We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Updated Frequently Asked Questions (markdown)
Clarify how to exclude programs, so users do not need to read the source code
disclaimer: wording
Updated X11 Guide (markdown)
Expand on mitigating potential security issues with abstract unix sockets.
FAQ: stress why there's a need to create service file overrides
edit FAQ entree on how to sandbox apps started via systemd --user or D-Bus
fix FAQ uri-fragment
Add instructions to create systemd D-Bus services overrides
Reference firecfg.d implementation
Refer to firecfg.d as the preferred way to create firecfg overrides
Add oom
Add restrict-namespaces
Mention that the nvidia + noroot/nogroups issue was fixed On firejail 0.9.68.
FAQ: Move nvidia 3D acceleration issue to Troubleshooting.md
Troubleshooting.md: create section for historical problems And move the device access issue section into it.
Troubleshooting.md: fix TOC link This amends commit 5db3c60 ("Rework", 2021-09-12).
Troubleshooting.md: mention release on device access issue
Remove noprofile.profile gist; noprofile.profile is now part of firejail
Troubleshooting: mention fixes for device access issue
Troubleshooting: fix default allowed groups The "audio" and "video" groups are not always kept anymore since the following pull request: https://github.com/netblue30/firejail/pull/4725
Fix grammar
Add notes re. AppArmor and SELinux
Update kyst repo
Add orjail — a more secure way to force programs to exclusively use tor network
rephrase performance statement to clarify
Create _Sidebar
Fix formating
typo