Reviews for Firefox Multi-Account Containers
Firefox Multi-Account Containers by Firefox
Review by Amazing Mr. X
Rated 2 out of 5
by Amazing Mr. X, 3 years agoThis has a lot of potential, but it's not quite ready for prime time. There's a few specific problems here:
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
Firstly, add-ons can't communicate with the content of containers. This breaks functionality in most add-ons in really weird and unexpected ways. It'd be nice if we could whitelist add-ons to have access to relevant containers, but most users would probably want all of their add-ons to have full access to all of their containers by default and wouldn't expect them to be functionally blocked as they are.
Secondly, containers don't nicely handle redirects. A lot of sites, especially corporate ones, will redirect through several different domains and subdomains when performing the login process. Containers set to "Limit to Designated Sites" won't operate correctly with these redirects as the redirect pages are not true web pages and don't allow you to sit on them long enough to click the address bar button to always open them in the specified container. This cannot currently be remedied by having foreknowledge of the complete list of redirect sites, as the "Limit to Designated Sites" list cannot be manually edited or appended outside of the limited address bar button method.
Thirdly, The VPN integration isn't particularly secure in premise. Being a per-container opt-in means that entities snooping on the line will immediately see that there's something suspiciously different in the data packets coming from your protected containers compared to the rest of your typical https encrypted traffic. This makes isolating these packets, on the fly, infuriatingly trivial. Making this a per-container opt-out would all but eliminate this problem, as attackers would have to have foreknowledge of the originating container to do this effectively in all circumstances. It'd also be great to see connection protocol options ( OpenVPN, WireGuard, etc. ) as well as other VPN provider options as that'd make it that much harder to try and figure out what's going on in the encrypted container traffic and would better protect Mozilla VPN itself. Right now it's technically more secure to not use the VPN feature at all.
I think the basic idea here is really excellent, but these problems really do drag it down. Something made and maintained by Mozilla shouldn't have this many problems. I still think this is potentially useful to certain technical professionals trying to isolate their sensitive internal sites from other web apps, but the average user is going to have too many headaches to be able to use this effectively.
If you know what you're doing, keep the above points in-mind and go ahead and give it a try.
Anyone else? Hope Mozilla addresses some of these issues in a future release. I'll update my review if they do.
7,445 reviews
- Rated 5 out of 5by Firefox user 18853753, 5 hours ago
- Rated 5 out of 5by gergocsokas, 6 hours ago
- Rated 5 out of 5by Vish, 13 hours agoVery convenient to automatically open each of my websites in its own containers as defined in the configuration.
- Rated 1 out of 5by rms, 3 days agoThis extension keeps restoring deleted containers, which is very annoying if you've previously used Temporary Containers.
- Rated 5 out of 5by Firefox user 14444295, 3 days ago
- Rated 5 out of 5by Firefox user 18846920, 4 days ago
- Rated 5 out of 5by Alexandra, 5 days agoExcelente! Facilita muito meu trabalho, pois utilizo varias contas ao mesmo tempo
- Rated 5 out of 5by Firefox user 18843321, 6 days agoSo far the best browser feature! And it's optional in form of extensions. Just take my money!
- Rated 5 out of 5by Firefox user 18841913, 7 days ago
- Rated 1 out of 5by Firefox user 10363606, 7 days agoThere's no way to use this extension. It doesn't install a toolbar icon, nor is there one available anywhere. Also no new right click menu items show up.
- Rated 5 out of 5by Ernest Chakhoyan, 7 days ago
- Rated 5 out of 5by Firefox user 16707066, 8 days ago
- Rated 5 out of 5by Zach, 8 days ago
- Rated 5 out of 5by Firefox user 18838370, 9 days agoIt's one of the best features in FireFox. Very useful. I wish there was more icons and colors to choose.
- Rated 5 out of 5by Firefox user 18836917, 10 days ago
- Rated 5 out of 5by Drumsal, 10 days agoA bit tricky to deal with at the beginning, but really useful!
- Rated 4 out of 5by Firefox user 13699303, 11 days ago
- Rated 2 out of 5by Mark Monteiro, 12 days agoThese are so hard to work with. They sometimes break sites in really obscure ways that are hard to fix. It would be so much better if Firefox had proper support for profiles
- Rated 5 out of 5by A kollisch, 12 days ago
- Rated 5 out of 5by malena, 13 days ago
- Rated 5 out of 5by Tim, 13 days ago
- Rated 5 out of 5by E!, 14 days agoA must have add-on for those who manages multiple cloud-providers accounts.
- Rated 5 out of 5by Firefox user 18668238, 14 days agoIt's amazing. I feel safer navigating the internet, knowing that I can keep my private life separate from my work life, and that Google and other soul-extracting businesses are not in my business.