I've only installed a handful, but they've all worked fine except for KeePassXC-Browser - and that's partly q known issue with a workaround and partly Flatpak (which made it hard to apply the workaround)
LibreWolf
Welcome to the official community for LibreWolf.
LibreWolf is designed to increase protection against tracking and fingerprinting techniques, while also including a few security improvements. LibreWolf also aims to remove all the telemetry, data collection and annoyances, as well as disabling anti-freedom features like DRM. If you have any question please visit our FAQ first: https://librewolf.net/docs/faq/
To learn more or to download the browser visit the website: https://librewolf.net/
If you want to contribute head over to our Codeberg: https://codeberg.org/librewolf
Adding extensions makes you more fingerprintable, which kind of defeats the purpose of Librewolf versus any other Firefox fork.
Well, I don't know about OP, but MY purpose for using Librewolf is to have something that is not run by Mozilla and doesn't call home to Mozilla, has a strong contribution history, exists in nixpkgs, and can be fully configured in Nix Home Manager. Librewolf is the only fork that checks those boxes. The security benefits are just a nice side-effect when they fit with my workflow.
I see a lot of posts from ToS refugees here, and I can guarantee you, the vast majority are going to be less happy with Librewolf than whatever the modern equivalent of Iceweasel is.
Noob here - How come browser extensions can be used in fingerprinting? Why is the fact that I have an extension shared with servers? Why doesn't a browser like Libre Wolf refuse to share this? Is it really ingrained in the we browsing process to pass that info back? It seems like it should remain on the client-side. I can see Google sharing it but why can't LibreWolf decide not to?
It's not 100% the case that EVERY extension will. A completely local extension that doesn't ever hit the web or change page layout won't, but how many of those are there? Anything that changes how you view a page will subtly impact what the server sees in your request, or at least CAN see via javascript, which can be used towards fingerprinting -- and because everything is so monopolized, anything making a third party call related to the page is potentially resolvable based on IP and timing because like four companies run everything and share an unknown subset of their data on you. Since your data is the new oil, there's a robust incentive for ad companies to really break out all the stops trying to fingerprint everything about you. It's not LibreWolf's fault, it's just the incentives that exists out there plus how the web works.
Got it, so it's not that the browser passes an extension list to the server, but the server could recognize an extensions impact on the page with local JS or something and then send that info home. Could that in theory be blocked?
You could try, but I've never heard of a browser that claimed to be able to mitigate fingerprinting with arbitrary extensions. The extension itself could literally be phoning home to Google or anyone else
If librewolf is just about low fingerprintability then I don't think I understand it at all. Thanks.
It's fundamentally built for privacy, and as a result, breaks a bunch of things. It's really not a great fork for general Firefox users to switch to just to get out of the ToS change.
It's built against the latest version and kept up to date with it, so you should be fine. The only extension I had an issue with was KeePassXC, but because it communicates with an application outside the browser. I had to symlink a single directory and now everything works just the same.
I don't use No-Script specifically, but I have not had any issues with the extensions I do use. It's easy enough to test yourself, though.
yeah. I figured worse come to worse I could start testing various alts.