Recenzije za Firefox Multi-Account Containers
Firefox Multi-Account Containers od Firefox
Recenzija od Amazing Mr. X
Ocijenjeno s 2 od 5
od Amazing Mr. X, prije 3 godineThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
7.753 recenzije
- Ocijenjeno s 5 od 5od Korisnik Firefoxa 13212553, prije dan
- Ocijenjeno s 5 od 5od Christopher, prije danOne of my must have addons for task separation, and I feel it is mandatory for keeping tracking cookies completely contained (pun intended). Worthy of being built in to the main browser I think!
The only issues I have are caused by my choices, e.g. Paypal opens in a finance container, while shopping websites open in a shopping container, and sometimes I need to proceed to/from Paypal from the shopping website. - Ocijenjeno s 5 od 5od Korisnik Firefoxa 15516830, prije 3 dana
- Ocijenjeno s 5 od 5od Caleb Gosnell, prije 3 dana
- Ocijenjeno s 5 od 5od Korisnik Firefoxa 19526619, prije 6 dana
- Ocijenjeno s 5 od 5od Korisnik Firefoxa 15216151, prije 8 dana
- Ocijenjeno s 5 od 5od jI, prije 8 dana
- Ocijenjeno s 5 od 5od Nyahmii, prije 9 dana
- Ocijenjeno s 5 od 5od Robin Filer, prije 9 danaIt's a little clunky, i wish it were easier to manage a larger number of containers, and it was easier to set rules for when something should open in a container. Overall though big thumbs up to the mozilla team, this is a great and usable privacy tool
- Ocijenjeno s 1 od 5od Hajnalka, prije 9 dana
- Ocijenjeno s 5 od 5od Lilith D. Bracken, prije 10 danaThis extension is fantastic for keeping different parts of your online life organized. Each container has its own color-coded tab and separates cookies, so you can stay logged into multiple accounts at once without conflicts. It also works well with privacy tools like VPNs for extra protection. Easy to use, keeps browsing tidy, and gives you much more control over your online activity.
- Ocijenjeno s 5 od 5od Korisnik Firefoxa 19513466, prije 11 danaEssential to maintain multiple online identities, each with their own cookies/sessions.
- Ocijenjeno s 5 od 5od Johnny Ellery, prije 12 danaAmazing extension, The amount of time it has saved being able to have different accounts open at the same time.
- Ocijenjeno s 5 od 5od Korisnik Firefoxa 19512272, prije 12 dana
- Ocijenjeno s 5 od 5od Makiel, prije 13 dana
- Ocijenjeno s 5 od 5od Raysas, prije 14 dana
- Ocijenjeno s 5 od 5od SiLiKhon, prije 16 dana
- Ocijenjeno s 4 od 5od anarchy1923, prije 18 danaReally nice to have isolation per container, and I've found great utility for it, especially when I was fed up with using Google account switcher for switching between different google accounts of mine.