Stories
Slash Boxes
Comments

SoylentNews is people

SoylentNews is powered by your submissions, so send in your scoop. Only 12 submissions in the queue.
posted by Fnord666 on Wednesday November 18 2020, @10:14PM   Printer-friendly
from the moving-forward dept.

Firefox 83 Released With Warp'ed JavaScript, HTTPS-Only Mode Option

Most notable with Firefox 83 is the SpiderMonkey "Warp" upgrade aiming to deliver better website responsiveness and other real-world JavaScript performance improvements. Mozilla describes the Warp benefits as "improved page load performance by up to 15%, page responsiveness by up to 12%, and reduced memory usage by up to 8%. We have replaced part of the JavaScript engine that helps to compile and display websites for you, improving security and maintainability of the engine at the same time."

Firefox 83 also ships with an option for an HTTPS-only mode whereby every Firefox connection aims to be secure and will warn the user should HTTPS not be supported.

Mozilla Punts Servo Web Engine Development To The Linux Foundation

Ever since the mass layoffs at Mozilla earlier this year and some Mozilla projects in jeopardy many have been wondering: what about Servo? Well, today it's heading off to the Linux Foundation.

Mozilla and the Linux Foundation are jointly announcing this morning that the Servo web engine development will now be hosted by the Linux Foundation.

The Rust-written code-base that's served as a long in development "next-gen" web engine at Mozilla will now be developed under the Linux Foundation umbrella. Besides Mozilla, this move has the support of other industry stakeholders like Samsung and Let's Encrypt.

See also: Firefox 84 Beta Begins Enabling WebRender By Default On Linux
Chrome 87 Released With More Performance Improvements
Google Is Already Experimenting With WebP2 As Successor To WebP Image Format

Previously: Mozilla Lays Off 250, Including Entire Threat Management Team
Following Layoffs, Mozilla and Core Rust Developers Are Forming a Rust Foundation


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 5, Informative) by Pino P on Thursday November 19 2020, @03:51AM (2 children)

    by Pino P (4721) on Thursday November 19 2020, @03:51AM (#1079071) Journal

    Self-signed certificates cause the browser to present a scary interstitial notice and are not compatible [stackoverflow.com] with JavaScript APIs restricted to secure contexts [pineight.com].

    To use Let's Encrypt, a server must first have a fully-qualified domain name (FQDN). In particular, mDNS names ending in .local are ineligible. This means good luck using HTTPS with the router, printer, NAS, or other "Internet of things" devices on your home LAN.

    Yes, I'm aware of the Plex workaround [filippo.io]. The publisher of Plex media streaming software operates a dynamic DNS service and acts as a DigiCert reseller for its subscribers. Nowadays, the dynamic DNS service alone would be enough, provided that the provider is on the Public Suffix List so as not to trip the 20 certificate per week limit that Let's Encrypt applies to each registrable domain name. I just see it as something that the manufacturer of a networked appliance can deliberately cease providing the day a product's warranty expires, leading to more e-waste. And I doubt the Raspberry Pi Foundation is willing to offer this sort of dynamic DNS service for web-based configuration of server applications installed on a Raspberry Pi computer.

    How do you assign a FQDN to each networked device on your LAN?

    Starting Score:    1  point
    Moderation   +3  
       Informative=2, Underrated=1, Total=3
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   5  
  • (Score: 3, Informative) by darkfeline on Thursday November 19 2020, @04:40AM (1 child)

    by darkfeline (1030) on Thursday November 19 2020, @04:40AM (#1079085) Homepage

    Just make your own certificate authority and issue your own certs. Add your authority as trusted to your devices/applications. Simple. FreeNAS even has an out of the box UI for making certs.

    --
    Join the SDF Public Access UNIX System today!
    • (Score: 0) by Anonymous Coward on Thursday November 19 2020, @07:07PM

      by Anonymous Coward on Thursday November 19 2020, @07:07PM (#1079360)

      This. Openssl works like a charm at the CLI on Linux.