl --proxy https://proxy.example.com:443 https://ipinfo.io/ip --proxy-insecure
curl -o /dev/null -s -w "Total time: %{time_total} seconds\n" http://example.com --proxy http://proxy.example.com:8080
nc.exe --proxy proxy.example.com:3128 --proxy-type http example.com 80 nc.exe --proxy proxy.example.com:1080 --proxy-type socks5 example.com 80
In summary, so far, everything is easy to add to LibreWolf to create
your own DIY private browser with vpn/proxy except the VPN/Proxy :(
If you know of a reliable stable working proxy, let us all know!
%HTTP_OK% echo.echo ^<proxies^> >> %XML_OUT%
%DEAD% echo.
%XML_OUT% echo ^<foxyproxy mode="patterns"^>
%JSON_OUT% echo {"proxies": [
Has anyone on this ng ever gotten a VPN extension to work with LibreWolf
On Mon, 28 Jul 2025 19:39:36 -0000 (UTC), Marion wrote :
Has anyone on this ng ever gotten a VPN extension to work with LibreWolf
Since I couldn't get any VPN extension to work with a privacy based web >browser (such as Mullvad or LibreWolf), I temporarily gave up on Mozilla.
Has anyone on this ng ever gotten a VPN extension to work with LibreWolf
Since I couldn't get any VPN extension to work with a privacy based web >>browser (such as Mullvad or LibreWolf), I temporarily gave up on Mozilla.
So what does the avoidance dance (killed in answer) therefore have to
do with Firefox?
On Tue, 29 Jul 2025 18:41:21 -0700, Nobody wrote :
Has anyone on this ng ever gotten a VPN extension to work with LibreWolf >>>Since I couldn't get any VPN extension to work with a privacy based web >>>browser (such as Mullvad or LibreWolf), I temporarily gave up on Mozilla. >>>
So what does the avoidance dance (killed in answer) therefore have to
do with Firefox?
I have no idea what your question is trying to ascertain, so I'm guessing that you're asking what LibreWolf or Mullvad have to do with Firefox?
The goal here, clearly, is a mozilla-based diy privacy web browser, similar to what Opera/Epic do and somewhat (but not really) like what Tor does.
On Tue, 29 Jul 2025 18:41:21 -0700, Nobody wrote :
If ye dinnae wanna use Firefox... Go Away.Has anyone on this ng ever gotten a VPN extension to work with LibreWolf >>>Since I couldn't get any VPN extension to work with a privacy based web >>>browser (such as Mullvad or LibreWolf), I temporarily gave up on Mozilla. >>>
So what does the avoidance dance (killed in answer) therefore have to
do with Firefox?
I have no idea what your question is trying to ascertain, so I'm guessing >that you're asking what LibreWolf or Mullvad have to do with Firefox?
So what does the avoidance dance (killed in answer) therefore have to
do with Firefox?
I have no idea what your question is trying to ascertain, so I'm guessing >>that you're asking what LibreWolf or Mullvad have to do with Firefox?
If ye dinnae wanna use Firefox... Go Away.
The goal here, clearly, is a mozilla-based diy privacy web browser, similar >> to what Opera/Epic do and somewhat (but not really) like what Tor does.
So just shut up with your bla and use Tor Browser. https://www.torproject.org/download/
When we have the tutorial written, thousands of people can benefit simply
by clicking on the cut-and-paste steps to easily build a privacy browser.
for /d %i in (*) do @for /d %j in ("%i\*") do @echo %jublockorigin\1.65.0_0
If only LibreWolf worked with VPN extensions. Sigh. It doesn't.
The problem seems to be the way the OCSP stuff is done under the hood.
for /d %i in (*) do @for /d %j in ("%i\*") do @echo %jhidemevpn\ohjocgmpmlfahafbipehkhbaacoemojp
... to update the group at large, here are VPN's I'm testing.
There are two golden rules for privacy on the net, and one is to never register for anything (the other is never pay with a traceable method).
Anyone doing either of those forbidden actions (especially nowadays with
even throwaway emails requiring phone or a second email validation) will never stand a snowball's chance in hell to have any privacy, even with VPN.
Marion wrote:
There are two golden rules for privacy on the net, and one is to neverWhile I choose not to actually /do/ it, I have done some 'thought experiments' in resolving what is 'troubling' privacy above.
register for anything (the other is never pay with a traceable method).
There is no such thing as a free ride when you impose all of the restrictions you have decided upon.
There are two golden rules for privacy on the net, and one is to never
register for anything (the other is never pay with a traceable method).
Anyone doing either of those forbidden actions (especially nowadays with
even throwaway emails requiring phone or a second email validation) will
never stand a snowball's chance in hell to have any privacy, even with VPN.
While I choose not to actually /do/ it, I have done some 'thought experiments' in resolving what is 'troubling' privacy above.
You need an anonymous persona. There are a number of ways to create
that; I think the most practical approach is the concept of a 'burner' phone, so solve the 'connectivity' problem along w/ the anonymous
persona problem; that is, first step.
