• Mozilla finishes 2025 with an almost perfect score

    From Shadow@Sh@dowbr.invalid to alt.comp.freeware on Thu Jan 1 15:48:00 2026
    From Newsgroup: alt.comp.freeware


    52 weeks. 51 of them Firefox/Thunderbird had serious
    vulnerabilities.

    Last week of 2025:

    https://www.cvedetails.com/cve/CVE-2025-14860 https://www.cvedetails.com/cve/CVE-2025-14861

    Note the first one is critical, and allows glugle, meta,
    amakon, -eX, micro_and_soft, crabApple, CrowdFare and all the other
    TLA partners to completely control your PC, and collect as much info
    as they want on you.

    CVE-2025-14860 was introduced on the 18th December, probably
    hoping people would be partying and wouldn't notice. Problem is,
    white-hat hackers don't party.

    Well done, Mozilla. Better luck this year. Here's to a perfect
    52/52 in 2026.

    PS You can avoid 99% of all webpage-browsing malware by not
    allowing ANY javascript. Which is why the "bad guts" insist you don't
    disable it
    []'s

    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From VanguardLH@V@nguard.LH to alt.comp.freeware on Fri Jan 2 06:31:19 2026
    From Newsgroup: alt.comp.freeware

    Shadow <Sh@dowbr.invalid> wrote:

    52 weeks. 51 of them Firefox/Thunderbird had serious
    vulnerabilities.

    Last week of 2025:

    https://www.cvedetails.com/cve/CVE-2025-14860 https://www.cvedetails.com/cve/CVE-2025-14861

    Note the first one is critical, and allows glugle, meta,
    amakon, -eX, micro_and_soft, crabApple, CrowdFare and all the other
    TLA partners to completely control your PC, and collect as much info
    as they want on you.

    CVE-2025-14860 was introduced on the 18th December, probably
    hoping people would be partying and wouldn't notice. Problem is,
    white-hat hackers don't party.

    Well done, Mozilla. Better luck this year. Here's to a perfect
    52/52 in 2026.

    PS You can avoid 99% of all webpage-browsing malware by not
    allowing ANY javascript. Which is why the "bad guts" insist you don't
    disable it
    []'s

    For Firefox, submit articles to:

    alt.comp.software.firefox

    Yes, Javascript can be disabled, but is not a rational decision
    nowadays. You could constantly fumigate your home to eliminate
    mosquitos, but to live there you'll need to use a full face (covers
    eyes, nose, and mouth) P100 respirator or SCBA (self-contained breathing apparatus) connected to an outdoor compressor (since a tank won't last
    as long as you reside inside the home).

    Where do the CVEs mention Javascript? Could be the program itself, so
    killing Javascript would not deter the described vulnerability. So, to
    up your suggestion, don't just disable Javascript in Firefox. Instead
    get rid of Firefox, and its variants.

    I'm not intimate with the inner workings of Firefox, but the above
    newsgroup community may be. When disabling Javascript, does that also
    mean all extensions (aka add-ons) are also disabled? If yes, disabling Javascript would prevent abuse by extensions. If no, disabling
    Javascript does not eliminate that abuse vector. Does disabling
    Javascript only disable it in the web docs the web browser renders, or
    also in all extensions added to the web browser? Since one CVE mentions
    an API, perhaps the program itself uses that API to provides its
    accessibility features. The above newsgroup might know. Maybe there's
    a community elsewhere that focuses more on Javascript both in the
    program itself, in extensions, and rendering of web docs.

    Because of using .css files to modify the UI or behaviors of Firefox,
    doesn't look like Javascript is limited to just the Gecko engine
    rendering of web docs. Seems the CVEs could be about the program
    itself, so disabling Javascript for rendering web docs is the wrong
    remedy.

    CVE-2025-14860
    Use-after-free in the Disability Access APIs component

    CVE-2025-14861
    Memory safety bugs fixed in Firefox 146.0.1

    Neither mention Javascript when used everywhere and anywhere within
    Firefox. They don't even mention Javascript.

    I tried https://bugzilla.mozilla.org for the bug IDS mentioned (1996570
    and 199970) in CVE-2025-14861, but I get "You are not authorized to
    access bug 1996570." Maybe if I created an account there, and logged
    then I could see the bug ticket, but I'm not doing that for vaguely
    described CVEs. The CVE mentioned another Mozilla article at https://www.mozilla.org/en-US/security/advisories/mfsa2025-98/. That
    has bug ID 2000597, but I cannot see those, either, without an account.
    If you have a Bugzilla account, go check if the bugs specify Javascript
    as the culprit, Javascript within the program, Javascript within scope
    of extensions, or just in the Javascript used in the malicious web docs.

    Per the CVEs you cited, the recommendation is not to disable Javascript,
    but to upgrade to Firefox 146.0.1.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From yeti@yeti@tilde.institute to alt.comp.freeware on Fri Jan 2 13:20:17 2026
    From Newsgroup: alt.comp.freeware

    VanguardLH <V@nguard.LH> wrote:

    Yes, Javascript can be disabled, but is not a rational decision
    nowadays.

    - JS shouldn't exist in the first place!

    - The bad actors MADE us depend on it.

    - Spreading information without using JS was and is possible. We just
    revolt far too less.
    --
    The smaller the dick, the bigger the ballroom?
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From Shadow@Sh@dowbr.invalid to alt.comp.freeware on Fri Jan 2 10:15:44 2026
    From Newsgroup: alt.comp.freeware

    On Fri, 02 Jan 2026 13:20:17 +0042, yeti <yeti@tilde.institute> wrote:

    VanguardLH <V@nguard.LH> wrote:

    Yes, Javascript can be disabled, but is not a rational decision
    nowadays.

    - JS shouldn't exist in the first place!

    True. Or image formats designed to crash memory.....
    who "invented" webGL and WebP?
    PS To save bandwidth? LOL. I'd rather download a 500KB jpg
    than 20MB of scripting.

    - The bad actors MADE us depend on it.

    Of course they did.

    - Spreading information without using JS was and is possible.

    Yes, but people write books here on Usenet as to why you
    should be forced to use it.

    We just revolt far too less.

    True. It's "if you don't like them stealing all your data,
    don't use the Internet", rather than "The bad guys have NO RIGHT to
    steal your data".
    I'm probably getting too old... or don't like the kneeling
    position.
    []'s
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From Mr. Man-wai Chang@toylet.toylet@gmail.com to alt.comp.freeware on Sat Jan 3 10:57:38 2026
    From Newsgroup: alt.comp.freeware

    On 2/1/2026 8:38 pm, yeti wrote:

    - JS shouldn't exist in the first place!

    - The bad actors MADE us depend on it.

    - Spreading information without using JS was and is possible. We just
    revolt far too less.


    Everything was done to convert a browser into a graphical terminal!!!
    --
    @~@ Simplicity is Beauty! Remain silent! Drink, Blink, Stretch!
    / v \ May the Force and farces be with you! Live long and prosper!!
    /( _ )\ https://sites.google.com/site/changmw/
    ^ ^ https://github.com/changmw/changmw
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From JJ@jj4public@gmail.com to alt.comp.freeware on Sat Jan 3 17:40:54 2026
    From Newsgroup: alt.comp.freeware

    On Sat, 3 Jan 2026 10:57:38 +0800, Mr. Man-wai Chang wrote:

    On 2/1/2026 8:38 pm, yeti wrote:

    - JS shouldn't exist in the first place!

    - The bad actors MADE us depend on it.

    - Spreading information without using JS was and is possible. We just
    revolt far too less.

    Everything was done to convert a browser into a graphical terminal!!!

    JS has nothing to do with whether a web browser is graphical or not.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From yeti@yeti@tilde.institute to alt.comp.freeware on Sat Jan 3 11:54:16 2026
    From Newsgroup: alt.comp.freeware

    JJ <jj4public@gmail.com> wrote:

    On Sat, 3 Jan 2026 10:57:38 +0800, Mr. Man-wai Chang wrote:

    On 2/1/2026 8:38 pm, yeti wrote:

    - JS shouldn't exist in the first place!

    - The bad actors MADE us depend on it.

    - Spreading information without using JS was and is possible. We just
    revolt far too less.

    Everything was done to convert a browser into a graphical terminal!!!

    JS has nothing to do with whether a web browser is graphical or not.

    And XTerminals were not a bad thing. I miss them!
    --
    The smaller the dick, the bigger the ballroom?
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From JJ@jj4public@gmail.com to alt.comp.freeware on Sat Jan 3 18:16:24 2026
    From Newsgroup: alt.comp.freeware

    On Fri, 2 Jan 2026 06:31:19 -0600, VanguardLH wrote:
    When disabling Javascript, does that also
    mean all extensions (aka add-ons) are also disabled?

    Firefox's `javascript.enabled` doesn't trully disable JS globally. It's only for all scripts (all embedded, external, and inline) on all sites, including bookmarklets (since the code is executed in sites' page context). Excluding browser extensions, Developer Tools (including its Debugger), browser
    internal pages & windows (e.g. Settings page, Bookmarks manager window,
    etc.), and most browser functionalities which are not visibly presentable
    (e.g. download queue manager, etc.).

    If no, disabling
    Javascript does not eliminate that abuse vector. Does disabling
    Javascript only disable it in the web docs the web browser renders, or
    also in all extensions added to the web browser?

    Except for site scripts, JS on all previously mentioned are still working,
    so they'll also vulnerable. After all, they're all using the same JS engine.

    Disabling JS via `javascript.enabled` simply removes most of the attack vectors; IMO, up to around 95%-99%; depending on how many various sites
    one's use (whether the sites are trusted or not). The 2nd place would be browser extensions (whether they're digitally signed or not). The 3rd place would be UserScripts or GM scripts.

    There's also the possibility of triggering an unpatched vulnerability by accident. Some (if not most) vulnerabilities were found in that way, instead
    of intentional hunt.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From VanguardLH@V@nguard.LH to alt.comp.freeware on Sat Jan 3 09:48:17 2026
    From Newsgroup: alt.comp.freeware

    JJ <jj4public@gmail.com> wrote:

    VanguardLH wrote:

    When disabling Javascript, does that also mean all extensions (aka
    add-ons) are also disabled?

    Firefox's `javascript.enabled` doesn't trully disable JS globally.
    It's only for all scripts (all embedded, external, and inline) on all
    sites, including bookmarklets (since the code is executed in sites'
    page context). Excluding browser extensions, Developer Tools
    (including its Debugger), browser internal pages & windows (e.g.
    Settings page, Bookmarks manager window, etc.), and most browser functionalities which are not visibly presentable (e.g. download
    queue manager, etc.).

    If no, disabling Javascript does not eliminate that abuse vector.
    Does disabling Javascript only disable it in the web docs the web
    browser renders, or also in all extensions added to the web browser?

    Except for site scripts, JS on all previously mentioned are still working,
    so they'll also vulnerable. After all, they're all using the same JS engine.

    Disabling JS via `javascript.enabled` simply removes most of the attack vectors; IMO, up to around 95%-99%; depending on how many various sites
    one's use (whether the sites are trusted or not). The 2nd place would be browser extensions (whether they're digitally signed or not). The 3rd place would be UserScripts or GM scripts.

    There's also the possibility of triggering an unpatched vulnerability by accident. Some (if not most) vulnerabilities were found in that way, instead of intentional hunt.

    What I couldn't tell from the CVE reports mentioned by Shadow is whether
    or not the memory reuse vulnerability was in Javascript interpreter in
    Firefox, as Shadow and yeti surmised rather blindly, or in some other
    part of Firefox. As you say, disabling Javascript in web docs won't
    affect Javascript employed elsewhere. Plus, the CVEs only mention some
    memory pointer reuse, and never mentioned Javascript at all nor the vulnerability was only within the scope of Javascript employed in
    malicious web docs.

    With uBlock Origin still usable in Firefox, you could define it to block 3rd-party scripts, but not 1st-party scripts. If I visit a site, yep, I
    want their scripts to run, but not when retrieved from an unknown or
    untrusted other party. Alas, many if not most large-scale web sites
    have lots of their resources off domain, like using CDN (Content
    Delivery Network) providers to reduce the bandwidth and load at a web
    site. Images, scripts, and other resources could come from off domain.
    When I had 3rd-party scripts disabled in uBO, I found lots of sites that
    would not properly function, because I was blocking access to resources
    the web doc needed; else, it exhibited odd behavior, or worse. I had to
    keep adding exclusions after analyzing the web docs to see from where a
    web site was retrieving its off-domain scripts. After a few years, I
    decided that I was wasting way too much time trying to throttle the functionality of way too many web sites to determine what off-domain
    resources I would allow. I also used to block 3rd-party web fonts which
    allow the font foundaries (most Google) to track where you visited,
    perhaps even which page, when you visited, and how often. Problem was
    the pages could get rather difficult to figure out what a placeholder
    icon would do when clicked on unless I dug into code, and that's way too
    much trouble.

    To me, Shadow and yeti are just spewing FUD. They don't know where
    within Firefox lies the memory reuse vulnerability. For example, one
    CVE mentions a bug lies in the Disability API. Maybe web doc scripts
    can use that, but why wouldn't Mozilla also use it for the accessibility settings in Firefox?

    https://support.mozilla.org/en-US/kb/accessibility-features-firefox
    "Firefox includes many features to make the browser and web content
    accessible to all users, ..."

    They don't say just web content. That CVE mentions a bug at:

    https://bugzilla.mozilla.org/show_bug.cgi?id=2000597

    but when I go there it says I need to login. I also went to bugzilla.mozilla.org to search on 2000597, but got the same denial. I
    can do a search to find bug tickets without logging in, but not this one
    nor 1996570 or 1999700 for the other CVE. If you can login, do those
    bug tickets report the Javascript engine is the culprit when a web doc's
    script or Firefox uses the Disability API?
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From JJ@jj4public@gmail.com to alt.comp.freeware on Sun Jan 4 16:27:33 2026
    From Newsgroup: alt.comp.freeware

    On Sat, 3 Jan 2026 09:48:17 -0600, VanguardLH wrote:

    What I couldn't tell from the CVE reports mentioned by Shadow is whether
    or not the memory reuse vulnerability was in Javascript interpreter in Firefox, as Shadow and yeti surmised rather blindly, or in some other
    part of Firefox. As you say, disabling Javascript in web docs won't
    affect Javascript employed elsewhere. Plus, the CVEs only mention some memory pointer reuse, and never mentioned Javascript at all nor the vulnerability was only within the scope of Javascript employed in
    malicious web docs.

    It's likely both. Disability API requires JS to access, and memory
    management is beyond the reach of JS code.

    The first CVE may be a bug in Disability API object destruction routine. The second CVE may be a long standing bug in Firefox's general memory
    management.

    I always suspect that, Firefox's memory management has a problem which kept piling up little by little getting ready to blow up. If you use Firefox as
    your main browser, you might be aware of its long standing memory leak
    problem. Most notably, when browsing search results and accessing result
    items back and forth in Google Maps.

    With uBlock Origin still usable in Firefox, you could define it to block 3rd-party scripts, but not 1st-party scripts.

    IMO, the uBlock Origin's colored filter UI design is flawed. We have to
    block the domain name in order to block 1st party scripts of the current
    site. The "1st-party" setting alone doesn't do anything. I kept the old
    uMatrix (also based on uBlock) along side uBlock Origin, since it provides
    much finer control on this matter. I only use uBlock for URL based filter.

    I also used to block 3rd-party web fonts which
    allow the font foundaries (most Google) to track where you visited,
    perhaps even which page, when you visited, and how often. Problem was
    the pages could get rather difficult to figure out what a placeholder
    icon would do when clicked on unless I dug into code, and that's way too
    much trouble.

    That! I hate that too. Moreover most sites which use them for icons, they
    only need less than 25% of the font characters. Wasting more resources than what they try to save. The final result has bigger waste ratio.

    but when I go there it says I need to login. I also went to bugzilla.mozilla.org to search on 2000597, but got the same denial. I
    can do a search to find bug tickets without logging in, but not this one
    nor 1996570 or 1999700 for the other CVE. If you can login, do those
    bug tickets report the Javascript engine is the culprit when a web doc's script or Firefox uses the Disability API?

    The details of crucial bugs are usually kept confidential or at least have strict public access to prevent it from being misused.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From occam@occam@nowhere.nix to alt.comp.freeware on Sun Jan 4 13:36:57 2026
    From Newsgroup: alt.comp.freeware

    On 01/01/2026 19:48, Shadow wrote:

    52 weeks. 51 of them Firefox/Thunderbird had serious
    vulnerabilities.

    Last week of 2025:

    https://www.cvedetails.com/cve/CVE-2025-14860 https://www.cvedetails.com/cve/CVE-2025-14861


    How many of these 'serious' vulnerabilities have affected you Shadow?
    (My own answer would be 'none'. )

    So what is the bee under your bonnet that keeps you criticizing Firefox?
    What alt-browser do you use?

    I wish you a paranoia-free new year.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From Shadow@Sh@dowbr.invalid to alt.comp.freeware on Sun Jan 4 11:52:38 2026
    From Newsgroup: alt.comp.freeware

    On Sun, 4 Jan 2026 13:36:57 +0100, occam <occam@nowhere.nix> wrote:

    On 01/01/2026 19:48, Shadow wrote:

    52 weeks. 51 of them Firefox/Thunderbird had serious
    vulnerabilities.

    Last week of 2025:

    https://www.cvedetails.com/cve/CVE-2025-14860
    https://www.cvedetails.com/cve/CVE-2025-14861


    How many of these 'serious' vulnerabilities have affected you Shadow?
    (My own answer would be 'none'. )


    None.
    I don't use Firefox. Or Thunderbird. Even the "sanitized"
    versions phone home and maintain a connection with American sites.

    So what is the bee under your bonnet that keeps you criticizing Firefox?

    Just the fact that they keep asking for "donations" in order
    to protect you from "bad guys".

    What alt-browser do you use?

    Lynx is good, but I use a Russian fork of Palemoon. I don't
    think it has a name.

    I wish you a paranoia-free new year.

    You mean that Brazil will not become the next dictatorship on
    the pedophile's list?
    Dream on ...
    []'s
    --
    Don't be evil - Google 2004
    We have a new policy - Google 2012
    Google Fuchsia - 2021
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From VanguardLH@V@nguard.LH to alt.comp.freeware on Sun Jan 4 11:10:34 2026
    From Newsgroup: alt.comp.freeware

    JJ <jj4public@gmail.com> wrote:

    VanguardLH wrote:

    What I couldn't tell from the CVE reports mentioned by Shadow is whether
    or not the memory reuse vulnerability was in Javascript interpreter in
    Firefox, as Shadow and yeti surmised rather blindly, or in some other
    part of Firefox. As you say, disabling Javascript in web docs won't
    affect Javascript employed elsewhere. Plus, the CVEs only mention some
    memory pointer reuse, and never mentioned Javascript at all nor the
    vulnerability was only within the scope of Javascript employed in
    malicious web docs.

    It's likely both. Disability API requires JS to access, and memory
    management is beyond the reach of JS code.

    Unless I'm mistaken, I thought proper and automatic memory management
    was supposed to be a thing in JS. So, the defect is in the API that is
    part of Firefox, not in the web doc's JS that accesses the API, and
    disabling JS only has scope on the web docs. When the CVE mentions
    memory reuse after release, didn't seem JS could do that. In C, you
    code the malloc() and free(), so devs were responsible for memory
    management. The JS engine does the alloc and free, and the JS engine
    decides when to release (garbage collection). Automatic memory
    management in JS is supposed to avoid memory related issues that were
    too often ailments in poorly coded C.

    While the API was mentioned, it's possible the JS engine had a defect in
    its memory management. The JS engine devs can't get everything perfect. However, you'd think the CVEs would target the JS engine as the cause,
    and not an API which could be written in anything, like C.

    The first CVE may be a bug in Disability API object destruction routine. The second CVE may be a long standing bug in Firefox's general memory
    management.

    I always suspect that, Firefox's memory management has a problem which kept piling up little by little getting ready to blow up. If you use Firefox as your main browser, you might be aware of its long standing memory leak problem. Most notably, when browsing search results and accessing result items back and forth in Google Maps.

    Unlike some users, I never leave the web browser running 24x7. I use
    it, then I exit it. Even in Firefox Android, I use its Quit menu entry
    to unload it rather than let Android leave it running in the background
    until whenever its memory is needed for a newly loaded app. I don't
    have more than a dozen tabs open at a time. So, I never encountered a
    big memory footprint with Firefox, but then my use wouldn't tax it.
    When I saw someone complaining about Firefox's memory footprint size,
    they left Firefox running all the time, even when not using it, had
    hundreds of open tabs, and left it configured to run background jobs
    after it supposedly exited.

    I remember when Mozilla belatedly moved to isolated processes to better stabilize Firefox that there was a swarm of user reactions regarding
    memory consumption. But once you learned about Electrolysis in Firefox,
    those concerns faded, so the ever growing memory footprint of Firefox
    got rather forgotten. The big change masked the little problem.

    With uBlock Origin still usable in Firefox, you could define it to block
    3rd-party scripts, but not 1st-party scripts.

    IMO, the uBlock Origin's colored filter UI design is flawed. We have to
    block the domain name in order to block 1st party scripts of the current site. The "1st-party" setting alone doesn't do anything. I kept the old uMatrix (also based on uBlock) along side uBlock Origin, since it provides much finer control on this matter. I only use uBlock for URL based filter.

    I guess I wasn't clear. I wanted 3rd-party scripts blocked, but I did
    want 1st-party scripts to run. If 1st-party script filtering didn't
    work in uBO, I wouldn't have noticed it.

    Are you using uBO's Expert mode to get its grid on what to block? That
    isn't perfect, so you still had to define rules to tweak behavior. Its
    Expert mode with the grid looks like what you get in uMatrix. I thought uMatrix got rolled into uBO, but the layout is different.

    I recall uBO had a Javascript option which blocked all JS regardless of
    source. You toggled the option to default to blocking JS, and then used
    Expert mode when you wanted to all 1st-party scripts (and perhaps some 3rd-party scripts necessary for proper rendering or behavior of the web
    doc to a minimum operational level).

    Even uMatrix won't get you full control. You might want to allow
    1st-party JS, but disable some JS events, like onclick. For example, <domain>##+js(ra.js, onclick, input[type="<name>"]). But doing so
    requires learning a LOT more about Adblock Plus filter syntax. The grid
    views in uBO Expert mode or uMatrix will help, but you need filters for
    further granularity.

    Some sites want to add their search engine to your web browsers, and
    many web browsers will do so without asking the user for permission.
    So, I added the following to my user rules:

    ! Block suggestion to add site's search engine to web browser. ##link[type="application/opensearchdescription+xml"]

    Unfortunately uBO Lite to support Manifest v3 became severely crippled. However, Adguard's Adblocker MV3 extension does let me define user
    rules, so I migrated by rule to there. Adguard Adblocker extension also
    lets me see a log to help in defining user rules. uBO Lite fell behind
    too far, so I moved to Adguard Adblocker. In Firefox, both MV2 and MV3
    are supported ... for now. No promise for the future. uBO is still
    usable in Firefox Desktop. Don't remember if Firefox Android (aka
    Fennix) supports both Manifest versions, so you could still use uBO with
    it instead of the crippled uBO Lite. All the Android web browsers are
    severely crippled compared to the desktop cousins that it is misleading
    to share a product name to draw an unaware community to use on multiple platforms.

    I also used to block 3rd-party web fonts which
    allow the font foundaries (most Google) to track where you visited,
    perhaps even which page, when you visited, and how often. Problem was
    the pages could get rather difficult to figure out what a placeholder
    icon would do when clicked on unless I dug into code, and that's way too
    much trouble.

    That! I hate that too. Moreover most sites which use them for icons,
    they only need less than 25% of the font characters. Wasting more
    resources than what they try to save. The final result has bigger
    waste ratio.

    The sites using 3rd-party fonts do NOT have to redirect clients to the
    font foundaries to retrieve them. The site could cache those web fonts,
    so they become 1st-party fonts. If they cache them locally, my
    3rd-party font filter wouldn't block them since they are 1st-party.
    Instead every site I visited that employed 3rd-party web fonts was
    offloading the fonts and the bandwidth to retrieve them at the font
    foundaries who are more than willing to track you went getting their
    fonts (your IP address to get the fonts, where you visited that
    redirected you to their fonts, when you visited, how often, etc).

    Arguing with site admins to cache the web fonts at their own server was fruitless. Rarely could you reach anyone that was involved in
    configuring the web server, and, when you did, they didn't care, because
    they were instructed to reduce load on the server as part of scaling up
    their service to accomodate more and more users. They were already
    using CDNs, so using font foundaries was an extension of that behavior.

    but when I go there it says I need to login. I also went to
    bugzilla.mozilla.org to search on 2000597, but got the same denial.
    I can do a search to find bug tickets without logging in, but not
    this one nor 1996570 or 1999700 for the other CVE. If you can
    login, do those bug tickets report the Javascript engine is the
    culprit when a web doc's script or Firefox uses the Disability API?

    The details of crucial bugs are usually kept confidential or at least
    have strict public access to prevent it from being misused.

    That's what I figured. They didn't want to provide instructions or a
    POC (Proof of Concept) that aholes could utilize to attack users of
    prior versions of Firefox. Yet it didn't seem JS in web docs was the
    issue, but vulnerabilities within Firefox itself. Getting a Bugzilla
    account isn't a laborious task, so it isn't much of a hurdle to get at
    the content. It isn't like you have to pay to participate. I quit
    using Firefox a while ago, so no point for me to create a Bugzilla
    account to see if I could then view the CVE-related bugs on a program
    that stopped using.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From JJ@jj4public@gmail.com to alt.comp.freeware on Mon Jan 5 16:57:28 2026
    From Newsgroup: alt.comp.freeware

    On Sun, 4 Jan 2026 11:10:34 -0600, VanguardLH wrote:

    Are you using uBO's Expert mode to get its grid on what to block?

    Not sure about Expert mode. If you're referring to manual text based rules editing, then yes. For domain and resource type blocking I use uMatrix entirely. I don't use uBO for that (i.e. "My rules" tab is empty) - mainly
    do to its oversimplified grid UI. I only use uBO for URL based blocking (via the "My filters" tab) which uMatrix can't do.

    Even uMatrix won't get you full control. You might want to allow
    1st-party JS, but disable some JS events, like onclick. For example, <domain>##+js(ra.js, onclick, input[type="<name>"]). But doing so
    requires learning a LOT more about Adblock Plus filter syntax. The grid views in uBO Expert mode or uMatrix will help, but you need filters for further granularity.

    Yes. uMatrix don't have as much control as uBO. It doesn't even have "My filters" tab for uBO filter codes. uMatrix's main advantage over uBO is its grid UI. I hardly need to do manual editing in its "My rules" tab because of it.

    Some sites want to add their search engine to your web browsers, and
    many web browsers will do so without asking the user for permission.
    So, I added the following to my user rules:

    ! Block suggestion to add site's search engine to web browser. ##link[type="application/opensearchdescription+xml"]

    I know what you meant. One of uBO's power is to modify HTML even before it's being parsed by the web browser. It's similar to HTTP proxy based content filtering such as the old Proxomitron.

    Unfortunately uBO Lite to support Manifest v3 became severely crippled.

    Meh. MV3 ultimately is nothing more than a way to chip away users' control
    over what content users want to allow and disallow.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From VanguardLH@V@nguard.LH to alt.comp.freeware on Mon Jan 5 08:42:07 2026
    From Newsgroup: alt.comp.freeware

    JJ <jj4public@gmail.com> wrote:

    VanguardLH wrote:

    Are you using uBO's Expert mode to get its grid on what to block?

    Not sure about Expert mode.

    https://github.com/gorhill/uBlock#documentation

    I'm used to calling it Expert mode. It's now called Advanced mode. You
    click on the right side to allow or block. At the above site, it's the
    image on the right side which you see after enabled the advanced mode. Unfortunately just where to click isn't illustrated. As I recall, you
    could hover the mouse over the right-side columns which would indicate
    the color of what filter you wanted to update. I think the result was
    your modification would add a filter.

    https://github.com/gorhill/uBlock/wiki/Dynamic-filtering:-quick-guide

    That says the 1st column shows the resource that might get blocked, or
    allowed. At the left end of each row in that column, green (allowed),
    yellow (some resources blocked from that source), and red (all resources blocked from that domain) is shown to list the resources, and blockage,
    if any. The 2nd column is how you would define global filters. You
    might want Google Analytics blocked everywhere, but want to block some resources at just the visited web site.

    The advanced panel merely presents the block state for various
    resources, and modifying them (usually to block) creates filters that
    get added to uBO. Much easier than learning all the Adblock Plus syntax
    to manually define the filters. This is much like uBO's element filter
    where you enable it, hover the mouse cursor over various elements in the
    web doc to decide the scope of a filter, and when you create the block
    then a rule gets added.

    The advanced panel could be improved, but I suspect the app author won't bother. It's advanced, so users are supposed to learn and experiment
    with it. Also, while there are still Firefox users, the percentage of
    the web browser market is small. Plus, in order to support MV3 web
    browsers, the author came up with a Lite version that doesn't have
    advanced mode, because Google replace the WebRequest API that allowed
    dynamic content filtering with the declarativeNetRequest API that
    restricts the number of rules, and lacks the dynamic abilities for
    advanced blocking. Google was losing revenue with all the blocking,
    such as their analytics crap sites would use to track how their sites
    were used.

    I don't think uBO Lite even has a log to show you all the resources a
    web doc accesses, and if some where blocked. I switched to Adguard
    Adblocker which does have a log: enable it, clear it, refresh the web
    doc to re-retrieve, the log populates, turn off the log, and then look
    at the log to determine for which resources you might want to create new filters aka user rules. That often helps when I want to block something
    at a web site, but sometimes the ad content is retrieved by a 1st-party
    script (which I allow) to get the ad, and I have to dig into the web
    doc's code to see where is the source of that ad content to manually
    create a filter (which means I might have to learn a little more about
    Adblock Plus' syntax, and trial several modifications of a filter until
    I get it right). Learning Adblock Plus' filter syntax is like trying to
    learn a new programming language (that isn't like anything you've used
    before, so not like learning Javascript if you know C/C++). Doesn't
    even resemble regex. So, sometimes I gave up trying to figure out how
    to filter out some dynamic (scripted) ad content. Full uBO's advanced
    panel facilitate some ease in defining filters, but it could be too overreaching in scope. Finer granularity required writing and testing
    manually written filters. uBO Lite for MV3 web browsers doesn't have
    advanced mode nor even a log to show the resources, and how any of the pre-defined blacklists or your own filters would affect which were
    allowed or block.

    For now, Mozilla says they will support both MV2 and MV3 add-ons. That
    could change. I gave up on Firefox, because its script interpreter was
    slower. So slow at some sites that I thought the sites were dead or overloaded. Some sites didn't render properly or completely with
    Firefox, but did with a Chromium-based web browser. Firefox was far
    more configurable than the Chromium web browsers, and why I stuck with
    it for so long, but eventually I needed a web browser that was faster,
    and could properly render all web sites. Web devs often only test with Chromium web browsers (e.g., Chrome, Edge), so they don't know about
    anomalies when using Firefox. Those same web devs are unreachable since
    many companies contract out that service, and the company isn't
    interested in supporting customer requests to report issues to whomever
    the company hired to build the web site. Plus, the company contracts
    the web dev team, the site is done, and the contract is over until the
    company decides to update their site, so there may not be a constant relationship between company and web dev service. The company hasn't a
    clue how all the web magic works, because they don't have their own web
    dev team.
    --- Synchronet 3.21b-Linux NewsLink 1.2
  • From Mr. Man-wai Chang@toylet.toylet@gmail.com to alt.comp.freeware on Mon Jan 5 23:02:31 2026
    From Newsgroup: alt.comp.freeware

    On 3/1/2026 7:12 pm, yeti wrote:
    JJ <jj4public@gmail.com> wrote:

    On Sat, 3 Jan 2026 10:57:38 +0800, Mr. Man-wai Chang wrote:

    Everything was done to convert a browser into a graphical terminal!!!

    JS has nothing to do with whether a web browser is graphical or not.

    And XTerminals were not a bad thing. I miss them!


    The business world seems to prefer IBM 3270 and Unisys. :)
    --
    @~@ Simplicity is Beauty! Remain silent! Drink, Blink, Stretch!
    / v \ May the Force and farces be with you! Live long and prosper!!
    /( _ )\ https://sites.google.com/site/changmw/
    ^ ^ https://github.com/changmw/changmw
    --- Synchronet 3.21b-Linux NewsLink 1.2