diff --git a/4.1-Extensions.md b/4.1-Extensions.md
index 1de7138..37f35aa 100644
--- a/4.1-Extensions.md
+++ b/4.1-Extensions.md
@@ -28,10 +28,9 @@ This list covers privacy and security related extensions only. While we believe
* [HTTPS Everywhere](https://addons.mozilla.org/firefox/addon/https-everywhere/) ✔ [Privacy](https://www.eff.org/code/privacy/policy) | [GitHub](https://github.com/EFForg/https-everywhere)
- If you're using HTTPS-Only mode (usable since FF83), then this is basically redundant, especially as more of the web turns to secure context
* [CanvasBlocker](https://addons.mozilla.org/firefox/addon/canvasblocker/) ✔ [Privacy](https://addons.mozilla.org/firefox/addon/canvasblocker/privacy/) | [GitHub](https://github.com/kkapsner/CanvasBlocker)
- - **DO NOT** use `Screen API` or `Navigator API` protections with RFP
- - `Window` is protected in the user.js since FF82+ (`privacy.window.name.update.enabled`)
- - `Audio` is disabled in the user.js, and if enabled (e.g. with remote video conferencing), the entropy is low
- - The rest is up to you
+ - `Canvas API`: great fallback if you allow an RFP canvas site exception
+ - `Screen API` and `Navigator API`: don't use with RFP
+ - `The rest`: good protection against naive scripts, detectable with advanced scripts
* [CSS Exfil Protection](https://addons.mozilla.org/firefox/addon/css-exfil-protection/) | [GitHub](https://github.com/mlgualtieri/CSS-Exfil-Protection) | [Homepage + Test](https://www.mike-gualtieri.com/css-exfil-vulnerability-tester)
- Practically zero threat and if the platform's CSS was compromised, you'd have bigger problems to worry about