Language Selection

English French German Italian Portuguese Spanish

Gizmoz

Syndicate content
Embedded Linux news & devices
Updated: 22 min 54 sec ago

Apollo Lake industrial mini-PC supports Linux

Friday 31st of July 2020 03:32:56 PM
Vecow’s Linux-ready, -40 to 75°C tolerant “SPC-4010C” industrial mini-PC is built around a dual-core Apollo Lake SoC with up to 8GB RAM, 2x GbE, SATA, HDMI, 4x USB, and 2x mini-PCIe with SIM card and mSATA. Vecow announced a minor revision to its Apollo Lake based SPC-4010 mini-PC called the SPC-4010C. If you already know […]

Ubuntu-driven Coffee Lake AI system features Myriad X, FPGA, and PoE add-ons

Thursday 30th of July 2020 07:22:21 PM
IEI’s “FLEX AIoT Dev. Kit” runs Ubuntu on a 8th or 9th Gen Coffee Lake with 2x GbE, 2x HDMI, 4x SATA, 3x M.2, PCIe x4, and 2x PCIe x8 slots with optional Mustang cards with Myriad X VPUs and more. IEI Integration has launched high-end edge AI computer that runs a “pre-validated” Ubuntu 18.04 […]

Kontron debuts hardened OpenWrt stack on new rolling stock computer

Thursday 30th of July 2020 03:07:02 PM
Kontron’s fanless EN50155-certified “SR-TRACe-G40x” railway server and router runs a hardened, new hypervisor based on OpenWrt called SEC-Line on a Skylake or Apollo Lake CPU and offers 2x SATA, 2x GbE, LTE, WiFi, and GNSS. Kontron unveiled an “edge data processing router/server gateway” for the rail industry based on 6th Gen Core or Apollo Lake […]

The Future of Linux Security: Securing Linux-Based Systems in 4 Steps

Thursday 30th of July 2020 03:01:10 PM
(Circuit Cellar article)The intricacies of maintaining today’s Linux-based platforms make it very challenging for developers to cover every potential entry point. In 2019 there was an average of more than 45 Common Vulnerabilities and Exposures (CVEs) logged per day. How does a development organization keep up with that?

15-inch touch panel PC builds on Raspberry Pi CM3

Wednesday 29th of July 2020 08:58:40 PM
Comfile’s 15-inch “ComfilePi CPi-A150WR” touch-panel computer is built around a Raspberry Pi Compute Module 3 and offers an IP65 protected, 1024 x 768 resistive touchscreen pus USB, LAN, serial, and 22x GPIO. Comfile Technology has added to its line of ComfilePi touch panel computers built around the Raspberry Pi Compute Module 3 (CM3). The new […]

Carrier board duo support Toradex’s Verdin modules

Wednesday 29th of July 2020 07:35:07 PM
Linear Computing has posted specs for two carrier boards with optional enclosures that support Toradex’s Linux-driven i.MX8M Mini and Nano based Verdin modules: a general purpose “VSC-4436” and a “VBB-4449” DAQ controller. While reporting this week on Toradex’s Dahlia carrier board for its Verdin modules, we saw that Ontario-based Linear Computing, Inc. (LCI) had posted […]

UP Xtreme Lite SBC offers more affordable Whiskey Lake option

Wednesday 29th of July 2020 03:56:44 PM
[Updated: July 31] — Aaeon announced a slightly scaled down “UP Xtreme Lite” variant of its 8th Gen U-series based UP Xtreme SBC that provides up to 16GB DDR4, 2x GbE, 4x USB 3.2 Gen2, and 3x M.2 plus SATA, HDMI, DP, and 40-pin GPIO. Aaeon announced a Linux-ready UP Xtreme Lite version of its […]

Stackable Raspberry Pi HAT provides up to 64 Resistance Temperature Detectors

Tuesday 28th of July 2020 10:27:24 PM
Sequent Microsystems is Kickstartering a stackable, $30 and up “Mega-RTD” HAT that supports up to 64 Resistance Temperature Detector (RTD) channels for precise temperature measurements. Resistance Temperature Detector (RTD) sensors, which are used for highly precise temperature measurements in industrial and laboratory systems, can be found on embedded systems such as Advantech’s WISE-710 IoT gateway […]

$149 Nano-ITX carrier extends Verdin SoMs including upcoming i.MX8M Plus module

Tuesday 28th of July 2020 04:26:13 PM
Toradex has launched an open-spec “Dahlia” carrier for its i.MX8M Mini and Nano based Verdin modules with GbE, 2x USB 3.0, 3x USB Type-C, MIPI-CSI, DSI-based HDMI, and mini-PCIe. Toradex also revealed a Verdin module with the NPU-enabled i.MX8M Plus. When Toradex announced a new family of Linux-driven, i.MX8M driven Verdin compute modules at Embedded […]

Embedded Vision Systems Adopt AI and IoT Tech

Tuesday 28th of July 2020 02:41:39 PM
(Circuit Cellar article) As vision systems evolve, they’re leveraging all the latest technology trends in embedded computing. Box-level system solutions are keeping pace with AI-level processing, IoT functionality and advanced camera connectivity.

M.2 card and Raspberry Pi based gateway deliver Real-Time Ethernet

Monday 27th of July 2020 08:34:53 PM
Hilscher unveiled a “cifX M.2” card that brings Real-Time Ethernet and FieldBus to PC based systems. The company also released its previously tipped, Raspberry Pi based netPI Real-Time Ethernet gateway for $445. Hilscher has launched a cifX M.2 expansion card equipped with its netX 90 Real-Time Ethernet controller. It has also begun shipping a netPI […]

Dual-display version of RK3399-based Rock Pi 4 starts at $59

Monday 27th of July 2020 04:07:51 PM
Radxa’s “Rock Pi 4 Model C” SBC starts at $59 with a Debian-driven RK3399, 4GB RAM, and NVMe and dual-display support. Radxa is also offering some free beta samples of its Intel-based Rock Pi X. Last October, Radxa unveiled its Rock Pi 4 Model C variant of its similarly Rockchip RK3399 based Rock Pi 4 […]

Robotics controller runs Ubuntu on AGX Xavier

Friday 24th of July 2020 03:46:17 PM
Adlink’s rugged “ROScube-X” robotics controller runs Ubuntu, ROS 2, Adlink’s Neuron SDK, and AWS RoboMaker on a Jetson AGX Xavier with 2x GbE, 5x USB 3.1, 2x M.2, and optional PCIe, CAN, LTE, and time-sync’d GMSL2 camera I/O. In May, Adlink announced support for Nvidia’s “Nvidia EGX” AI edge solution on four new edge servers […]

Whiskey Lake panel PCs feature Linux-based HMI tookit

Thursday 23rd of July 2020 08:09:31 PM
Kontron’s rugged, 10.1- to 23.8-inch “FlatClient Panel PCs” have been upgraded with 8th Gen UE-series processors, an isolated power supply, and an optional, Linux-based QIWI toolkit for HMI displays. Kontron announced an update to its FlatClient Panel PCs that adds the option of an Intel 8th Gen Whiskey Lake CPU. The announcement links to a […]

SiFive speeds up RISC-V cores as Codasip releases first Linux-ready IP

Thursday 23rd of July 2020 04:32:43 PM
[Updated: July 24] — SiFive has upgraded its RISC-V Core IP, including its Linux-enabled U5- and U7-series CPUs, with a “20G1” release that boosts performance and reduces power. Meanwhile, Codasip unveiled a Linux-ready “Bk7” RISC-V core. RISC-V industry leader SiFive had updated is RISC-V designs for higher performance, lower power consumption, and reduced size with […]

