home.social

#browser — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #browser, aggregated by home.social.

  1. “Browsers Treat Big Sites Differently” by Den Odell

    🔗 denodell.com/blog/browsers-tre

    > Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.

    #browser #standards #Chrome #Safari #Firefox

    ⚓️ nicolas-hoizey.com/links/2026/

  2. “Browsers Treat Big Sites Differently” by Den Odell

    🔗 denodell.com/blog/browsers-tre

    > Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.

    #browser #standards #Chrome #Safari #Firefox

    ⚓️ nicolas-hoizey.com/links/2026/

  3. “Browsers Treat Big Sites Differently” by Den Odell

    🔗 denodell.com/blog/browsers-tre

    > Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.

    #browser #standards #Chrome #Safari #Firefox

    ⚓️ nicolas-hoizey.com/links/2026/

  4. “Browsers Treat Big Sites Differently” by Den Odell

    🔗 denodell.com/blog/browsers-tre

    > Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.

    #browser #standards #Chrome #Safari #Firefox

    ⚓️ nicolas-hoizey.com/links/2026/

  5. “Browsers Treat Big Sites Differently” by Den Odell

    🔗 denodell.com/blog/browsers-tre

    > Standards were supposed to eliminate browser-specific code. We dug ourselves out of the IE era, celebrated, and then built exactly the same hole again around a different browser. Only now the browser-specific code lives in the browsers that aren’t dominant, patching over a web built for the one that is.

    #browser #standards #Chrome #Safari #Firefox

    ⚓️ nicolas-hoizey.com/links/2026/

  6. Well, #Firefox 148 was released on 2026-02-24 with their #AI "kill switch". Have you continued to use Firefox? Did you drop #Mozilla some time ago? Feel free to leave a comment plugging your favorite #browser.

  7. Well, #Firefox 148 was released on 2026-02-24 with their #AI "kill switch". Have you continued to use Firefox? Did you drop #Mozilla some time ago? Feel free to leave a comment plugging your favorite #browser.

  8. Well, #Firefox 148 was released on 2026-02-24 with their #AI "kill switch". Have you continued to use Firefox? Did you drop #Mozilla some time ago? Feel free to leave a comment plugging your favorite #browser.

  9. Well, #Firefox 148 was released on 2026-02-24 with their #AI "kill switch". Have you continued to use Firefox? Did you drop #Mozilla some time ago? Feel free to leave a comment plugging your favorite #browser.

  10. Well, #Firefox 148 was released on 2026-02-24 with their #AI "kill switch". Have you continued to use Firefox? Did you drop #Mozilla some time ago? Feel free to leave a comment plugging your favorite #browser.

  11. Please update your Firefox to 150.0.3.

    Details why: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/

    Step-by-step instructions:
    * open your Firefox application
    * choose/click menu "Firefox"
    * choose/click menu item "About Firefox"

    If it says:
     ✓ Firefox is up to date
    then you’re all set.

    If there is a button that says:
    ( Check for updates )
    then click that.

    Or you may see it automatically download an update and see:
    * Downloading update — nn.n of nnn MB
    * Applying update…

    If you see a button that says:
    ( ↻ Restart to Update Firefox )
    then click that!

    Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.

    https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/

    Today’s a good day to get/install OS and browser updates on all your critical devices.

    Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).

    #Mozilla #Firefox #browser #cyberSecurity #cyber #security

  12. Please update your Firefox to 150.0.3.

    Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/

    Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.

    https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/

    Today’s a good day to get/install OS and browser updates on all your critical devices.

    Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).

    #Mozilla #Firefox #browser #cyberSecurity #cyber #security

  13. Please update your Firefox to 150.0.3.

    Details why: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/

    Step-by-step instructions:
    * open your Firefox application
    * choose/click menu "Firefox"
    * choose/click menu item "About Firefox"

    If it says:
     ✓ Firefox is up to date
    then you’re all set.

    If there is a button that says:
    ( Check for updates )
    then click that.

    Or you may see it automatically download an update and see:
    * Downloading update — nn.n of nnn MB
    * Applying update…

    If you see a button that says:
    ( ↻ Restart to Update Firefox )
    then click that!

    Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.

    https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/

    Today’s a good day to get/install OS and browser updates on all your critical devices.

    Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).

    #Mozilla #Firefox #browser #cyberSecurity #cyber #security

  14. Please update your Firefox to 150.0.3.

    Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/

    Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.

    https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/

    Today’s a good day to get/install OS and browser updates on all your critical devices.

    Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).

    #Mozilla #Firefox #browser #cyberSecurity #cyber #security

  15. Please update your Firefox to 150.0.3.

    Details: https://www.mozilla.org/en-US/security/advisories/mfsa2026-45/

    Aside: #pwn2own is TOMORROW and they hit capacity for the first time in their 19-year history.

    https://hackread.com/pwn2own-berlin-2026-hits-capacity-hackers-0-days/

    Today’s a good day to get/install OS and browser updates on all your critical devices.

