-
-
Notifications
You must be signed in to change notification settings - Fork 315
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[REMOVAL] Remove Brave and Librewolf from the browser list #5
Comments
The argument against LibreWolf there sounds a lot like FUD. In fact, the author even states:
The argument is that on first execution LibreWolf downloads uBlock Origin from mozilla's CDN and updates its block lists. While I agree with the author that "all update features needs to be opt-in only", he also argue that a further cons of LibreWolf (that does NOT support automatic updates) is that it could stay behind in security updates, in plain contraddiction. Also, the author suggests to use Firefox instead (with Arkenfox) that does NOT remove Mozilla's telemetry, DRM and does NOT provide all the privacy enhancement provided by LibreWolf. Given that Google still is the default search engine of Firefox, given telemetry and all, I'd argue that it's Firefox that should be removed (or at least clearly marked as very problematic). |
No, there is no contradiction. Keeping the project as a whole up to date with upstream has nothing to do with automatic updates.
That also is not correct. Arkenfox disables Mozilla's telemetry. |
I'm a biased person (I work at Brave), but I still believe it's worth stating that Brave browser consistently rates as one of the best browsers for preventing fingerprinting and remains one of the few browsers who is actively working on new features such as redirect debouncing to actively prevent new tracking based techniques. -1 to Brave being removed here |
Browsers is quite an opinionated topic, especially since there isn't a single browser with all-round perfect privacy and security. Using Firefox, with some tweaks (like arkenfox/user.js) is probably one of the best options, but not the only one. WaterfoxI'm not sure what's up with the link you shared, as none of the points listed about their privacy policy are actually present in their real Privacy Policy. But a genuine concern about Waterfox is their slower updates from upstream. It's up-to-date at the moment, but in the past releases have been a few weeks behind. It's also possible to achieve the same results as Waterfox with ESR and modifying your user.js, but I am aware that not all users will find it that as easy. BraveRegarding removing Brave, I know it's not perfect, and has had some scandals in the past (appending affiliate links to URLs was pretty bad). But with the exception of the "Daily usage ping to Brave" which should be disabled under @iio7 - The link shared above doesn't provide any hard evidence or up-to-date info. If you have any information about anything else that Brave does, which could jeopardies privacy, then please do share. And while we've got @kdenhartog in the thread it could be a good opportunity to get any additional concerns ironed out. I'm also aware Brave's tight integration with crypto is a bit controversial, but I understand the logic behind this, as web3 is the direction the internet is going in. And it can be disabled under LibrewolfI wasn't able to recreate the main argument outlined in your link, using a fresh install, on a clean VM, nothing external was sent by the browser on launch. However their release schedule is a bit hit and miss, they're often very outdated, and again similar results could be achieved with a user.js config. |
@Lissy93 The information on the website regarding Brave is up to date as nothing has changed. Regarding Librewolf, you must have done something wrong, use a tcpdump, you'll see, it will eventually try to access the network which includes Amazon AWS. |
The information is not up-to-date, as the affiliate link thing was years ago now, and was fixed shortly after being raised. And in terms of their other claims, as mentioned above, there's no evidence to back it up.
I am using tcpdump, but am not getting anything at all, except for the expected traffic. Was there any extra steps you did? Could you share the relevant parts of your pcap file? as I am very interested if there are calls to AWS I'm going to discount this article, but I am genuinely interested in arguments for and against the above browsers, so long as they can be backed up with facts. |
Both of the issues have been fixed at this point and so I'm not sure what additional fixes would be needed to address your concerns. As for the final edit it states: "Should Brave really make good on the promise of respecting privacy, it should not do anything on the Internet unless the user has explicitly told it to so". This is built on a false pretense that a browser should be configured only by the user and there should be no defaults set because that's the only way to have the user "explicitly tell it". This is a faulty assumption because it rests on the premise that every user should both be able to and know how to properly configure a complex piece of software like a browser with often times hundreds of configuration parameters. The author states as such in their opinion on Tor where they state "When improperly used, Tor is not secure!" Effectively meaning any good browser must select sane defaults and be used correctly or it will present issues. So in other words this complaint against Brave appears to be built upon shaky foundation and past mistakes. Obviously if you can show evidence of legitimate harm to a user right now there's stronger merits and we'd be happy to address it, but I'm not seeing anything we can actually address at this point other than making a time machine to stop mistakes made in the past. If I had a time machines though I don't think fixing privacy scandals of a browser would be near the top of my priority list for ways to use it 😄 . Furthermore, if we're holding the past record against the list of browsers advocated there I don't think a single one would actually make the list because its a fact of building complex software that sometimes bugs and design mistakes occur and at this point the state of the art today is to just make sure that things are being fixed ASAP. |
That's simply not true. As the article states, which is easily confirmed using a tcpdump, "Brave not only also "phones home" but as soon as you fire up the browser it starts contacting Amazon." This is exactly what is happening.
And what would that "expected traffic" be? All you need to do is to do a tcpdump on your network card, you can even isolate for port 53 for DNS requests, then wait a little after you have started up a clean installation of Brave, and there you have it.
It has all been backed up. This seems to be a complete waste of time. |
The article clearly mentions that those issues have been fixed, but that's not the problem. Brave still phones home and still goes straight to Amazon. |
@Lissy93 stated
This should disable those calls to Amazon who is a service provider for us and is noted as such in our privacy policy. There may be a few others that also may require a few other privacy toggles to be switched off as well (thinking P3A and diagnostic reports will be needed to), but I'd have to look into it further to be certain. So that's why I believed the concerns have been addressed here and I'm not seeing what your additional concern is. Furthermore Firefox is known to phone home telemetry data as well, but you're not advocating for the removal of it. It's also listed in your link as a privacy compromised browser. Is the issue here that the default settings are not how you would have set them and therefore we should throw the baby out with the bathwater? Or is a more constructive compromise here that we should tell users how to configure these browsers like has been done with Firefox? It's worth noting here that when you're trying to ship software to 50+ million people sometimes not everyone is going to be happy with the decisions we make. Ultimately we're doing our best to try and further advocate for privacy and security on the web and are doing so in many different ways, so I don't see why there's such a strong bias against how we're trying to achieve that compared to how Mozilla is doing it? |
Well, no: everybody here can change those settings by themselves. The issue here is that Brave's default settings explicitly violate the human rights recognised (at least) to European citizens by the GDPR. In fact, to send personal data anywhere, the browser should get an explicit and informed OPT-IN consent from the user for each specific data.
A more constructive compromise here is that Brave should ask users' consent for any data transfer not explicitly started by the users. Such consent could be stored on a per-website basis.
In fact, from a privacy point of view, you are doing slightly better than Mozilla, but far worse than, say, LibreWolf.
In fact, LibreWolf is basically a set of patches that disable telemetry and stop undesired and unintended requests at compile time. Also I'd call FUD on @iio7 statement about the project lacking behind the Firefox security updates: as of today, both Firefox and LibreWolf are at 99.0.1.
Actually @Lissy93 your exchange with @iio7 made me realize that we could actually measure how trustworthy are browser's privacy claims. We just need to collect and compare the tcpdump produced by equivalent browser session by several browsers run in isolation. We could build reports showing how much data each browser send, how many host they connect and so on. If you could share your setup, I'd be happy to help and look for help on this sort of public service. |
No, the premise is simply that the USER Agent should only do what the user intend it to do. No user intend to inform Brave about, say, their daily usage of the browser. Otherwise it's not an informed consent but a deceitful grab of data. But even so, even if the user understand the AdTech business and technology deeply enough to give an informed consent, such consent should always be explicit and opt-in. So sane defaults means defaults designed to serve exclusively the user.
If your users cannot configure your software, your software has a huge UX and UI flaw and you should fix it with high priority, not only for the privacy issues, but even for the security issues that a misconfigured browser could pose. |
the unixsheik article about LW (or any browser really) is a complete joke, I'm so tired of breaking it down over and over I will just copy previous replies:
he even updated the article recently but it's even worse now, he still refused to do any research at all. here's the faq entry bt., as for actual privacy measures maybe look at https://privacytests.org/ instead of performing network dumps of things you don't know because you couldn't be bothered reading them up. it's kinda insulting.
I also want to address this: in AF you don't get to disable all outgoing connections, because just like in LW nobody gives a shit about disabling harmless and security related connections. if anything arkenfox has had a very strong stance against spreading bs about outgoing connections (like it happens in this article).
can you please provide any kind of proof? otherwise this is just crap. other than v99 where there were patch issues and the release was delayed by 5 days with regards to upstream, LW is always released within 72hrs, at times even the same day. just check gitlab releases vs firefox releases and see it for yourself. @iio7 stop posting or re-posting FUD, do some proper research and learn about how to evaluate tools. full disclaimer: I'm affiliated with both LW and AF. as I said I'm not here to argue their inclusion/removal (don't care) or to discuss stuff which is already vastly documented, I'm just here to stop FUD from spreading. I don't want anyone to read this issue and think there's truth or logic behind the commentary. edit: while I still sand by my words and I think the article is problematic, after re-reading my post today I want to apologize for the aggressive tone I used in your repo @Lissy93. |
@Lissy93 said, re: Librewolf...
you may have to capture for hours/days/weeks before you see all connections (or search the source code), however i never tested LW @Shamar said, re: the unixshiek article...
i've been reading his stuff for a while and he strikes me as a very smart guy - don't toss out the baby with the bathwater that article was penned in late 2020 - it was updated just a few days ago, but i don't know whether he edited the LW section or re-tested connections his statement "A network dump reveals that the very first time Librewolf is started it immediately contacts the Mozilla add-on CDN" is of course odd given that LW ships with, and clearly states so, uBO, and so it SHOULD be phoning AMO to check for an update - uBO is a key component of LW (actually it's the only component since they're just running scripts on FF release far as i can tell) @kdenhartog said...
agreed - modern browsers are larger then some entire operating systems and i think sometimes folks put a little too much emphasis on "phoning home" - granted there is allot of telemetry and other nefarious and unnecessary traffic happening with Firefox by default (and i'm sure all others), but some of it is absolutely for the benefit of the user and is not a privacy concern and should not be tinkered with - the rest can be effectively dealt with via prefs (and arkenfox makes that easy)
but she does advocate for arkenfox and that is key no modern browser i'm aware of is privacy respecting out of the box, so where do you go from there? you have to pick something and i pick FF - don't get me wrong, i am not a FF fanboy, but Moz provides a high degree of control with prefs and that, combined with arkenfox user.js, makes FF the best browser regarding privacy in my opinion - security? well, that's a different issue |
i perhaps should have mentioned for those that don't know, LibreWolf benefits from the arkenfox user.js project |
Firefox has to tend to a large user-base. A user-base of frequent Google ecosystem users, some use Firefox for privacy. Not all though, the issue with making such a private/secure browser. Is that you have to tend to the entire user-base. Not just those who seek privacy and security features. |
that's where the arkenfox user.js comes in |
Explicit consent that requires opt-in capabilities could mean that at startup every new user would need to explicitly select their choices for At some point, it's reasonable to accept that defaults will be set in order to accept tradeoffs between the extremes of usability (users can't configure anything and everything is handled for them by the developers) and consent (users have to configure everything and nothing is decided by the developer). Especially because it's a full time job to keep up with everything that browsers are changing. So to ask a user to do either one of those extremes seems unreasonable. This is why we have defaults in the first place, but also enable users to change them. All in all, reasonable minds can differ on the same topic. Especially when it comes to incredibly nuanced topics such as privacy on the web and configuring a browser. However, I personally fall on the side that Librewolf and Brave should remain in this list because I think the net gains far outweigh the net losses to users. If others disagree with the outcome of this issue and @Lissy93 decision (whether these options stay or are removed) we always have the option to fork this repo and change it. In any case, it was great to get other people's take on this topic and I enjoyed hearing the differing perspectives of the values that motivates them as users, and presumably also developers since we're on GH by choice, and building software. Thanks for the discussion! |
back to basics... @iio7 justification for wanting to ax LibreWolf and Brave is because "Neither are truly privacy respecting" he/she is correct, if we assume default settings, and i don't think there's an argument there, but the same argument can be made for Firefox or any other modern browser, so the reason for wanting to eliminate LW and Brave specifically falls on its head right there (and i personally have serious concerns with Tor but that's another story) no modern browser is truly privacy respecting out of the box, hence the need for projects like arkenfox ... and LibreWolf |
* Change weather to whether * Remove track ref - Links with referential content may violate privacy. so i removed it * Adds automations to notify if domain expiring * Updates browser extensions, F-Droid, Thunderbird Closes #15 Closes #16 Closes #17 Closes #18 * Adds plaintext accounting tools (#14) * Adds OVPN under VPNs (#12) * Adds Code Hosting under Development (#6) * Typo fixes * Fix my own typo * Couple more typos * Typos * The last typos * Fixes title in amendment issue template * Fixes typo, CalmAV →ClamAV (#31) Fixes #31 * fix very small typo on ScriptSafe extension yo - > to * Adds age under File Encryption (#32) Fixes #32 * Updates contributor SVG * Updates contributors list * Renames master branch to main * feat: add Vikunja * Fixed spelling of Krita and edited VM description Fixed the spelling of Krita. I also edited the description for the Virtual Machine section to say "virtual machine (VM)" instead of just "VM". * Updates contributors list * Updates contributor SVG * Creates action for PDF compilation * Update compile-pdf.yml * Update compile-pdf.yml * Adds git push for pdf * Update compile-pdf.yml * Generate PDF file * Add action to check spelling for PRs * Update spell checker to cover all files * Adds action for easier rebasing of PRs * Move Bromite to Browsers table The table does not include any mobile browsers. Some should probably be included. * Adds Logseq under Digital Notes (#40) Fixes #40 * Move & expand on SearX in Search Engines Mention SearXNG, split out from main mentions * Fix typo (FairMail to FairEmail) Change FairMail to FairEmail * Adds relevent info link to Extensions Adds link to page on arkenfox wiki about extensions * Adds Insular to Mobile Apps Insular is another sandboxing app * Tweak Org Mode section Expands upon and fixes the previous not-too-accurate description * Fix it's vs its * Removed uMatrix from Browser Extensions, as unmaintained uMatrix is [no longer maintained](uBlockOrigin/uMatrix-issues#291 (comment)). * fix links * Add utm * Light works is **not** open source * Adds action to validate issue title * Adds missing blank space after VM --> UTM * Added servers guru * [FIX] typos * Update Ricochet messaging app * Add Prosody, jsxc, xmpp-web to Self-Hosted Svc - Fix "XMP" -> "XMPP" - Remove project Candy, seems dead since 2020: candy-chat/candy#519 * Added photoprism entry in two bonus sections Closes #60 * Changed capitalization Changed the capitalization of the photoprism Bonus #5 entry for consistency * Reverting mistake Deleted a line by mistake, reverted. * Use only issues for ticket-check trigger * Update LocalCDN link - The project has archived their gitlab repository and moved to codeberg.org * Fixes the links in the PR template * Adds action to prevent un-named PRs * Adds SpotiFlyer under Audio * Updates order of checks * Removes title length requirement * Updates pinned version * Adds check for checklist * Automation to label PRs * Applies brackets * Updates conditional * Quoted expression in PR labler * Updates contributors list * Updates contributor SVG * Adds category option to PR template * Automation for Codeberg mirror * Changes base action for codeberg mirror * Inserts link to Codeberg mirror * Updates issue validator * Updates ticket validator automation * Adds check for issue categrory and checklist * Delete .github/workflows/config directory * Delete rebase-pr.yml * Set permissions * Rewrites the pull request validation * Fixes default label ignore * Fixes spelling in comments within PR template * Updates permissions for PR validator * Fixes workflow PR permissions * Adds Betterbird under mail clients (#82) Fixes #82 * Updates contributors list * Generate PDF file * Corrects [Searx URL] Updates Searx Url throughout readme * Updates contributor SVG * Updates contributors list * Generate PDF file * Update README.md Correcting the capitalisation of Bitwarden (as on their website) * Update README.md * Updates contributors list * Updates contributor SVG * Generate PDF file * Various Typo Fixes - Quant -> Qwant - and -> an - Suit -> Suite - fre -> free - ). -> . * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributor SVG * Updates contributors list * Generate PDF file * add Skiff * correct typos * remove pages and drive from mail section * Updates contributors list * Updates contributor SVG * Generate PDF file * Generate PDF file * Replace RainLoop with SnappyMail due to vulnerability * Generate PDF file * Updates contributors list * Generate PDF file * Updates conflict * Updates contributors list * Generate PDF file * Add Vaultwarden to Bitwarden * Replace OTR with XMPP clients with OMEMO * Add Movim for blogging & as XMPP web client * Updates contributors list * Updates contributor SVG * Generate PDF file * Improved information about LibreWolf - Correct spelling - Correct (new) homepage - Clear up how it differs from Firefox * Updates contributors list * Generate PDF file * Updates contributor SVG * Generate PDF file * Updates formatting on credits page * Updates contributing info in credits page * Updates contributors list * Adds link to credits page * Updates contributors list * Generate PDF file * Remove Vanilla Cookie Manager See #116 * Removes andOTP from Google Alternatives * Fixes broken link for NextCloud in Backup & Sync section Fixes link to sync docs in the backup & sync section for NextCloud. * Updates contributors list * Updates contributor SVG * Generate PDF file * Adds Authenticator(BrowserExtension) to Essentials 2-Factor Authentication * Add monerosms.com to virtual phone numbers * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Update Codeberg entry * Updates contributor SVG * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Remove Bibliogram as it is discontinued * Change Libreddit instance to official one * Resolves conflicts * Fixing typo * At Social Networks/Other Notable Mentions added Hubzilla Hubzilla is kind of the successor of Friendica (the original author auf Friendica went on with Hubzilla). Both systems exists together, both support the widest range of social network protocols. * Updates contributors list * Updates contributor SVG * Generate PDF file * Writes an about page * Updates contributors list * Updates contributor SVG * Generate PDF file Co-authored-by: Kieran <[email protected]> Co-authored-by: 0x0102121wqs <[email protected]> Co-authored-by: Alicia Sykes <[email protected]> Co-authored-by: cole <[email protected]> Co-authored-by: liss-bot <[email protected]> Co-authored-by: kolaente <[email protected]> Co-authored-by: NylaTheWolf <[email protected]> Co-authored-by: Lilith <[email protected]> Co-authored-by: Maksim Ploski <[email protected]> Co-authored-by: A-childs-encyclopedia <[email protected]> Co-authored-by: Slade <[email protected]> Co-authored-by: pnxdxt <[email protected]> Co-authored-by: Guillaume <[email protected]> Co-authored-by: kerbless <[email protected]> Co-authored-by: Gusted <[email protected]> Co-authored-by: Wesley-Ryan <[email protected]> Co-authored-by: James Cridland <[email protected]> Co-authored-by: jxhn <[email protected]> Co-authored-by: Andrew Milich <[email protected]> Co-authored-by: alex <[email protected]> Co-authored-by: Alex Ogden <[email protected]> Co-authored-by: Ash Scott <[email protected]> Co-authored-by: mrpavan <[email protected]> Co-authored-by: Kevin F <[email protected]> Co-authored-by: magical-heyrovsky <[email protected]> Co-authored-by: Sam Al-Sapti <[email protected]> Co-authored-by: GhoulBoii <[email protected]> Co-authored-by: Tim Schlotfeldt <[email protected]>