Machine vision camera offers choice of Jetson TX2 or Xavier NX

Wednesday 22nd of July 2020 03:31:00 PM
Adlink’s semi-rugged “NEON-2000-JT2” C-mount camera for machine vision runs Ubuntu on a Jetson TX2 or Xavier NX and offers GbE, USB Type-C with DP, and support for multiple sensors up to 5MP (2592 x 1944). Adlink has launched an all-in-one, Nvidia Jetson based NEON-2000-JT2 camera designed for AI-based factory automation, including faster, more accurate product […]

Datasheet: Mini-ITX and Pico-ITX SBCs

Wednesday 22nd of July 2020 01:05:58 PM
(Circuit Cellar article) Based on the small-sized versions of the ITX motherboard form factor, Mini-ITX and Pico-ITX keep growing in popularity and in embedded market share. This Datasheet section updates readers on this technology trend and provides a product album of representative Mini-ITX and Pico-ITX SBCs.

Open source ACRN v2.0 hypervisor focuses on IoT

Tuesday 21st of July 2020 03:29:22 PM
Project ACRN has released v2.0 of its open source IoT and automotive hypervisor with a new hybrid-mode architecture for simultaneous deployment of safety critical and resourcing sharing VMs. ACRN v2.0 also adds OpenStack and Kata support. In 2018 when the Linux Foundation launched its Project ACRN for developing a lightweight hypervisor for safety critical embedded […]

Comet Lake-S computers support Ubuntu

Tuesday 21st of July 2020 01:04:14 PM
OnLogic’s fanless, $768-and-up “Helix 500” and larger, PCIe x16 enabled, $859-and-up “Helix 600” run Ubuntu or Windows on Intel’s 10th Gen Comet Lake-S with triple display support, 2x M.2, 2x GbE, and 6x USB 3.1 Gen 2 ports. OnLogic has launched two Helix Series embedded computers that support Ubuntu. The fanless, Linux-ready Helix 500 (HX500) […]

RISC-V based PolarFire SoC debuts on open-spec, $499 dev kit

Monday 20th of July 2020 04:03:14 PM
Microchip is crowdfunding a $499, open-spec “PolarFire SoC Icicle Kit” that runs Linux on its FPGA-enabled, SiFive U540 based PolarFire SoC and offers 2x GbE ports plus CAN, mikroBus, PCIe x4, and RPi 40-pin expansion. It’s rare to see a major tech vendor like Microchip launch a product on a crowdfunding site, but then again […]

More in Tux Machines

Programming: Vala, Perl and Python

  • Excellent Free Tutorials to Learn Vala

    Vala is an object-oriented programming language with a self-hosting compiler that generates C code and uses the GObject system. Vala combines the high-level build-time performance of scripting languages with the run-time performance of low-level programming languages. Vala is syntactically similar to C# and includes notable features such as anonymous functions, signals, properties, generics, assisted memory management, exception handling, type inference, and foreach statements. Its developers, Jürg Billeter and Raffaele Sandrini, wanted to bring these features to the plain C runtime with little overhead and no special runtime support by targeting the GObject object system. Rather than compiling directly to machine code or assembly language, it compiles to a lower-level intermediate language. It source-to-source compiles to C, which is then compiled with a C compiler for a given platform, such as GCC. Did you always want to write GTK+ or GNOME programs, but hate C with a passion? Learn Vala with these free tutorials! Vala is published under the GNU Lesser General Public License v2.1+.

  • Supporting Perl-related creators via Patreon

    Yesterday I posted about this in the Perl Weekly newsletter and both Mohammad and myself got 10 new supporters. This is awesome. There are not many ways to express the fact that you really value the work of someone. You can send them postcards or thank-you notes, but when was the last time you remembered to do that? Right, I also keep forgetting to thank the people who create all the free and awesome stuff I use. Giving money as a way to express your thanks is frowned upon by many people, but trust me, the people who open an account on Patreon to make it easy to donate them money will appreciate it. In any case it is way better than not saying anything.