    Consider turning off wifi on non-critical devices (putting to sleep is no longer enough because many devices still listen to or contact the internet while asleep) until you have had a chance to safely update their software (perhaps after software updates are available in response to pwn2own demos and disclosures).

    #Mozilla #Firefox #browser #cyberSecurity #cyber #security

  16. Reddit nervt Nutzer mit App-Zwang unter iOS

    Wer sich für die iPhone-App des sozialen Netzwerks nicht interessiert, liest per Browser. Doch das ist oft nicht mehr möglich – zumindest in einem Test.

    heise.de/news/Reddit-nervt-Nut

    #Apps #AppStore #Browser #iOS #Mobiles #Reddit #SocialMedia #news

  17. Unmasking a Multi-Stage Loader: AutoIt Abuse Leading to Vidar Stealer Command-and-Control Communication

    A sophisticated multi-stage infection chain was identified through proactive threat hunting, beginning with the execution of MicrosoftToolkit.exe, a commonly abused hack tool. The attack employed file masquerading techniques, renaming a .dot file to .bat format to evade detection. The malware performed process discovery and attempted to terminate security-related processes before extracting payloads using extract32.exe. An AutoIt-compiled executable (Replies.scr) functioned as a loader, processing an external encrypted payload file and establishing command-and-control communication with infrastructure associated with Vidar Stealer. The malware demonstrated advanced anti-analysis capabilities, including debugger detection and instrumentation callback queries. It targeted credentials, browser data, cryptocurrency wallets, and system information. Post-execution cleanup routines deleted artifacts and terminated processes to minimize forensic evidence and evade detection, significantly complicating incident res...

    Pulse ID: 6a01c2382e61b490cfa457e4
    Pulse Link: otx.alienvault.com/pulse/6a01c
    Pulse Author: AlienVault
    Created: 2026-05-11 11:49:12

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Autoit #Browser #CyberSecurity #InfoSec #Malware #Microsoft #Nim #OTX #OpenThreatExchange #RAT #Vidar #bot #cryptocurrency #AlienVault

  18. Needle: Inside a Modular Crypto-Stealing C2 That Left Its Keys in the Malware

    A modular Malware-as-a-Service crypto-stealing platform called Needle has been discovered actively targeting cryptocurrency wallets through two main attack vectors: a browser extension spoofer targeting MetaMask, Phantom, and Trust Wallet, and a Rust-based desktop agent impersonating Exodus, Trezor, and Ledger applications. The campaign compromised 1,932 victims, including 111 browser extension users and 1,821 desktop sessions. The Rust agent embedded its C2 API key without protection, enabling complete enumeration of victims and withdrawal configurations across six blockchains. The operator's EVM hot wallet moved approximately $148 in ETH to cold storage. The panel's React SPA performed authentication entirely client-side, and the same credential used by infected machines could potentially redirect future auto-withdrawals. Infrastructure is hosted on ASN 202412, a known bulletproof hosting provider in Amsterdam.

    Pulse ID: 6a0198399994be750fe044cd
    Pulse Link: otx.alienvault.com/pulse/6a019
    Pulse Author: AlienVault
    Created: 2026-05-11 08:50:01

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #BlockChain #Browser #CyberSecurity #Edge #InfoSec #Mac #Malware #MalwareAsAService #OTX #OpenThreatExchange #RAT #Rust #bot #cryptocurrency #AlienVault

  19. Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...

    Pulse ID: 69fe0ae9bf660196169e557b
    Pulse Link: otx.alienvault.com/pulse/69fe0
    Pulse Author: AlienVault
    Created: 2026-05-08 16:10:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault

  20. Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...

    Pulse ID: 69fe0ae9bf660196169e557b
    Pulse Link: otx.alienvault.com/pulse/69fe0
    Pulse Author: AlienVault
    Created: 2026-05-08 16:10:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault

  21. Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...

    Pulse ID: 69fe0ae9bf660196169e557b
    Pulse Link: otx.alienvault.com/pulse/69fe0
    Pulse Author: AlienVault
    Created: 2026-05-08 16:10:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault

  22. Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...

    Pulse ID: 69fe0ae9bf660196169e557b
    Pulse Link: otx.alienvault.com/pulse/69fe0
    Pulse Author: AlienVault
    Created: 2026-05-08 16:10:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault

  23. Abuse of Cloud-Native Infrastructure in Modern Phishing Campaigns

    An investigation has revealed a structural evolution in phishing operations where threat actors conduct entire campaigns through legitimate, enterprise-trusted cloud infrastructure rather than attacker-controlled systems. Adversaries weaponize platforms employees use daily, including cloud storage, productivity suites, and OAuth authentication endpoints. Attacks originate from legitimate Google or Microsoft systems, passing all authentication checks while linking to whitelisted cloud services. Multi-factor authentication is bypassed without touching passwords, and victim organizations show no anomalous SIEM events at compromise time. Campaigns employ five stages: delivery via provider-owned infrastructure, payload hosting on legitimate cloud storage, execution within browser memory using native APIs, credential theft through legitimate authentication flows, and persistent presence through licensed services. Detection requires behavioral analysis rather than traditional indicators, as attackers operate enti...

    Pulse ID: 69fe0ae9bf660196169e557b
    Pulse Link: otx.alienvault.com/pulse/69fe0
    Pulse Author: AlienVault
    Created: 2026-05-08 16:10:17

    Be advised, this data is unverified and should be considered preliminary. Always do further verification.

    #Browser #Cloud #CyberSecurity #Endpoint #Google #InfoSec #Microsoft #OTX #OpenThreatExchange #Password #Passwords #Phishing #RAT #Rust #Troll #Word #bot #AlienVault

  24. Gegen Verfolgung durch Google Tag Manager

    Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der

    pc-fluesterer.info/wordpress/2

    #Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen

  25. Gegen Verfolgung durch Google Tag Manager

    Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der

    pc-fluesterer.info/wordpress/2

    #Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen

  26. Gegen Verfolgung durch Google Tag Manager

    Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der

    pc-fluesterer.info/wordpress/2

    #Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen

  27. Gegen Verfolgung durch Google Tag Manager

    Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der

    pc-fluesterer.info/wordpress/2

    #Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen

  28. Gegen Verfolgung durch Google Tag Manager

    Das Internet hält unglaublich viele Perlen bereit, man muss sie nur finden! Eine fast vier Jahre alte Perle habe ich kürzlich entdeckt. Sie trägt den Titel (übersetzt) "Wie man den Google Tag Manager vollständig außer Gefecht setzt und warum man das tun sollte". Darin legt der Autor ausführlich dar, mit welchen Tricks* Google arbeitet, um uns beim surfen verfolgen und bespitzeln zu können. Der einzige wirksame Schutz dagegen ist das abschalten von JavaScript (JS), soweit irgend möglich. Den Websites, die ohne JS keinen oder nur einen Teil des Inhalts zeigen, unterstellt der

    pc-fluesterer.info/wordpress/2

    #Empfehlung #Hintergrund #Warnung #Website #bigdata #browser #google #privacy #privatsphre #UnplugGoogle #UnplugTrump #verfolgung #vorbeugen #wissen

  29. Knowing you #browser #fingerprint ...

    source: sinceyouarrived.world/taken

    A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.

    #internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother

  30. Knowing you #browser #fingerprint ...

    source: sinceyouarrived.world/taken

    A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.

    #internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother

  31. Knowing you #browser #fingerprint ...

    source: sinceyouarrived.world/taken

    A web page that tells you what your browser gave away the moment you arrived. No #login, no form, no #permission. Most pages do this. None of them tell you.

    #internet #tracking #software #news #spy #surveillance #web #www #privacy #knowledge #informati#economy on #bigdata #bigtech #anonymity #problem #economy #bigbrother

  32. Researchers found Microsoft Edge loads every saved password into plaintext memory at launch, increasing exposure after session compromise 🔐
    Unlike other Chromium browsers, Edge keeps credentials readable in RAM, raising scraping risks on shared and admin-access systems 🛡️

    🔗 proton.me/business/blog/micros

    #TechNews #Browser #MicrosoftEdge #Microsoft #Edge #Cybersecurity #PasswordManager #Privacy #FOSS #OpenSource #Security #Encryption #Windows #Passwords #DataProtection #Infosec

  33. The #lightweight browser #Midori is back with updates.

    source: astian.org/midori-browser
    #Github: github.com/goastian/midori-des…

    If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.

    I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.

    The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.

    That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.

    #news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
    Midori Browser: light, safe private and awesome web browser

  34. The #lightweight browser #Midori is back with updates.

    source: astian.org/midori-browser
    #Github: github.com/goastian/midori-des…

    If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.

    I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.

    The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.

    That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.

    #news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
    Midori Browser: light, safe private and awesome web browser

  35. The #lightweight browser #Midori is back with updates.

    source: astian.org/midori-browser
    #Github: github.com/goastian/midori-des…

    If you're looking for a lightweight, RAM-efficient #browser for web #surfing, you can finally turn to Midori again. After several years, it is finally receiving updates. The browser is based on the #Mozilla Firefox engine and can therefore also use #Firefox add-ons. Midori is also available for #Android.

    I really liked the #setup dialog for configuring the browser. You can customize the colors and layout of the toolbars however you like.

    The included extras are rather sparse. The #VPN didn't work for me because the #login screen got stuck in an endless loop. I'd also recommend turning off the built-in #adBlocker and using uBlock Origin instead.

    That said, I'm thrilled to have a very lightweight browser again, precisely because it's fast and uses not much RAM.

    #news #software #opensource #foss #floss #download #ublock #internet #online #tool #utility #privacy #ram #desktop #mobile #linux #windows #smartphone #resources #update #web #www #html
    Midori Browser: light, safe private and awesome web browser