Ressenyes sobre Firefox Multi-Account Containers
Firefox Multi-Account Containers per Mozilla Firefox
Ressenya de: Amazing Mr. X
S'ha valorat amb 2 sobre 5
per Amazing Mr. X, fa 7 mesosThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
6.290 ressenyes
- S'ha valorat amb 1 sobre 5per Firefox user 13404543, fa 2 diesA really useful extension, but it has some bugs that are simply too irritating to tolerate.
- S'ha valorat amb 5 sobre 5per Firefox user 17758128, fa 3 dies
- S'ha valorat amb 5 sobre 5per Bernat, fa 4 dies
- S'ha valorat amb 5 sobre 5per einabyss, fa 6 diesThis is a very useful add-on for separating accounts by category, using the same account in different tabs without the need for a private window, also, to ensure privacy, you can use this in addition to Total Cookie Protection in Firefox.
- S'ha valorat amb 5 sobre 5per Firefox user 15085278, fa 7 dies
- S'ha valorat amb 5 sobre 5per Jozef Kotlar, fa 8 dies
- S'ha valorat amb 1 sobre 5per ОСТАП, fa 8 dies
- S'ha valorat amb 5 sobre 5per Firefox user 14251874, fa 8 diesOnly rating 5 stars because I can't rate it 6. This is perfect. As a freelancer, I don't want to use Chrome's tedious login mechanism. This lets me quickly name my clients and split them into groups. It is Google agnostic and let's me use my current browser add-ons.
I don't know where this plug-in has been all my life, but thank you. - S'ha valorat amb 5 sobre 5per Joe Lee, fa 9 dies
- S'ha valorat amb 5 sobre 5per qela, fa 9 dies
- S'ha valorat amb 4 sobre 5per Bence Hornák, fa 9 dies
- S'ha valorat amb 5 sobre 5per Diego González, fa 9 dies
- S'ha valorat amb 5 sobre 5per Firefox user 17757327, fa 10 dies
- S'ha valorat amb 5 sobre 5per Ferdinand, fa 11 diesExcellent concept! It adds to my peace of mind, and is easy to get started with and maintain. And I love the way it integrates with Facebook container. But a feature request, if you please: To specify top domains for a container, and have all pages under that domain and its subdomains, open in the container, instead of having to add each and every subdomain as they are encountered.
- S'ha valorat amb 2 sobre 5per Ayush Patel, fa 11 diesHi Team,
My Container extension is not working. It is really disappointing. I recently organized my work according to containers tabs and now it is not even loading. Please look into it on priority.
Let me know when its fixed. - S'ha valorat amb 5 sobre 5per Firefox user 17733376, fa 11 dies
- S'ha valorat amb 5 sobre 5per Firefox user 17734876, fa 12 dies
- S'ha valorat amb 5 sobre 5per Impala, fa 12 dies
- S'ha valorat amb 5 sobre 5per Lucas S., fa 12 dies
- S'ha valorat amb 5 sobre 5per Firefox user 17753184, fa 13 dies
- S'ha valorat amb 5 sobre 5per Firefox user 17752699, fa 13 dies
- S'ha valorat amb 5 sobre 5per foleymon, fa 13 dies
- S'ha valorat amb 5 sobre 5per Firefox user 13492457, fa 13 dies