Bewertungen für Firefox Multi-Account Containers
Firefox Multi-Account Containers von Firefox
Bewertungen von Amazing Mr. X
Bewertet mit 2 von 5 Sternen
von Amazing Mr. X, vor 3 JahrenThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
7.724 Bewertungen
- Bewertet mit 5 von 5 Sternenvon 82un0, vor 3 Stunden
- Bewertet mit 5 von 5 Sternenvon Martin, vor 9 StundenVery cool, this should be built in to Firefox (IMHO) but I can imagine some of the cookie following community might freak out if everyone could put this to use for their own needs. Bravo and Brava!
- Bewertet mit 1 von 5 Sternenvon Domenico, vor 16 StundenBella l'idea ma assolutamente impossibile da usare perchè in pratica danneggia il corretto funzionamento di quasi tutte le altre estensioni e dei siti che richiedo l'accesso attivo!
- Bewertet mit 5 von 5 Sternenvon PlaneCrazy1999, vor einem TagOne of the coolest things ever and I never would have thought of it. I'm no programmer but after needing to re-login to everything once I assigned containers, my observation is each container is essentially a separate instance of the browser, each container with its own set of cookies. This is a genius way to split up cookies based on how sensitive the info is, and it somehow manages to run as if I didn't install an addon that does multi-process instances in one window. I've been using Firefox ever since I started to understand cybersecurity from wiki dives and debit card fraud in high school and would just like to say this is probably the most customizable, resource-efficient/multithreaded/fast and private browser there is. That's why I have my beta studies turned on now; I want to contribute. Thank you and keep up the great work over there!
- Bewertet mit 5 von 5 Sternenvon علي الخلقي, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon krushik, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon thomas11, vor 2 TagenIncroyable extension. Je ne peux bosser sérieusement que grâce à elle.
- Bewertet mit 5 von 5 Sternenvon AndroAGENT, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon Jan Vegar, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon Rajamanikam A, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon luxdormiens, vor 2 Tagen
- Bewertet mit 5 von 5 Sternenvon Kemar Christie, vor 3 TagenThis works flawlessly, no issues here. Would love to see more icons though so i can have more containers that arent repeating icons. Let us use emojis instead or add our own icon. Also huge thing to add. make the containers use seperate extensions. This would then replicate the profliels feature but make it all unified from one profile.
- Bewertet mit 5 von 5 Sternenvon Miguel Zabala, vor 5 Tagen
- Bewertet mit 5 von 5 Sternenvon igor, vor 5 TagenIt simplifies managing multiple logins on the same site and significantly enhances privacy by preventing cross-site tracking.Highly recommended for taking control of your online footprint.
- Bewertet mit 5 von 5 Sternenvon Firefox-Benutzer 15176795, vor 11 Tagen
- Bewertet mit 5 von 5 Sternenvon Firefox-Benutzer 19469689, vor 15 TagenОчень удобно, еще бы дать возможность к разным контейнерам привязывать разный профиль фаерфокс (с разными вкладками и расширениями) как это реализовано в браузере Arc
- Bewertet mit 5 von 5 Sternenvon alko89, vor 15 Tagen
- Bewertet mit 5 von 5 Sternenvon 王様, vor 17 Tagen
- Bewertet mit 5 von 5 Sternenvon Firefox-Benutzer 19444928, vor 21 Tagen
- Bewertet mit 5 von 5 Sternenvon minneyb.BITeC/OtisRef, vor 23 Tagen
- Bewertet mit 5 von 5 Sternenvon isawubefore, vor 23 Tagen
- Bewertet mit 3 von 5 Sternenvon grace46202, vor 24 TagenWorks great, but the UI/UX and featuresets could be way better, such as grouping containers, more colour choices, subdomain wildcards in the allow list, inverted allow list ("never open in this container"), etc. Managing lots of containers gets very tedious.