  • 2020.31 TwentyTwenty

    JJ Merelo kicked off the special 20-day Advent Blog cycle in honour of the publication of the first RFC that would lay the foundation for the Raku Programming Language as we now know it. After that, 3 blog posts got already published:

  • Supporting The Full Lifecycle Of Machine Learning Projects With Metaflow

    Netflix uses machine learning to power every aspect of their business. To do this effectively they have had to build extensive expertise and tooling to support their engineers. In this episode Savin Goyal discusses the work that he and his team are doing on the open source machine learning operations platform Metaflow. He shares the inspiration for building an opinionated framework for the full lifecycle of machine learning projects, how it is implemented, and how they have designed it to be extensible to allow for easy adoption by users inside and outside of Netflix. This was a great conversation about the challenges of building machine learning projects and the work being done to make it more achievable.

  • Django 3.1 Released

    The Django team is happy to announce the release of Django 3.1.

  • Awesome Python Applications: buku

    buku: Browser-independent bookmark manager with CLI and web server frontends, with integrations for browsers, cloud-based bookmark managers, and emacs.

  • PSF GSoC students blogs: Week 9 Check-in

DRM and Proprietary Software Leftovers

  • Some Photoshop users can try Adobe’s anti-misinformation system later this year

    Adobe pitched the CAI last year as a general anti-misinformation and pro-attribution tool, but many details remained in flux. A newly released white paper makes its scope clearer. The CAI is primarily a more persistent, verifiable type of image metadata. It’s similar to the standard EXIF tags that show the location or date of a photograph, but with cryptographic signatures that let you verify the tags haven’t been changed or falsely applied to a manipulated photo.

    People can still download and edit the image, take a screenshot of it, or interact the way they would any picture. Any CAI metadata tags will show that the image was manipulated, however. Adobe is basically encouraging adding valuable context and viewing any untagged photos with suspicion, rather than trying to literally stop plagiarism or fakery. “There will always be bad actors,” says Adobe community products VP Will Allen. “What we want to do is provide consumers a way to go a layer deeper — to actually see what happened to that asset, who it came from, where it came from, and what happened to it.”

    The white paper makes clear that Adobe will need lots of hardware and software support for the system to work effectively. CAI-enabled cameras (including both basic smartphones and high-end professional cameras) would need to securely add tags for dates, locations, and other details. Photo editing tools would record how an image has been altered — showing that a journalist adjusted the light balance but didn’t erase or add any details. And social networks or other sites would need to display the information and explain why users should care about it.

  •  
  • EFF and ACLU Tell Federal Court that Forensic Software Source Code Must Be Disclosed
           
             

    Can secret software be used to generate key evidence against a criminal defendant? In an amicus filed ten days ago with the United States District Court of the Western District of Pennsylvania, EFF and the ACLU of Pennsylvania explain that secret forensic technology is inconsistent with criminal defendants’ constitutional rights and the public’s right to oversee the criminal trial process. Our amicus in the case of United States v. Ellis also explains why source code, and other aspects of forensic software programs used in a criminal prosecution, must be disclosed in order to ensure that innocent people do not end up behind bars, or worse—on death row.

             

    The Constitution guarantees anyone accused of a crime due process and a fair trial. Embedded in those foundational ideals is the Sixth Amendment right to confront the evidence used against you. As the Supreme Court has recognized, the Confrontation Clause’s central purpose was to ensure that evidence of a crime was reliable by subjecting it to rigorous testing and challenges. This means that defendants must be given enough information to allow them to examine and challenge the accuracy of evidence relied on by the government.

  •                
  • Powershell Bot with Multiple C2 Protocols
                     
                       

    I spotted another interesting Powershell script. It's a bot and is delivered through a VBA macro that spawns an instance of msbuild.exe This Windows tool is often used to compile/execute malicious on the fly (I already wrote a diary about this technique[1]). I don’t have the original document but based on a technique used in the macro, it is part of a Word document. It calls Document_ContentControlOnEnter[2]: [...]

  •      
  • FBI Used Information From An Online Forum Hacking To Track Down One Of The Hackers Behind The Massive Twitter Attack
           
             

    As Mike reported last week, the DOJ rounded up three alleged participants in the massive Twitter hack that saw dozens of verified accounts start tweeting out promises to double the bitcoin holdings of anyone who sent bitcoin to a certain account.

  •                    
  • Twitter Expects to Pay 9-Figure Fine for Violating FTC Agreement
                         
                           

    That means that the complaint is not related to last month’s high-profile [cr]ack of prominent accounts on the service. That security incident saw accounts from the likes of Joe Biden and Elon Musk ask followers to send them bitcoin. A suspect was arrested in the incident last month.

  •                    
  • Twitter Expects to Pay Up to $250 Million in FTC Fine Over Alleged Privacy Violations
                         
                           

    Twitter disclosed that it anticipates being forced to pay an FTC fine of $150 million to $250 million related to alleged violations over the social network’s use of private data for advertising.

                           

    The company revealed the expected scope of the fine in a 10-Q filing with the SEC. Twitter said that on July 28 it received a draft complaint from the Federal Trade Commission alleging the company violated a 2011 consent order, which required Twitter to establish an information-security program designed to “protect non-public consumer information.”

                           

    “The allegations relate to the Company’s use of phone number and/or email address data provided for safety and security purposes for targeted advertising during periods between 2013 and 2019,” Twitter said in the filing.

  •                
  • Apple removes more than 26,000 games from China app store
                     
                       

    Apple pulled 29,800 apps from its China app store on Saturday, including more than 26,000 games, according to Qimai Research Institute.

                       

    The removals are in response to Beijing's crackdown on unlicensed games, which started in June and intensified in July, Bloomberg reported. This brings an end to the unofficial practice of letting games be published while awaiting approval from Chinese censors.

  •                
  • Intuit Agrees to Buy Singapore Inventory Software Maker
                     
                       

    Intuit will pay more than $80 million for TradeGecko, according to people familiar with the matter, marking one of the biggest exits in Singapore since the Covid-19 pandemic. TradeGecko has raised more than $20 million to date from investors including Wavemaker Partners, Openspace Ventures and Jungle Ventures.

  •                      
  • Justice Department Is Scrutinizing Takeover of Credit Karma by Intuit, Maker of TurboTax
           
             

    The probe comes after ProPublica first reported in February that antitrust experts viewed the deal as concerning because it could allow a dominant firm to eliminate a competitor with an innovative business model. Intuit already dominates online tax preparation, with a 67% market share last year. The article sparked letters from Sen. Ron Wyden, D-Ore., and Rep. David Cicilline, D-R.I., urging the DOJ to investigate further. Cicilline is chair of the House Judiciary Committee’s antitrust subcommittee.

Security Leftovers

           
  • DNS configuration recommendations for IPFire users

    If you are familiar with IPFire, you might have noticed DNSSEC validation is mandatory, since it defeats entire classes of attacks. We receive questions like "where is the switch to turn off DNSSEC" on a regular basis, and to say it once and for all: There is none, and there will never be one. If you are running IPFire, you will be validating DNSSEC. Period. Another question frequently asked is why IPFire does not support filtering DNS replies for certain FQDNs, commonly referred to as a Response Policy Zone (RPZ). This is because an RPZ does what DNSSEC attempts to secure users against: Tamper with DNS responses. From the perspective of a DNSSEC-validating system, a RPZ will just look like an attacker (if the queried FQDN is DNSSEC-signed, which is what we strive for as much of them as possible), thus creating a considerable amount of background noise. Obviously, this makes detecting ongoing attacks very hard, most times even impossible - the haystack to search just becomes too big. Further, it does not cover direct connections to hardcoded IP addresses, which is what some devices and attackers usually do, as it does not rely on DNS to be operational and does not leave any traces. Using an RPZ will not make your network more secure, it just attempts to cover up the fact that certain devices within it cannot be trusted. Back to DNSSEC: In case the queried FQDNs are signed, forged DNS replies are detected since they do not match the RRSIG records retrieved for that domain. Instead of being transparently redirected to a fradulent web server, the client will only display a error message to its user, indicating a DNS lookup failure. Large-scale attacks by returning forged DNS replies are frequently observed in the wild (the DNSChanger trojan is a well-known example), which is why you want to benefit from validating DNSSEC and more and more domains being signed with it.

  • Security updates for Tuesday

    Security updates have been issued by Debian (libx11, webkit2gtk, and zabbix), Fedora (webkit2gtk3), openSUSE (claws-mail, ghostscript, and targetcli-fb), Red Hat (dbus, kpatch-patch, postgresql-jdbc, and python-pillow), Scientific Linux (libvncserver and postgresql-jdbc), SUSE (kernel and python-rtslib-fb), and Ubuntu (ghostscript, sqlite3, squid3, and webkit2gtk). 

  •        
  • Official 1Password Linux App is Available for Testing

    An official 1Password Linux app is on the way, and brave testers are invited to try an early development preview. 1Password is a user-friendly (and rather popular) cross-platform password manager. It provides mobile apps and browser extensions for Windows, macOS, Android, iOS, Google Chrome, Edge, Firefox — and now a dedicated desktop app for Linux, too.

  •        
  • FBI Warns of Increased DDoS Attacks

    The Federal Bureau of Investigation warned in a “private industry notification” last week that attackers are increasingly using amplification techniques in distributed denial-of-service attacks. There has been an uptick in attack attempts since February, the agency’s Cyber Division said in the alert. An amplification attack occurs when attackers send a small number of requests to a server and the server responds with numerous responses. The attackers spoof the IP address to make it look like the requests are coming from a specific victim, and the resulting responses overwhelms the victim’s network. “Cyber actors have exploited built-in network protocols, designed to reduce computation overhead of day-to-day system and operational functions to conduct larger and more destructive distributed denial-of-service amplification attacks against US networks,” the FBI alert said. Copies of the alert were posted online by several recipients, including threat intelligence company Bad Packets.

  • NSA issues BootHole mitigation guidance

    Following the disclosure of a widespread buffer-flow vulnerability that could affect potentially billions of Linux and Windows-based devices, the National Security Agency issued a follow-up cybersecurity advisory highlighting the bug and offering steps for mitigation. The vulnerability -- dubbed BootHole -- impacts devices and operating systems that use signed versions of the open-source GRUB2 bootloader software found in most Linux systems. It also affects any system or device using Secure Boot -- a root firmware interface responsible for validating the booting process -- with Microsoft's standard third party certificate authority. The vulnerability enables attackers to bypass Secure Boot to allow arbitrary code execution and “could be used to install persistent and stealthy bootkits,” NSA said in a press statement.

Mozilla: SameSite, SUMO, Firefox and More

           
  • Changes to SameSite Cookie Behavior – A Call to Action for Web Developers

    We are changing the default value of the SameSite attribute for cookies from None to Lax, per new IETF guidelines. This will greatly improve security for users. However, some web sites may depend (even unknowingly) on the old default, potentially resulting in breakage for those sites. At Mozilla, we are slowly introducing this change. And we are strongly encouraging all web developers to test their sites with the new default. [...] Testing in the Firefox Nightly and Beta channels has shown that website breakage does occur. While we have reached out to those sites we’ve encountered and encouraged them to set the SameSite attribute on their web properties, the web is clearly too big to do this on a case-by-case basis. It is important that all web developers test their sites against this new default. This will prepare you for when both Firefox and Chrome browsers make the switch in their respective release channels.

  •         
  • New platform milestone completed: Python upgrade

    In 2020 a lot of the SUMO platform’s team work is focused on modernizing our support platform (Kitsune) and performing some foundational work that will allow us to grow and expand the platform. We have started this in H1 with the new Responsive and AAQ redesign. Last week we completed a new milestone: the Python/Django upgrade. Why was this necessary Support.mozilla.org was running on Python 2.7, meaning our core technology stack was running on a no longer supported version. We needed to upgrade to at least 3.7 and, at the same time, upgrade to the latest Django Long Term Support (LTS) version 2.2.

  •        
  • Firefox 79 includes protections against redirect tracking

    A little over a year ago we enabled Enhanced Tracking Protection (ETP) by default in Firefox. We did so because we recognize that tracking poses a threat to society, user safety, and the autonomy of individuals and we’re committed to protecting users against these threats by default. ETP was our first step in fulfilling that commitment, but the web provides many covert avenues trackers can use to continue their data collection. Today’s Firefox release introduces the next step in providing a safer and more private experience for our users with Enhanced Tracking Protection 2.0, where we will block a new advanced tracking technique called redirect tracking, also known as bounce tracking. ETP 2.0 clears cookies and site data from tracking sites every 24 hours, except for those you regularly interact with. We’ll be rolling ETP 2.0 out to all Firefox users over the course of the next few weeks.

  •        
  • Fast Company Recognizes Katharina Borchert as one of the Most Creative Business People

    We are proud to share that Katharina Borchert, Mozilla’s Chief Open Innovation Officer, has been named one of the  Most Creative People by Fast Company. The award recognizes her leadership on Common Voice and helping to diversify AI speech through machine learning. Katharina was recognized not just for a groundbreaking idea, but because her work is having a measurable impact in the world. [...] The full list also includes vintner, Krista Scruggs, dancer and choreographer Twyla Tharp, and Ryan Reynolds: “for delivering an honest message, even when it’s difficult”. “‘This is a real honor,” said Katharina, “which also reflects the contributions of an incredible alliance of people at Mozilla and beyond. We have a way to go before the full promise of Common Voice is realized. But I’m incredibly inspired by the different communities globally building it together with Mozilla, because language is so important for our identities and for keeping cultural diversity alive in the digital age. Extending the reach of voice recognition to more languages can only open the doors to more innovation and make tech more inclusive.”

  •        
  • Latest Firefox rolls out Enhanced Tracking Protection 2.0; blocking redirect trackers by default

    Today, Firefox is introducing Enhanced Tracking Protection (ETP) 2.0, our next step in continuing to provide a safe and private experience for our users. ETP 2.0 protects you from an advanced tracking technique called redirect tracking, also known as bounce tracking. We will be rolling out ETP 2.0 over the next couple of weeks. Last year we enabled ETP by default in Firefox because we believe that understanding the complexities and sophistication of the ad tracking industry should not be required to be safe online. ETP 1.0 was our first major step in fulfilling that commitment to users. Since we enabled ETP by default, we’ve blocked 3.4 trillion tracking cookies. With ETP 2.0, Firefox brings an additional level of privacy protection to the browser. Since the introduction of ETP, ad industry technology has found other ways to track users: creating workarounds and new ways to collect your data in order to identify you as you browse the web. Redirect tracking goes around Firefox’s built-in third-party cookie-blocking policy by passing you through the tracker’s site before landing on your desired website. This enables them to see where you came from and where you are going.

  •        
  • Moth wants you to design a Firefox Theme for San Francisco Shock

    This summer we partnered with Overwatch League’s San Francisco Shock to help the fans at home cheer on their 2019 Grand Finals Champions. This included Firefox Protection Plays and giving viewers a behind-the-scenes look at a day in the life of the SF Shock players. Before the summer season ends, we wanted to do one last thing for the SF Shock team and their fans. One of the players, Moth, shared that Firefox is the only browser he uses. He learned about Firefox while studying software engineering in college. Firefox and Mozilla’s mission along with the open source ethos is what keeps him a loyal user. To celebrate that, we’re inviting SF Shock fans — and anyone else who might be interested — to design an original Firefox theme.