The other thing you need is anonymous 'finances' in the form of a
cryptocoin which aids anonymizing. Personally I haven't dev/d a full 'background' on the coins, but I don't much like the ones which are too speculative. You can't really 'get' a true stablecoin which is also anonymizing, but you can get coins which /are/ anonymizing and much less speculative than such as bitcoin.
Since this thread is *actually* more of a 'severe' privacy issue than it
is a 'browser' issue, except that the thread is about wanting a Ffx type browser (if possible) AND severe privacy, you HAVE TO solve the severe privacy first, and that requires an identity/persona w/ the ability to
pay for things. There is no such thing as a free ride when you impose
all of the restrictions you have decided upon.
We can use our conversation here as an example of something.
First, as a 'basis' of the non-privacy end of things; I don't use a
privacy browser at all. I also use an NSP which not only requires reg,
it also requires payment annually. OK fine.
You instead are using blueworldhosting as your NSP to post here and like most other people including me, do not expose your IP to the 'world' via
the NSP nor your name and email. OK fine. We aren't that different.
Your NSP has excellent retention and no reg.
If someone wants to 'uncover' your persona, they would start w/ the IP
you connect to blueworldhosting and the 'clarity' of your handwriting
which I have observed in your messages for years.
I don't think it would be that hard to uncover you; not that I am any
kind of fan of dox/ing, but it could be part of a conversation about
privacy that involves who is the/your adversary and who isn't.
My 'philosophy' is that I don't have adversaries who need to know who I
am and so I don't have to go to any trouble for 'severe privacy'.
To me, the only people who need severe privacy are criminals and those
who are actively fighting against an oppressive state actor; that is, if
you do dev a strong adversary w/ some kind of power, you have a problem.
Typically the people who discuss privacy in such as the privacy groups
don't actually *state* why they are so interested to go to so much
trouble and inconvenience. I do NOT believe that people do that just
for the fun or challenge of it, but I also do NOT know what other
reason/s they could possibly have besides the ones I mention here.
Completely free anonymity on the internet comes at a price to someone.
Various providers who can 'easily' accommodate anonymity w/ their
services do so for whatever their own 'personal' reasons. Free/open
NSPs, free mail2news, a 'certain amount' of free VPN, free tor.
There's not much (hardly any) free connectivity; there used to be a free local dialup provider but that went away, there is some free wifi and it
is possible to 'steal' some wifi.
So, given that it is likely /easier/ to anonymize payment, it is
/perhaps/ easier to anonymize one's whole persona at a relatively low
cost, than to try to get some kind of 'perfect' free anonymity online.
I'm frugal, but I'm also practical. I'm also a skeptic; watch out for
those who are providing you a free product, you may BE the product.
But how many of us have actually used a crypto coin in our lives?
I haven't.
Have you?
ikclbgejgcbdlhjmckecmdljlpbhmbmf : HTTPS Everywhere : version 1_0
There are two golden rules for privacy on the net, and one is to never register for anything (the other is never pay with a traceable method).
ikclbgejgcbdlhjmckecmdljlpbhmbmf : HTTPS Everywhere : version 1_0
<https://www.eff.org/https-everywhere>
<quote>
You no longer need HTTPS Everywhere to set HTTPS by default! Major
browsers now offer native support for an HTTPS only mode.
Any others?
I already stated this in another posting: what about fingerprinting?
What about fingerprinting? Not only your browser can be unique, but also
the way you type.
<https://amiunique.org/>
(results in a server error atm)
<https://coveryourtracks.eff.org/>
I already stated this in another posting: what about fingerprinting?
Thanks for that suggestion, where I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
Marion wrote:Websites can't [directly] tell which add-ons you have installed.
I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
What I actually meant was: aren't you making your browser more and more /unique/ by using all those add-ons? I feel like it's only going to make
your browser more and more unique and recognizable, so it would make fingerprinting easier.
Websites can't [directly] tell which add-ons you have installed.I don't know if there's a single
well-known commonly suggested "fingerprinting prevention" extension.
What I actually meant was: aren't you making your browser more and more
/unique/ by using all those add-ons? I feel like it's only going to make
your browser more and more unique and recognizable, so it would make
fingerprinting easier.
IME it's almost impossible to not show a unique fingerprint ID.
I've tried making changes, such as finding the "most unique" identifiers
and getting my FF to use "less unique" alternatives, such as a popular Chrome version user-agent, making my language preference and location
USA rather than UK
But how many of us have actually used a crypto coin in our lives?
I haven't.
Have you?
I have not.
But I have enough 'academic' interest in this privacy
business that I would consider 'devising' an anonymous persona,
including that persona having a cellphone/number/account.
There is also a problem about strategies to use that coin to pay for
things; not all useful providers accept the type of coin one might want;
you have to have one of /these/ kinds of coins to pay for one of /those/ kinds of coins because the provider doesn't accept one of them.
So, while you are trying to puzzle out the free browser privacy
business, I'm trying to figure out paying for a connectivity provider for/with a bogus persona.
But, 'my' topic or interest is OFF topic for this Ffx group.
For some
reason, it also seems off-topic in the privacy groups because those
people don't even like to use conventional agents to post to
conventional NSPs, so we are very far apart in our interests.
1. User-Agent Switcher and Manager : version 0_6_4
2. uBlock Origin : version 1_65_0
3. NoScript : version 13_0_8
4. Cookie AutoDelete : version 3_8_2
5. Font Fingerprint Defender : version 0_1_6
6. WebRTC Control : version 0_3_3
7. Location Guard (V3) : version 3_0_0
8. Referer Control : version 1_35
9. Skip Redirect : version 2_3_6
10. StayInTab : version 1_0
11. ClearURLs : version 1_26_0
12. Decentraleyes : version 3_0_0
13. LocalCDN : version 2_6_79
14. Trace - Online Tracking Protection : version 3_0_6
15. Canvas Blocker - Fingerprint Protect : version 0_2_2
16. Browsec VPN - Free VPN for Chrome : version 3_92_2
17. Privacy Badger : version 2025_5_30
18. CthulhuJs (Anti-Fingerprint) : version 8_0_6
In summary, we're pretty close to making a DIY browser, in both
Mozilla-land and Chromium land, that is distinct from the mothership
browser in terms of inherent privacy as tested against privacy test sites.
In summary, we're pretty close to making a DIY browser, in both
Mozilla-land and Chromium land, that is distinct from the mothership
browser in terms of inherent privacy as tested against privacy test sites.
FYI <https://amiunique.org/> is up again.
Meanwhile, I've been testing the VPN extensions which passed the initial tests, where my fungible test-rating system puts them in this order:
browsec
1clickvpn
1vpn
vpnly
xvpn
securefreeedgevpn
setupvpn
Bearing in mind these all failed the most basic initial VPN tests.
hotspotshieldvpn
itopvpn
protonvpn
urbanvpn
hidemevpn
hiddenbatvpn
tunnelbearvpn
windscribevpn
I ditched the VPN extensions in order to test a SOCKS5 proxy tunnel.
How to add Socks5 to your Windows 10 browser sessions:
1. Start Psiphon & make a note of the SocksV5 port in the log output
2. Start Freecap & add the Socks5 port for Brave into the settings
3. Add Brave (or any browser) into the Freecap settings
4. In Freecap, add any command-line performance flags for the application
ungoogled-chromium --proxy-server="socks5://127.0.0.1:1080" ungoogled-chromium --proxy-server="http=127.0.0.1:8080"
I ditched the VPN extensions in order to test a SOCKS5 proxy tunnel.
If all the proxies slow down after a few days, are they trying to be
caching proxies? Can they just operate as "direct" proxies without caching?
I note you said "if all the proxies slow down", where I think you had meant "if all the VPN extensions slow down",
I note you said "if all the proxies slow down", where I think you had meant >> "if all the VPN extensions slow down",
Well, you said you were ditching the VPN extensions, and had switched to SOCKS5, and then gave a long list of "X slows down", "Y slows down" ...
dir /b .\vpn_extension\working\.browsec
dir /b .\privacy_extensions\.fontfingerprintdefender
At the moment, we have 3 options for a privacy browser with IP obfuscation.
1. System-wide VPN + the 18 browser-privacy extensions listed above
2. Browser VPN extensions (any of the 8 above that passed initial tests)
3. Local open-source SOCKS5 Proxy Tunnel (Psiphon + FreeCap)
All three methods worked for me, so far, for my privacy purposes.
OMG. Everything I touch in Windows has needlessly unnecessary complexity.
psiphon3.exe -mode=socks <== this doesn't exist... bummer
gvim C:\path\to\register_dummy_browser.reg
I never messed with proxies before, but darn'it, Windows splatters proxy settings all over the place, such that I needed a quick testing script.
brave.exe --proxy-server="http=127.0.0.1:30884;https=127.0.0.1:30884;socks=127.0.0.1:1080"
Network Settings) to point directly to Psiphon's SOCKS5 port, skippingFreeCap entirely.
Chromium ==> respects Windows proxy settings (which Psiphon sets for you)
Mozilla ==> ignores Windows proxy settings (but has their own settings)
netsh winhttp import proxy source=ieNow system services (which often ignore WinINET) will use
nul') do set ProxyEnable=%%Bfor /f "tokens=2,* skip=2" %%A in ('reg query %KEY% /v ProxyServer
nul') do set ProxyServer=%%Bif "%ProxyEnable%"=="0x1" (
nul') do set PACurl=%%Bfor /f "tokens=2,* skip=2" %%A in ('reg query %KEY% /v AutoDetect 2^>nul')
Unfortunately, I've run into this proxy setup complexity due to using
A. VPN, which encrypts traffic and changes routing;
B. Psiphon, which tunnels & encrypts SOCKS5 & HTTPS traffic;
C. FreeCap, which redirects app traffic through SOCKS proxie
Socks5 Vs. VPN - WhatrCOs the Difference?
You tend to prioritize the 'free' aspect of things