Đánh giá cho Firefox Multi-Account Containers
Firefox Multi-Account Containers bởi Firefox
Đánh giá bởi Amazing Mr. X
Xếp hạng 2 trong số 5
bởi Amazing Mr. X, 3 năm trướcThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
7.558 đánh giá
- Xếp hạng 5 trong số 5bởi Nita Helmawati, 2 ngày trước
- Xếp hạng 5 trong số 5bởi Werec, 2 ngày trướcРаботает. Требует регистрацию. Выбирайте индийский сервер. Бесплатный аккаунт дает 60 минут пользования на сутки
- Xếp hạng 5 trong số 5bởi Daniel B.P., 3 ngày trướcIncredible extension, should be part of the browser instead of AI bloatware or pocket.
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 13904191, 4 ngày trước
- Xếp hạng 5 trong số 5bởi fanxiang, 5 ngày trướcCan you add an icon before the line "Firefox Multi Account Containers" at the top, otherwise the entire interface will be very uncoordinated
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 18283939, 9 ngày trước
- Xếp hạng 5 trong số 5bởi Vinicius Menezes, 10 ngày trướcad tracking generally gotten worse (which generally is a good sign) after I adopted some measures: tab containers, firefox relay, ad block ultimate, fastfoward and jslibcache. Thank god to all these privacy enhancing technologies!
- Xếp hạng 5 trong số 5bởi iAMVengeance, 10 ngày trước
- Xếp hạng 3 trong số 5bởi Người dùng Firefox 18989702, 11 ngày trướcPlease make the keyboard shortcut for opening a tab override websites shortcuts
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 16663989, 11 ngày trước
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 13444454, 13 ngày trước
- Xếp hạng 5 trong số 5bởi Reggie L Addison, 13 ngày trước
- Xếp hạng 5 trong số 5bởi ML, 15 ngày trướcFoundational to how I use the web now. Augmented with the Smart Containers extension my sessions stay separated with a minimum of fuss.
We need this functionality on Android! - Xếp hạng 5 trong số 5bởi Người dùng Firefox 18983433, 15 ngày trước
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 18983409, 15 ngày trước
- Xếp hạng 5 trong số 5bởi lucky_nop, 15 ngày trước
- Xếp hạng 5 trong số 5bởi APM, 17 ngày trước
- Xếp hạng 5 trong số 5bởi ol, 17 ngày trước
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 18979404, 17 ngày trước
- Xếp hạng 4 trong số 5bởi Gabb4SauRuzZ, 18 ngày trước
- Xếp hạng 5 trong số 5bởi era, 19 ngày trước
- Xếp hạng 5 trong số 5bởi WadamT, 19 ngày trướcA useful extension to have multiple accounts in one profile and having option to limit sites only to a container is good for privacy. Hope sync with Firefox account better with time, right now some tabs forget what containers they were in during new install.
- Xếp hạng 5 trong số 5bởi Người dùng Firefox 17596472, 20 ngày trước