Critiques pour Firefox Multi-Account Containers
Firefox Multi-Account Containers par Firefox
Avis de Amazing Mr. X
Noté 2 sur 5
par Amazing Mr. X, il y a 3 ansThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
7 710 notes
- Noté 5 sur 5par Utilisateur ou utilisatrice 15176795 de Firefox, il y a 3 jours
- Noté 5 sur 5par Utilisateur ou utilisatrice 19469689 de Firefox, il y a 7 joursОчень удобно, еще бы дать возможность к разным контейнерам привязывать разный профиль фаерфокс (с разными вкладками и расширениями) как это реализовано в браузере Arc
- Noté 5 sur 5par alko89, il y a 8 jours
- Noté 5 sur 5par 王様, il y a 10 jours
- Noté 5 sur 5par Utilisateur ou utilisatrice 19444928 de Firefox, il y a 13 jours
- Noté 5 sur 5par minneyb.BITeC/OtisRef, il y a 15 jours
- Noté 5 sur 5par isawubefore, il y a 15 jours
- Noté 3 sur 5par grace46202, il y a 17 joursWorks great, but the UI/UX and featuresets could be way better, such as grouping containers, more colour choices, subdomain wildcards in the allow list, inverted allow list ("never open in this container"), etc. Managing lots of containers gets very tedious.
- Noté 5 sur 5par Utilisateur ou utilisatrice 18215164 de Firefox, il y a 17 joursVery usefull extension, now i don't have to install multiple firefox or multiple chrome profile. I like it. Managing my clients id is very easy now. Thank you to the developers.
- Noté 5 sur 5par manifesto9985, il y a 18 jours
- Noté 5 sur 5par Holger Böhnke, il y a 18 joursThis is one of my most used and most needed Extensions. So useful to login into the same site using two or more accounts. If you pin the tab and allow cookies for the site to be stored you have your app - like teams in two tenants or outlook with different accounts - right there at your fingertips when you open Firefox. Must have for web developers that need to login into frontend and backend at the same time.
- Noté 5 sur 5par kauã, il y a 19 jours
- Noté 4 sur 5par Ugarov, il y a 19 jours
- Noté 5 sur 5par pristigaster, il y a 23 jours
- Noté 5 sur 5par Utilisateur ou utilisatrice 17555649 de Firefox, il y a 25 jours
- Noté 5 sur 5par Frank, il y a un mois
- Noté 3 sur 5par Utilisateur ou utilisatrice 17230081 de Firefox, il y a un moisReally great, but could use some polish. You really don't need a fullscreen warning that a site was previously set to open in a container. I know that it is in that container - that is the point (plus you have indicators already, really not hard to figure out). And when I limit a container to designated sites I still want to be able to open a tab into that container via the left click menu
- Noté 5 sur 5par Oussama Wd, il y a un mois
- Noté 5 sur 5par Rijjie, il y a un mois
- Noté 5 sur 5par Utilisateur ou utilisatrice 16235518 de Firefox, il y a un mois
- Noté 5 sur 5par Utilisateur ou utilisatrice 19328140 de Firefox, il y a un mois