zlacker

[return to "Firefox has surpassed Chrome on Speedometer"]
1. seba_d+35[view] [source] 2023-07-18 12:34:49
>>akyuu+(OP)
There was a time when Firefox felt a lot slower than Chromium, but for a few years now it's been close enough (even if still somewhat slower) to not bother me, while Firefox clearly offers superior functionality and much better performance under high load. The last time Chromium has felt attractive compared to Firefox was a really long time ago. Glad to see it moving in the right direction still.
◧◩
2. beltsa+Lz[view] [source] 2023-07-18 14:37:38
>>seba_d+35
I switched to Firefox from Chrome years ago because Chrome was slower. Specially, when there were many tabs opened, switching tabs in Chrome were usually prefaced with a blank white screen for about 2 seconds.

I've been staying with Firefox not for the performance (today Chrome loads Google sites like YouTube faster), but mainly for Tree Style Tab extension. I couldn't imagine opening more than a dozen of tabs without it.

◧◩◪
3. dhimes+Qx1[view] [source] 2023-07-18 18:06:51
>>beltsa+Lz
I've stayed (edit: with Firefox) because of (1) containers and (2) password storage. I have to use Chrome for some things, and every now and then it prompts me for a password and refuses to use the auto-fill. Totally torques me off because my passwords are not easy.

But I completely trust Firefox on the password issue, to the point that I let it generate them for me.

◧◩◪◨
4. Firmwa+Bz1[view] [source] 2023-07-18 18:14:36
>>dhimes+Qx1
>But I completely trust Firefox on the password issue, to the point that I let it generate them for me.

Not that I don't trust them but I always recommend using a dedicated PW manager like KeePassXC which is FOSS and has been security audited, plus it gives you full control over where you get to store your PWs and how they're secured and generated.

◧◩◪◨⬒
5. fardo+QI1[view] [source] 2023-07-18 18:54:04
>>Firmwa+Bz1
To be fair, Firefox is also FOSS, contains an integrated password manager with extraordinarily well-integrated browser compatibility, and by opting to use a master password to encrypt or decrypt the store also gives you control over securitization, storage location, and generation.

Not to say that KeePassXC isn’t useful if you want even more fine-grained controls, but it seems like in the

> Use password in browser

Use case, KeePass would actually weaken the security guarantee by adding a second component you need to trust.

◧◩◪◨⬒⬓
6. mcpack+EN1[view] [source] 2023-07-18 19:15:40
>>fardo+QI1
My problem with Firefox's password manager is there doesn't seem to be a way to export/import to/from an encrypted file that I can back up to other places. I can export to an unencrypted text file (and no apparent way to import again), or I can use their sync service (or run my own maybe?), or I can backup the entire firefox profile.

This is what Firefox says when I go to export my logins: "[!] Your paswords will be saved as readable text (e.g., BadP@ssw0rd) so anyone who can open the exported file can view them."

KeePassXC on the other hand gives me a simple encrypted database file that I can copy around to different places for some peace of mind.

◧◩◪◨⬒⬓⬔
7. babel_+PS1[view] [source] 2023-07-18 19:41:45
>>mcpack+EN1
> "[!] Your paswords will be saved as readable text (e.g., BadP@ssw0rd) so anyone who can open the exported file can view them."

That's effectively what almost all of them say when you export your logins (usually as CSV, JSON, or XML), because they export in plain text, because you don't know what the user needs it for, up to and including manual imputation (better than expect a random user to have to learn how to print out a database, or worse submit that database file to some online service to print out).

Users aren't necessarily highly computer literate, we don't want to prevent people from having security, but even if they were they may still have use cases that do not accept such a database (migrating password manager that don't know your previous one, perhaps), so most of them use (unencrypted) plain text and just accept they'll have to leave it in the user's hands, and warn them it's exposed.

We'd absolutely love there to be safe, portable ways to move our data around such that it remains encrypted while migrating, yes, but that's just not something our current crop of software really enables fully these days, unfortunately.

[go to top]