Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disabled block_mozAddonManager, very outdated #1752

Closed

Conversation

trytomakeyouprivate
Copy link

All the linked issues are fixed since v60.0 (!)

It is intentional that Addons cannot run on AMO, to avoid addons injecting malicious .xpi downloads and tricking users into installing ANYTHING.

I am wondering if there are more of these extremely outdated settings...

All the linked issues are fixed since v60.0 (!)

It is intentional that Addons cannot run on AMO, to avoid addons injecting malicious .xpi downloads and tricking users into installing ANYTHING.

I am wondering if there are more of these extremely outdated settings...
@Thorin-Oakenpants
Copy link
Contributor

All the linked issues are fixed since v60.0 (!)

That's not how it works. The links are to provide documentation - their state doesn't matter, and what they do could be "good" OR "bad"

It is intentional

Of course it is, it's one of the bugzillas linked. Do you think I just link random bugzillas and don't read them?

I am wondering if there are more of these extremely outdated settings...

Did you read the user.js?

  • 4502 (which was added for Tor Browser and I was there!!) in arkenfox is active
    • ^ it requires 2662 which is inactive
      -^ Do you really think I would compromise security by default?

Do you really think the pref is outdated? Hint - it is NOT, it still works exactly as expected

@trytomakeyouprivate
Copy link
Author

trytomakeyouprivate commented Nov 3, 2023

To make sure I understood this right, "blockmozaddonmanager" allows addons to access mozillas protected websites like AMO, right?

There are two reasons here, pro (Mozilla is a horrible tracking company) and contra (Some random addon could manipulate links and install malicious ones).

This has to be evaluated, there is no clear yes or no? I would say security is most important, and this is a basic protection mechanism. But others may say "dont install any addons apart from xyz" which could also be "the Arkenfox way". But its not simple, and for sure needs some clearer documentation instead of, again, enumerating some bugzilla reports that vary

@iam-py-test
Copy link

As I understand it (and I could be wrong), this does not give extensions access to the AMO, it just blocks the AMO from access certain APIs.
Thanks

@Thorin-Oakenpants
Copy link
Contributor

Mozilla is a horrible tracking company

bullshit - they are not in the tracking business - getting whatever analytics (engagement/usage) for their own platform(s) e.g. AMO is not fucking tracking

"blockmozaddonmanager" allows addons to access mozillas protected websites

no it does not - read what I already said, read the user.js. it requires ANOTHER pref

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants