Why tho? How tight should my foilhat be about this, why would it suddenly need this permission?

Why tho? How tight should my foilhat be about this, why would it suddenly need this permission?

Attached: https.png (389x197, 8K)

Other urls found in this thread:

twitter.com/HTTPSEverywhere/status/1032775461972074496
github.com/EFForg/https-everywhere/issues/16377#issuecomment-415492846
example.com
example.com
warosu.org/g/thread/S67378462#p67379624
twitter.com/NSFWRedditGif

It always needed this permission.

twitter.com/HTTPSEverywhere/status/1032775461972074496

this
/thread

this piece of shit uses more ram than 4 youtube tabs

Serious and perhaps stupid question: Why is this shit so resource intensive? What more does it need to do other than to add an 's' to each request?

Look at OP pic, retard. It is a recent update(this week)

Try Smart HTTPS, it does just that.
HTTPS Everywhere uses an actual list of known websites that work with https.

No it fucking didn't, I saw this too.

Attached: IMG_20180831_073650.jpg (1440x1148, 81K)

Because it maintains and parses an actual list of HTTPS websites. It's actual honest-to-god awful programming.

What are the essential safety add-ons to use? All I have is HTTPS Everywhere and Ublock Origin

It always needed this permission, to rewrite HTTP links on the page to HTTPS. So does every similar extension.

HTTPS Everywhere recently added FTP support, which triggered this warning because Firefox confusingly includes FTP servers in their definition of "All websites'. One of the devs discusses it here:
>github.com/EFForg/https-everywhere/issues/16377#issuecomment-415492846

Those two are essential. I'm also a fan of Decentraleyes and Multi-Account Containers. There's also one that blocks canvas fingerprinting, if I remember correctly.

containers are a part of ff itself, temporary containers are the real thing

is it too hard to press letter s?

why are you using that dumb thing? smart https is much better

It's always needed the permission, it was a bug that caused that dialog window to pop up.

No it doesn't lol

smart https is useless, anyone can MITM you by blocking the https request

Firefox has no GUI to manage containers out of the box. That's what Multi-Account Containers does.

I can see the use case for temporary containers, but I just use private browsing for that. I use containers to separate the login cookies of my different identities.

What? And you can use whitelists or blacklists. More options that https everywhere doesnt give you.

µMatrix as well

private browsing doesn't isolate everything per domain

>visit example.com
>smart https requests example.com
>mitm hacker guy blocks your request
>smart https downgrades connection to example.com because it thinks example.com doesn't support https
>mitm hacker guy can now read your data

now you could add example.com to the blacklist (which as far as i understand forces https and prevents connection downgrading). but you would have to do that for every site that supports https. guess what https everywhere does? it maintains that list for you. and it does more than just appending https, e.g. if example.com is only accessible via https by going to secure.example.com, it will rewrite your requests.

You're retarded. This isn't even an issue if you know what you're doing. It's most likely not an issue if you don't even know what you're doing.
And smart https always forces https so your last point is not an advantage.
Using a list is retarded. You trust they will add every domain and new domain for sites people visit?

if it always forces https it will break every website that doesn't support https. you are retarded.

Are you pretending to be retarded? Try learning how it works before commenting nonsense.

i already explained how it works and how it is susceptible to downgrade attacks in

This is true for any connection that isnt encrypted. The same could happen with https everywhere. Https would actually be more susceptible because it has a limited number of sites to force https.

*https everywhere would be more susceptible

a connection that isn't encrypted doesn't need to be downgraded to be spied on since everything is in plain text already.
i don't think you understand what a downgrade attack is.

unlike smart https, https everywhere won't switch to http if a site doesn't respond via https.

>unlike smart https, https everywhere won't switch to http if a site doesn't respond via https.
So it wont connect to the site at all without any option to allow it? Also see upgrade-insecure-requests. This will block http requests and only allow https if enabled.

Attached: SmartHTTPS.png (2142x1833, 401K)

> So it wont connect to the site at all without any option to allow it?

it will not connect to a site that is known to support https (that is a site that is in https everywhere's rule list). instead you will get an error. it won't silently fall back to http. of course you can disable the rule for the site in question if you know what you are doing.

upgrade-insecure-requests tells the browser to load all content on the site using https, even it is referenced with http. this is mainly useful if a site operator activated encrypted on a site but rewriting all content references to use https would be to much of a hassle. it will get rid of mix content warnings in browsers, but it won't help with the initial request.

smart https > https everywhere

thank you for this valuable input

Agreed

smart https sucks and is laggy af

Why does s/http/https/g need these permissions? And why does it waste so much RAM? Are there extensions that do only this and nothing more?

PEBKAC
warosu.org/g/thread/S67378462#p67379624

Does this even matter? Aren't both FF and chrome going to soon be defaulting to https?