Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mozilla & Cloudflare #533

Open
kradan opened this issue Aug 6, 2018 · 1 comment
Open

Mozilla & Cloudflare #533

kradan opened this issue Aug 6, 2018 · 1 comment

Comments

@kradan
Copy link
Contributor

kradan commented Aug 6, 2018

Document why Mozilla's's latest tracking features DNS over HTTPs (DoH) and Trusted Recursive Resolver(TRR) are dangerous and how to disable them:

Enter about:config in the address bar
Search for network.trr
Set network.trr.mode = 5 to completely disable it

Details: usejournal, hackernews

@wh1t3fang
Copy link

DNS over HTTPS is not the problem. Mozilla was running a limited study to test DNS over HTTPS and Trusted Recursive Resolver. Some people may be concerned about TRR using Cloudflare but you have to remember that this is a limited study that you have to opt into. Plus you would have to be using a beta version of Firefox to even be offered this study in the first place.
Riseup already has a recommendation that you should use Tor browser if you want to protect yourself. The thing is Firefox already has tons of ways that data leaks out that the Tor Browser team has worked very hard to patch. :) If you want to prevent someone easily being able to fingerprint you, you should use the Tor browser as it has several changes from the main Firefox upstream code.
Thanks for contributing :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants