So I have seen comments that bitwardens extension works and want to check if no script does. Since libre wolf is just configuration I figure most stuff should work but not real sure. I looked to see if there was something like a pinned questions thread which I would normally put a minor question like this. Considering recent news maybe instead a moving from firefox pinned thread for awhile first.

  • jutty@blendit.bsd.cafe
    link
    fedilink
    arrow-up
    2
    ·
    3 days ago

    It’s built against the latest version and kept up to date with it, so you should be fine. The only extension I had an issue with was KeePassXC, but because it communicates with an application outside the browser. I had to symlink a single directory and now everything works just the same.

  • jevans ⁂@lemmy.ml
    link
    fedilink
    English
    arrow-up
    1
    ·
    3 days ago

    I don’t use No-Script specifically, but I have not had any issues with the extensions I do use. It’s easy enough to test yourself, though.

  • KelsonV@lemmy.world
    link
    fedilink
    English
    arrow-up
    1
    ·
    18 hours ago

    I’ve only installed a handful, but they’ve all worked fine except for KeePassXC-Browser - and that’s partly q known issue with a workaround and partly Flatpak (which made it hard to apply the workaround)

  • bad_news
    link
    fedilink
    arrow-up
    3
    ·
    3 days ago

    Adding extensions makes you more fingerprintable, which kind of defeats the purpose of Librewolf versus any other Firefox fork.

    • jevans ⁂@lemmy.ml
      link
      fedilink
      English
      arrow-up
      8
      ·
      3 days ago

      Well, I don’t know about OP, but MY purpose for using Librewolf is to have something that is not run by Mozilla and doesn’t call home to Mozilla, has a strong contribution history, exists in nixpkgs, and can be fully configured in Nix Home Manager. Librewolf is the only fork that checks those boxes. The security benefits are just a nice side-effect when they fit with my workflow.

      • bad_news
        link
        fedilink
        arrow-up
        2
        ·
        3 days ago

        I see a lot of posts from ToS refugees here, and I can guarantee you, the vast majority are going to be less happy with Librewolf than whatever the modern equivalent of Iceweasel is.

      • bad_news
        link
        fedilink
        arrow-up
        2
        ·
        3 days ago

        It’s fundamentally built for privacy, and as a result, breaks a bunch of things. It’s really not a great fork for general Firefox users to switch to just to get out of the ToS change.

    • criitz@reddthat.com
      link
      fedilink
      arrow-up
      2
      ·
      edit-2
      3 days ago

      Noob here - How come browser extensions can be used in fingerprinting? Why is the fact that I have an extension shared with servers? Why doesn’t a browser like Libre Wolf refuse to share this? Is it really ingrained in the we browsing process to pass that info back? It seems like it should remain on the client-side. I can see Google sharing it but why can’t LibreWolf decide not to?

      • bad_news
        link
        fedilink
        arrow-up
        3
        ·
        3 days ago

        It’s not 100% the case that EVERY extension will. A completely local extension that doesn’t ever hit the web or change page layout won’t, but how many of those are there? Anything that changes how you view a page will subtly impact what the server sees in your request, or at least CAN see via javascript, which can be used towards fingerprinting – and because everything is so monopolized, anything making a third party call related to the page is potentially resolvable based on IP and timing because like four companies run everything and share an unknown subset of their data on you. Since your data is the new oil, there’s a robust incentive for ad companies to really break out all the stops trying to fingerprint everything about you. It’s not LibreWolf’s fault, it’s just the incentives that exists out there plus how the web works.

        • criitz@reddthat.com
          link
          fedilink
          arrow-up
          3
          ·
          3 days ago

          Got it, so it’s not that the browser passes an extension list to the server, but the server could recognize an extensions impact on the page with local JS or something and then send that info home. Could that in theory be blocked?

          • bad_news
            link
            fedilink
            arrow-up
            3
            ·
            3 days ago

            You could try, but I’ve never heard of a browser that claimed to be able to mitigate fingerprinting with arbitrary extensions. The extension itself could literally be phoning home to Google or anyone else