#browser — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #browser, aggregated by home.social.
-
“Browsers Treat Big Sites Differently” by Den Odell
🔗 https://denodell.com/blog/browsers-treat-big-sites-differently
> Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.
#browser #standards #Chrome #Safari #Firefox
⚓️ https://nicolas-hoizey.com/links/2026/05/14/browsers-treat-big-sites-differently/
-
“Browsers Treat Big Sites Differently” by Den Odell
🔗 https://denodell.com/blog/browsers-treat-big-sites-differently
> Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.
#browser #standards #Chrome #Safari #Firefox
⚓️ https://nicolas-hoizey.com/links/2026/05/14/browsers-treat-big-sites-differently/
-
“Browsers Treat Big Sites Differently” by Den Odell
🔗 https://denodell.com/blog/browsers-treat-big-sites-differently
> Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.
#browser #standards #Chrome #Safari #Firefox
⚓️ https://nicolas-hoizey.com/links/2026/05/14/browsers-treat-big-sites-differently/
-
“Browsers Treat Big Sites Differently” by Den Odell
🔗 https://denodell.com/blog/browsers-treat-big-sites-differently
> Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.
#browser #standards #Chrome #Safari #Firefox
⚓️ https://nicolas-hoizey.com/links/2026/05/14/browsers-treat-big-sites-differently/
-
“Browsers Treat Big Sites Differently” by Den Odell
🔗 https://denodell.com/blog/browsers-treat-big-sites-differently
> Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.
#browser #standards #Chrome #Safari #Firefox
⚓️ https://nicolas-hoizey.com/links/2026/05/14/browsers-treat-big-sites-differently/
-
Chrome: Wie privat ist die lokale KI in Googles Browser? | heise online
https://heise.de/-11290687 #Webbrowser #Browser #Chrome #KI -
Please update your Firefox to 150.0.3.
Details why: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/
Step-by-step instructions:
* open your Firefox application
* choose/click menu "Firefox"
* choose/click menu item "About Firefox"
If it says:
✓ Firefox is up to date
then you’re all set.
If there is a button that says:
( Check for updates )
then click that.
Or you may see it automatically download an update and see:
* Downloading update — nn.n of nnn MB
* Applying update…
If you see a button that says:
( ↻ Restart to Update Firefox )
then click that!
Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.
https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
Today’s a good day to get/install OS and browser updates on all your critical devices.
Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).
#Mozilla #Firefox #browser #cyberSecurity #cyber #security -
Please update your Firefox to 150.0.3.
Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/
Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.
https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
Today’s a good day to get/install OS and browser updates on all your critical devices.
Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).
#Mozilla #Firefox #browser #cyberSecurity #cyber #security -
Please update your Firefox to 150.0.3.
Details why: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/
Step-by-step instructions:
* open your Firefox application
* choose/click menu "Firefox"
* choose/click menu item "About Firefox"
If it says:
✓ Firefox is up to date
then you’re all set.
If there is a button that says:
( Check for updates )
then click that.
Or you may see it automatically download an update and see:
* Downloading update — nn.n of nnn MB
* Applying update…
If you see a button that says:
( ↻ Restart to Update Firefox )
then click that!
Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.
https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
Today’s a good day to get/install OS and browser updates on all your critical devices.
Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).
#Mozilla #Firefox #browser #cyberSecurity #cyber #security -
Please update your Firefox to 150.0.3.
Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/
Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.
https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
Today’s a good day to get/install OS and browser updates on all your critical devices.
Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).
#Mozilla #Firefox #browser #cyberSecurity #cyber #security -
Please update your Firefox to 150.0.3.
Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/
Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.
https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/
Today’s a good day to get/install OS and browser updates on all your critical devices.
Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).
#Mozilla #Firefox #browser #cyberSecurity #cyber #security -
I think #IronFox is the best #browser for #Android - change my mind 😀
gitlab: gitlab.com/ironfox-oss/IronFox
github: github.com/ironfox-oss/IronFox
Import into your #FDroid client directly by tapping this link: F-Droid repository of IronFox (click to add)#mozilla #firefox #internet #news #software #cybersecurity #surfing #web #www #smartphone #security #tracking #foss #floss #opensource #freedom #mobile #install #repository
-
I think #IronFox is the best #browser for #Android - change my mind 😀
gitlab: gitlab.com/ironfox-oss/IronFox
github: github.com/ironfox-oss/IronFox
Import into your #FDroid client directly by tapping this link: F-Droid repository of IronFox (click to add)#mozilla #firefox #internet #news #software #cybersecurity #surfing #web #www #smartphone #security #tracking #foss #floss #opensource #freedom #mobile #install #repository
-
I think #IronFox is the best #browser for #Android - change my mind 😀
gitlab: gitlab.com/ironfox-oss/IronFox
github: github.com/ironfox-oss/IronFox
Import into your #FDroid client directly by tapping this link: F-Droid repository of IronFox (click to add)#mozilla #firefox #internet #news #software #cybersecurity #surfing #web #www #smartphone #security #tracking #foss #floss #opensource #freedom #mobile #install #repository
-
Norton Neo integriert Sicherheitsfunktionen in KI-Browser
-
Opera lança opera-browser-cli para permitir o controlo do navegador via terminal
🔗 https://tugatech.com.pt/t83397-opera-lanca-opera-browser-cli-para-permitir-o-controlo-do-navegador-via-terminal -
How Microsoft Edge Exposes All Your Passwords 🎙️ Subscribe to the podcast: thisweekinprivacy.net #Microsoft #Edge #cybersecurity #browser #MicrosoftEdge
-
SQLite WASM with OPFS: Database in the Browser
https://medium.com/@ockert8080/sqlite-wasm-with-opfs-database-in-the-browser-dc0808159226
-
heise+ | Privater Wissenssammler: Karakeep erschließt Bookmarks und Dateien per KI
Karakeep archiviert Webseiten, PDFs und Videos auf dem eigenen Server. Er lässt sich gut in eigene Workflows einbauen.
#Automatisierung #Browser #Claude #Datenschutz #Docker #IT #OpenSource #PDF #news
-
#Development #Releases
WebKit features for Safari 26.5 · “The biggest May release of WebKit yet.” https://ilo.im/16curb_____
#Safari #Browser #WebKit #APIs #WebDev #Frontend #SVG #HTML #CSS #JavaScript -
#Development #Releases
WebKit features for Safari 26.5 · “The biggest May release of WebKit yet.” https://ilo.im/16curb_____
#Safari #Browser #WebKit #APIs #WebDev #Frontend #SVG #HTML #CSS #JavaScript -
#Development #Releases
WebKit features for Safari 26.5 · “The biggest May release of WebKit yet.” https://ilo.im/16curb_____
#Safari #Browser #WebKit #APIs #WebDev #Frontend #SVG #HTML #CSS #JavaScript -
#Development #Releases
WebKit features for Safari 26.5 · “The biggest May release of WebKit yet.” https://ilo.im/16curb_____
#Safari #Browser #WebKit #APIs #WebDev #Frontend #SVG #HTML #CSS #JavaScript -
Unmasking a Multi-Stage Loader: AutoIt Abuse Leading to Vidar Stealer Command-and-Control Communication
A sophisticated multi-stage infection chain was identified through proactive threat hunting, beginning with the execution of MicrosoftToolkit.exe, a commonly abused hack tool. The attack employed file masquerading techniques, renaming a .dot file to .bat format to evade detection. The malware performed process discovery and attempted to terminate security-related processes before extracting payloads using extract32.exe. An AutoIt-compiled executable (Replies.scr) functioned as a loader, processing an external encrypted payload file and establishing command-and-control communication with infrastructure associated with Vidar Stealer. The malware demonstrated advanced anti-analysis capabilities, including debugger detection and instrumentation callback queries. It targeted credentials, browser data, cryptocurrency wallets, and system information. Post-execution cleanup routines deleted artifacts and terminated processes to minimize forensic evidence and evade detection, significantly complicating incident res...
Pulse ID: 6a01c2382e61b490cfa457e4
Pulse Link: https://otx.alienvault.com/pulse/6a01c2382e61b490cfa457e4
Pulse Author: AlienVault
Created: 2026-05-11 11:49:12Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Autoit #Browser #CyberSecurity #InfoSec #Malware #Microsoft #Nim #OTX #OpenThreatExchange #RAT #Vidar #bot #cryptocurrency #AlienVault
-
Needle: Inside a Modular Crypto-Stealing C2 That Left Its Keys in the Malware
A modular Malware-as-a-Service crypto-stealing platform called Needle has been discovered actively targeting cryptocurrency wallets through two main attack vectors: a browser extension spoofer targeting MetaMask, Phantom, and Trust Wallet, and a Rust-based desktop agent impersonating Exodus, Trezor, and Ledger applications. The campaign compromised 1,932 victims, including 111 browser extension users and 1,821 desktop sessions. The Rust agent embedded its C2 API key without protection, enabling complete enumeration of victims and withdrawal configurations across six blockchains. The operator's EVM hot wallet moved approximately $148 in ETH to cold storage. The panel's React SPA performed authentication entirely client-side, and the same credential used by infected machines could potentially redirect future auto-withdrawals. Infrastructure is hosted on ASN 202412, a known bulletproof hosting provider in Amsterdam.
Pulse ID: 6a0198399994be750fe044cd
Pulse Link: https://otx.alienvault.com/pulse/6a0198399994be750fe044cd
Pulse Author: AlienVault
Created: 2026-05-11 08:50:01Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BlockChain #Browser #CyberSecurity #Edge #InfoSec #Mac #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #Rust #bot #cryptocurrency #AlienVault
-
Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns
An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...
Pulse ID: 69fe0ae9bf660196169e557b
Pulse Link: https://otx.alienvault.com/pulse/69fe0ae9bf660196169e557b
Pulse Author: AlienVault
Created: 2026-05-08 16:10:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault
-
Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns
An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...
Pulse ID: 69fe0ae9bf660196169e557b
Pulse Link: https://otx.alienvault.com/pulse/69fe0ae9bf660196169e557b
Pulse Author: AlienVault
Created: 2026-05-08 16:10:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault
-
Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns
An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...
Pulse ID: 69fe0ae9bf660196169e557b
Pulse Link: https://otx.alienvault.com/pulse/69fe0ae9bf660196169e557b
Pulse Author: AlienVault
Created: 2026-05-08 16:10:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault
-
Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns
An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...
Pulse ID: 69fe0ae9bf660196169e557b
Pulse Link: https://otx.alienvault.com/pulse/69fe0ae9bf660196169e557b
Pulse Author: AlienVault
Created: 2026-05-08 16:10:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault
-
Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns
An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...
Pulse ID: 69fe0ae9bf660196169e557b
Pulse Link: https://otx.alienvault.com/pulse/69fe0ae9bf660196169e557b
Pulse Author: AlienVault
Created: 2026-05-08 16:10:17Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault
-
Gegen Verfolgung durch Google Tag Manager
Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der
https://www.pc-fluesterer.info/wordpress/2026/05/11/gegen-verfolgung-durch-google-tag-manager/
#Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen
-
Gegen Verfolgung durch Google Tag Manager
Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der
https://www.pc-fluesterer.info/wordpress/2026/05/11/gegen-verfolgung-durch-google-tag-manager/
#Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen
-
Gegen Verfolgung durch Google Tag Manager
Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der
https://www.pc-fluesterer.info/wordpress/2026/05/11/gegen-verfolgung-durch-google-tag-manager/
#Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen
-
Gegen Verfolgung durch Google Tag Manager
Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der
https://www.pc-fluesterer.info/wordpress/2026/05/11/gegen-verfolgung-durch-google-tag-manager/
#Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen
-
Gegen Verfolgung durch Google Tag Manager
Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der
https://www.pc-fluesterer.info/wordpress/2026/05/11/gegen-verfolgung-durch-google-tag-manager/
#Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen
-
Knowing you #browser #fingerprint ...
source: sinceyouarrived.world/taken
A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.
#internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother
-
Knowing you #browser #fingerprint ...
source: sinceyouarrived.world/taken
A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.
#internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother
-
Knowing you #browser #fingerprint ...
source: sinceyouarrived.world/taken
A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.
#internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother
-
Researchers found Microsoft Edge loads every saved password into plaintext memory at launch, increasing exposure after session compromise 🔐
Unlike other Chromium browsers, Edge keeps credentials readable in RAM, raising scraping risks on shared and admin-access systems 🛡️🔗 https://proton.me/business/blog/microsoft-edge-passwords-exposed
#TechNews #Browser #MicrosoftEdge #Microsoft #Edge #Cybersecurity #PasswordManager #Privacy #FOSS #OpenSource #Security #Encryption #Windows #Passwords #DataProtection #Infosec
-
The #lightweight browser #Midori is back with updates.
source: astian.org/midori-browser
#Github: github.com/goastian/midori-des…If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.
I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.
The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.
That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.
#news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
Midori Browser: light, safe private and awesome web browser -
The #lightweight browser #Midori is back with updates.
source: astian.org/midori-browser
#Github: github.com/goastian/midori-des…If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.
I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.
The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.
That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.
#news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
Midori Browser: light, safe private and awesome web browser -
The #lightweight browser #Midori is back with updates.
source: astian.org/midori-browser
#Github: github.com/goastian/midori-des…If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.
I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.
The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.
That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.
#news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
Midori Browser: light, safe private and awesome web browser -
Are you sure?
I believe Firedragon has had its own sync for almost two years now.
https://firedragon.garudalinux.org/syncing