Updated 4.1 Extensions (markdown)

Thorin-Oakenpants 2022-01-30 12:34:30 +00:00
parent 5510abd91d
commit 52d942e16d

@ -71,9 +71,8 @@ These extensions will not mask or alter any data sent or received, but may be us
- ❗Sanitizing in-session is a false sense of privacy. They do nothing for IP tracking. Even Tor Browser does not sanitize in-session e.g. when you request a new circuit. A new ID requires _both_ full sanitizing _and_ a new IP. The same applies to Firefox - ❗Sanitizing in-session is a false sense of privacy. They do nothing for IP tracking. Even Tor Browser does not sanitize in-session e.g. when you request a new circuit. A new ID requires _both_ full sanitizing _and_ a new IP. The same applies to Firefox
- ❗Cookie extensions lack [APIs](https://bugzilla.mozilla.org/1669716) to work with Total Cookie Protection which [will be the default](https://bugzilla.mozilla.org/1731713) - ❗Cookie extensions lack [APIs](https://bugzilla.mozilla.org/1669716) to work with Total Cookie Protection which [will be the default](https://bugzilla.mozilla.org/1731713)
* Anti-Fingerprinting Extensions * Anti-Fingerprinting Extensions
- Redundant with RFP: We enable RFP by default as the [best solution](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not]) - Redundant with RFP which is the [best solution](https://github.com/arkenfox/user.js/wiki/3.3-Overrides-[To-RFP-or-Not])
- Robust, built-in, performant, extra timing mitigations, and doesn't leak - ⭐ For non-RFP users, we recommend Canvas Blocker (see above) as your best option
- ⭐ If you don't use RFP, then we recommend Canvas Blocker (see above) as your best option
- Most extensions cannot protect what they claim: - Most extensions cannot protect what they claim:
- It's impossible (engine, OS, version) - It's impossible (engine, OS, version)
- It's not a lie (the sites expect and use a valid value) - It's not a lie (the sites expect and use a valid value)