* Change weather to whether * Remove track ref - Links with referential content may violate privacy. so i removed it * Adds automations to notify if domain expiring * Updates browser extensions, F-Droid, Thunderbird Closes #15 Closes #16 Closes #17 Closes #18 * Adds plaintext accounting tools (#14) * Adds OVPN under VPNs (#12) * Adds Code Hosting under Development (#6) * Typo fixes * Fix my own typo * Couple more typos * Typos * The last typos * Fixes title in amendment issue template * Fixes typo, CalmAV →ClamAV (#31) Fixes #31 * fix very small typo on ScriptSafe extension yo - > to * Adds age under File Encryption (#32) Fixes #32 * Updates contributor SVG * Updates contributors list * Renames master branch to main * feat: add Vikunja * Fixed spelling of Krita and edited VM description Fixed the spelling of Krita. I also edited the description for the Virtual Machine section to say "virtual machine (VM)" instead of just "VM". * Updates contributors list * Updates contributor SVG * Creates action for PDF compilation * Update compile-pdf.yml * Update compile-pdf.yml * Adds git push for pdf * Update compile-pdf.yml * Generate PDF file * Add action to check spelling for PRs * Update spell checker to cover all files * Adds action for easier rebasing of PRs * Move Bromite to Browsers table The table does not include any mobile browsers. Some should probably be included. * Adds Logseq under Digital Notes (#40) Fixes #40 * Move & expand on SearX in Search Engines Mention SearXNG, split out from main mentions * Fix typo (FairMail to FairEmail) Change FairMail to FairEmail * Adds relevent info link to Extensions Adds link to page on arkenfox wiki about extensions * Adds Insular to Mobile Apps Insular is another sandboxing app * Tweak Org Mode section Expands upon and fixes the previous not-too-accurate description * Fix it's vs its * Removed uMatrix from Browser Extensions, as unmaintained uMatrix is [no longer maintained](uBlockOrigin/uMatrix-issues#291 (comment)). * fix links * Add utm * Light works is **not** open source * Adds action to validate issue title * Adds missing blank space after VM --> UTM * Added servers guru * [FIX] typos * Update Ricochet messaging app * Add Prosody, jsxc, xmpp-web to Self-Hosted Svc - Fix "XMP" -> "XMPP" - Remove project Candy, seems dead since 2020: candy-chat/candy#519 * Added photoprism entry in two bonus sections Closes #60 * Changed capitalization Changed the capitalization of the photoprism Bonus #5 entry for consistency * Reverting mistake Deleted a line by mistake, reverted. * Use only issues for ticket-check trigger * Update LocalCDN link - The project has archived their gitlab repository and moved to codeberg.org * Fixes the links in the PR template * Adds action to prevent un-named PRs * Adds SpotiFlyer under Audio * Updates order of checks * Removes title length requirement * Updates pinned version * Adds check for checklist * Automation to label PRs * Applies brackets * Updates conditional * Quoted expression in PR labler * Updates contributors list * Updates contributor SVG * Adds category option to PR template * Automation for Codeberg mirror * Changes base action for codeberg mirror * Inserts link to Codeberg mirror * Updates issue validator * Updates ticket validator automation * Adds check for issue categrory and checklist * Delete .github/workflows/config directory * Delete rebase-pr.yml * Set permissions * Rewrites the pull request validation * Fixes default label ignore * Fixes spelling in comments within PR template * Updates permissions for PR validator * Fixes workflow PR permissions * Adds Betterbird under mail clients (#82) Fixes #82 * Updates contributors list * Generate PDF file * Corrects [Searx URL] Updates Searx Url throughout readme * Updates contributor SVG * Updates contributors list * Generate PDF file * Update README.md Correcting the capitalisation of Bitwarden (as on their website) * Update README.md * Updates contributors list * Updates contributor SVG * Generate PDF file * Various Typo Fixes - Quant -> Qwant - and -> an - Suit -> Suite - fre -> free - ). -> . * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributor SVG * Updates contributors list * Generate PDF file * add Skiff * correct typos * remove pages and drive from mail section * Updates contributors list * Updates contributor SVG * Generate PDF file * Generate PDF file * Replace RainLoop with SnappyMail due to vulnerability * Generate PDF file * Updates contributors list * Generate PDF file * Updates conflict * Updates contributors list * Generate PDF file * Add Vaultwarden to Bitwarden * Replace OTR with XMPP clients with OMEMO * Add Movim for blogging & as XMPP web client * Updates contributors list * Updates contributor SVG * Generate PDF file * Improved information about LibreWolf - Correct spelling - Correct (new) homepage - Clear up how it differs from Firefox * Updates contributors list * Generate PDF file * Updates contributor SVG * Generate PDF file * Updates formatting on credits page * Updates contributing info in credits page * Updates contributors list * Adds link to credits page * Updates contributors list * Generate PDF file * Remove Vanilla Cookie Manager See #116 * Removes andOTP from Google Alternatives * Fixes broken link for NextCloud in Backup & Sync section Fixes link to sync docs in the backup & sync section for NextCloud. * Updates contributors list * Updates contributor SVG * Generate PDF file * Adds Authenticator(BrowserExtension) to Essentials 2-Factor Authentication * Add monerosms.com to virtual phone numbers * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Update Codeberg entry * Updates contributor SVG * Updates contributors list * Generate PDF file * Updates contributors list * Generate PDF file * Remove Bibliogram as it is discontinued * Change Libreddit instance to official one * Resolves conflicts * Fixing typo * At Social Networks/Other Notable Mentions added Hubzilla Hubzilla is kind of the successor of Friendica (the original author auf Friendica went on with Hubzilla). Both systems exists together, both support the widest range of social network protocols. * Updates contributors list * Updates contributor SVG * Generate PDF file * Writes an about page * Updates contributors list * Updates contributor SVG * Generate PDF file * Adds Budzet Zen to Budgeting Tools (#149) * Add Budget Zen - End-to-End Encrypted Budget/Expense Manager Full disclosure: I'm the author of [Budget Zen](https://budgetzen.net). Budget Zen 2.0 is end-to-end encrypted via [userbase](https://userbase.com). You can read more about [that announcement here](https://news.onbrn.com/announcing-budget-zen-2.0-end-to-end-encrypted). It's also Open Source (AGPL 3.0), and you can [view the source code in GitHub](https://github.com/BrunoBernardino/budgetzen-web). * Updates BudgetZen Moves to notable mentions until the project is more mature Co-authored-by: Alicia Sykes <[email protected]> * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Generate PDF file * Updates Enigmail information and Removes TorBirdy (#153) * Updates Enigmail entry - removes support for Thunderbird and corrects typo. * Removes TorBirdy - dead project * fix: remove silence (#154) * Syncs contributors from upstream * Updates contributors list * Updates contributor SVG * Generate PDF file * Updates contributors list * Generate PDF file * Put Matrix where it belongs, since it isn't a P2P messenger (#155) * Generate PDF file * Delete SecureDNS (#156) SecureDNS not available after 30 April 2020: https://web.archive.org/web/20200420100210/https://securedns.eu/ * Updates contributors list * Updates contributor SVG * Generate PDF file * Generate PDF file --------- Co-authored-by: Kieran <[email protected]> Co-authored-by: 0x0102121wqs <[email protected]> Co-authored-by: Alicia Sykes <[email protected]> Co-authored-by: cole <[email protected]> Co-authored-by: liss-bot <[email protected]> Co-authored-by: kolaente <[email protected]> Co-authored-by: NylaTheWolf <[email protected]> Co-authored-by: Lilith <[email protected]> Co-authored-by: Maksim Ploski <[email protected]> Co-authored-by: A-childs-encyclopedia <[email protected]> Co-authored-by: Slade <[email protected]> Co-authored-by: pnxdxt <[email protected]> Co-authored-by: Guillaume <[email protected]> Co-authored-by: kerbless <[email protected]> Co-authored-by: Gusted <[email protected]> Co-authored-by: Wesley-Ryan <[email protected]> Co-authored-by: James Cridland <[email protected]> Co-authored-by: jxhn <[email protected]> Co-authored-by: Andrew Milich <[email protected]> Co-authored-by: alex <[email protected]> Co-authored-by: Alex Ogden <[email protected]> Co-authored-by: Ash Scott <[email protected]> Co-authored-by: mrpavan <[email protected]> Co-authored-by: Kevin F <[email protected]> Co-authored-by: magical-heyrovsky <[email protected]> Co-authored-by: Sam Al-Sapti <[email protected]> Co-authored-by: GhoulBoii <[email protected]> Co-authored-by: Tim Schlotfeldt <[email protected]> Co-authored-by: Bruno Bernardino <[email protected]> Co-authored-by: Zhymabek Roman <[email protected]>
There's been some good discussions here. For now, let's close this - as there aren't any serious privacy concerns regarding Brave (which are resolved in other browsers). But if anything changes, please do comment and I shall re-open. |
State which point should be edited or removed. Put "Remove/ Edit ____" as Title
Remove Librewolf and Brave browser from the list.
Justification
Neither are truly privacy respecting. Please see: https://www.unixsheikh.com/articles/choose-your-browser-carefully.html
The text was updated successfully, but these errors were encountered: