Firefox’s free VPN will offer 50 gigabytes of monthly data, which is pretty generous for a browser-based VPN. A Mozilla account is required to make use of it, which isn’t a hardship (they’re free), but is a point of friction some may wish to know upfront.

  • Aceticon@lemmy.dbzer0.com
    link
    fedilink
    English
    arrow-up
    2
    ·
    22 minutes ago

    And how exactly do we know for certain that all that juicy web access data complete linked to whatever identifying information associated with a Mozilla account isn’t going to be sold?!

  • blackbeans@lemmy.zip
    link
    fedilink
    English
    arrow-up
    49
    arrow-down
    2
    ·
    13 hours ago

    Usable addition, and the fact that it is only in-browser is actually a merit in some cases. Firefox gets a lot of hate but is way more privacy centric out of the box compared to Chrome. AI is only opt-in and you can literally customize the entire browser using about:config. Mozilla also maintains the only real competing web engine (not considering Apple’s locked in ecosystem) and they are the reason browsers are open source these days.

    • timroerstroem@feddit.dk
      link
      fedilink
      English
      arrow-up
      38
      ·
      11 hours ago

      AI is only opt-in

      Not to take anything away from your overall point, which I completely agree with, but this may be a bit of a stretch. All of the “AI” buttons and features are - to my knowledge - on by default. They have made it a lot easier to change that to “off by default now and in the future”, which is very welcome, but “only opt-in” is, again, a bit of a stretch.

  • madsen@lemmy.world
    link
    fedilink
    English
    arrow-up
    110
    arrow-down
    9
    ·
    19 hours ago

    Please stop adding bloat to my browser. I have nothing against VPN, but it’s not a fucking core feature of a web browser. Put that stuff in an extension that I can install if I want.

  • XLE@piefed.social
    link
    fedilink
    English
    arrow-up
    122
    ·
    20 hours ago

    Firefox’s free VPN won’t be using Mullvad’s infra though; it’s hosted on Mozilla servers around the world (if beta testing of the feature done in late 2025 tracks).

    …oh.

        • Pogogunner@sopuli.xyz
          link
          fedilink
          English
          arrow-up
          51
          arrow-down
          1
          ·
          18 hours ago

          The data is indeed encrypted, but both you and the VPN provider have the keys - that’s why they advertise no-logs policies, because they have access to the data you send, such as which website you’re attempting to visit.

          • Victor@lemmy.world
            link
            fedilink
            English
            arrow-up
            12
            ·
            18 hours ago

            Can a VPN provider do man in the middle attacks if they wanted to? Like sniff my /api/login calls and get my password? My gut tells me yes but I don’t know enough to be sure, I feel.

            • Kissaki@feddit.org
              link
              fedilink
              English
              arrow-up
              9
              ·
              edit-2
              13 hours ago

              When you connect to a secure https site, then no. When you connect to unsecured http, then yes.

              Firefox has its own cert store for https, and could theoretically impersonste other websites by adding their own and then sniff your traffic. But thats not how vpn providers typically work, and thered be huge backlash if they were to do that unprompted.

            • RaisinCrazyFool@kopitalk.net
              link
              fedilink
              English
              arrow-up
              32
              ·
              17 hours ago

              Generally not. Anything with authentication would be using HTTPS encryption. So there will be two layers of encryption: the VPN encryption and the web site’s HTTPS encryption. The VPN provider can’t replace the HTTPS encryption because your browser would identify it as being encrypted with the wrong certificate and it would block the connection.

              Although…given that they control the browser, too, I suppose they could code it to remove those safeguards, but that would not go unnoticed for long.

              When you use a VPN, it basically replaces your ISP as the intermediary who can snoop all your traffic, so the real question is who do you trust more: your ISP or Mozilla?

              • Victor@lemmy.world
                link
                fedilink
                English
                arrow-up
                4
                ·
                13 hours ago

                What I was thinking was that the VPN would be able to sniff the key exchange hand shake thing that HTTPS does in order to setup the connection, and use the data during the handshake to basically recreate the cryptographic key used for the connection later. So then it’d be able to just decrypt all traffic and reencrypt it again after passing through. Seamlessly to both ends.

                Is that a thing in theory?

                • RaisinCrazyFool@kopitalk.net
                  link
                  fedilink
                  English
                  arrow-up
                  8
                  ·
                  7 hours ago

                  The SSL/TLS encryption used on the web is designed to prevent that type of attack. It’s called “asymmetric encryption”, because a different key is used to encrypt and decrypt data. So each side has both a private and public key. You can broadcast your public key, and then anyone can use it to encrypt a message that only YOU can decrypt, with your private key. The private key never goes over the network, so the VPN provider can’t intercept messages meant for you.

                  It’s possible to spoof the server’s certificate and make your browser think it’s talking to a real server when it’s not. However, this is difficult, because certificates follow a chain of trust, so they’d either need to compromise one of the certificate authorities (plausible for state-level actors), or compromise your web browser/OS so that it trusts a fake authority (definitely possible for a browser/OS vendor, but again, it would be noticed, especially in an open-source product like Firefox).

                  There are lot of enterprise products out there that perform this kind of “attack” so that businesses can monitor their network traffic. They do this by requiring adding their certificate authority to the list of trusted certs in the OS. This is often called “deep packet inspection”. If you try to use these products without adding their certs, your browser will throw a fit every time you load a site because it will see that the certificate doesn’t match.

                • XLE@piefed.social
                  link
                  fedilink
                  English
                  arrow-up
                  14
                  ·
                  17 hours ago

                  This is true regardless. HTTPS encryption keeps a man in the middle from seeing your URL. They just get the domain name, which is a lot, but it isn’t your credentials.

            • GenosseFlosse@feddit.org
              link
              fedilink
              English
              arrow-up
              9
              ·
              14 hours ago

              We had a proxy server at work that would route all internet traffic and scan for viruses, blocked urls or other traffic patterns, depending on your network rules. It did work on https and SSL traffic, because you had to accept the cert from the proxy server in your browser. So your traffic was encrypted between proxy and webserver, and proxy and your computer, but unencrypted on the proxy server itself. It would be similar with a VPN. Plus, if you control the browser you could just ship the required certs with the update…

              • Victor@lemmy.world
                link
                fedilink
                English
                arrow-up
                1
                ·
                9 hours ago

                So a VPN could basically sniff the Diffie-Hellman keys used during the exchange, recreate the key that browser and server use for HTTPS, and then decrypt all traffic sent through the VPN? Is that correct? And basically the same goes for any ISP or whatever else that’s acting as a node?

                • GenosseFlosse@feddit.org
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  2 minutes ago

                  No, not at all. You have 2 encrypted connections A to B and B to C, where B is the proxy server. The proxy server decrypts AB, sees the plaintext traffic to check against rules, then reencrypts the traffic with his own key and forwards it to B to C. Your browser on C sees the proxy servers cert for BC, and the website and proxy handle out a different cert AB. No encryption or cert is broken during the process.

                • Passerby6497@lemmy.world
                  link
                  fedilink
                  English
                  arrow-up
                  2
                  ·
                  7 hours ago

                  So if they were going to do an attack like this, they wouldn’t do anything like the DH attack you’re talking about, they’d have a custom CA in the browser’s SSL root store. That root cert means they can generate a certificate for any website you visit, and that custom root cert would be how they decrypt your traffic.

                  Afaik there isn’t a current attack on proper DH key pairings, but you can’t block the custom certificate path at the browser level without some serious server side work/client side JS to validate

            • nymnympseudonym@piefed.social
              link
              fedilink
              English
              arrow-up
              5
              ·
              edit-2
              17 hours ago

              If you have to install any closed-source software to use the VPN, the answer is oh hell yes, they can install a root cert. If they are clever they can remove it when you disconnect, so it will not be noticed by most people.

              Even if they require no proprietary install, by definition the VPN knows every IP address you connect to. Even if you use DoH. Even if you use Quad9 DNS. The VPN knows you visited midwestsluts.com

              If you want privacy, either spin up your own selfhost OpenVPN, or use the Tor nodes myself and other volunteers pay for, to make free for you to use.

              Tor node operators can’t tell what site you are visiting (if they run an exit node they can see the site – but don’t know your IP; if they run a Guard/proxy node they can see your IP, but can’t tell anything about what sites you visit or what data you get)

              • zeca@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                14 hours ago

                What if the gov has access to both tor nodes, cloudfare infrastructure and mozilla servers?

    • KiloGex@lemmy.world
      link
      fedilink
      English
      arrow-up
      2
      ·
      2 hours ago

      This is exactly my worry. Usually the reason a VPN is free is because they’re selling your data on the backend. No thank you.

    • TheTechnician27@lemmy.world
      link
      fedilink
      English
      arrow-up
      26
      ·
      edit-2
      20 hours ago

      It doesn’t seem like it, or at least there’s zero evidence I’ve seen that this is the case. As the linked OMG Ubuntu article speculates, probably the main benefit financially is making users more likely to sign up to their paid VPN.

      Aside: Based on their blog post, the service seems like a proxy rather than a VPN.

    • Eager Eagle@lemmy.world
      link
      fedilink
      English
      arrow-up
      12
      arrow-down
      1
      ·
      edit-2
      19 hours ago

      with a 50GB quota, I actually believe it’s free. I use 15-20x that much on an average month.

    • Rhaedas@fedia.io
      link
      fedilink
      arrow-up
      5
      arrow-down
      4
      ·
      20 hours ago

      I’m sure that’s the condition, to use your data (that they protect of course) to better improve the browser. And I’m sure they are in a country where they don’t have to show logs (that I’m sure they don’t keep, yet somehow use your data).

      They need to stick with just the browser, period. Stop trying to drift into other areas. Firefox has unfortunately gotten too heavy for what it should be, and adding even more features (good or bad) doesn’t help the core performance.

      The other options out there have their pluses and minuses, but if Firefox keeps pushing people will live with the negatives of the browsers that seem to care about the browsing experience of their users.

  • AmbitiousProcess (they/them)@piefed.social
    link
    fedilink
    English
    arrow-up
    27
    arrow-down
    3
    ·
    edit-2
    19 hours ago

    For everyone who thinks this is just gonna be a way for them to somehow sell your data, I don’t think so.

    Think about it like this. You can buy a VPN plan for as little as $2 a month or less depending on the provider if you have a long-term commitment (e.g. 1-2 years). That pricing includes margin.

    Firefox can essentially operate at lower prices than that, because they:

    • Don’t have to charge themselves an extra margin
    • Have an economy of scale since they’re not just one user paying for themselves, they’re a company paying for thousands at a time
    • Cap their per-user cost well below what most users actually use. (I used over 300 GB of data in the last 30 days just on my PC, almost all through Firefox, with even more on Firefox on my phone.)

    I would bet this would probably cost Mozilla less than a dollar per user per month, and that’s also assuming all those users are continuing to use the VPN service over time, maxing out their data limit, but refusing to pay for anything else after.

    Meanwhile, Mozilla conveniently sells their own VPN service provided through Mullvad, which they make a profit on.

    If a user cares enough to continue using the VPN because they want a VPN, they’ll blow through the data limit and be more inclined than the average user to pay for Mozilla’s option. (rather than going “I guess I’ll only care about my privacy for 5 days out of the month”)

    If a user doesn’t care enough to continue using the VPN because they were just trying it out, but they chose to use Firefox because it had a free VPN bundled in, which sold them on it over another browser, Mozilla just paid less than an ad would cost for a conversion.

    And at the end of the day, it also just helps keep up their reputation as a browser that respects your privacy, which makes it easier to promote the browser elsewhere, in ads or otherwise.

    This feels more like a marketing ploy that’s likely to just save money on ad conversions for new Firefox users, and increase Mozilla VPN conversions, rather than something they’re gonna use to super secretly siphon off your data and sell it to advertisers.

    • XLE@piefed.social
      link
      fedilink
      English
      arrow-up
      9
      ·
      19 hours ago

      I think it would be better to compare this offer to well-known VPN providers instead of all VPN providers, since the sketchiest ones tend to have the lowest prices. The two reputable ones I can think of, Proton and Mullvad, both cost over $5/month. But cost is only half of the picture: They’ve also earned their reputation through a lot of time, effort, audits, even government raids.

      Regardless, you have some good points. Let’s take for granted that Mozilla will not attempt to share or sell user data with this free service, that it’s all above-board (a fair assumption): They still have to build their reputation from zero.

    • nymnympseudonym@piefed.social
      link
      fedilink
      English
      arrow-up
      4
      arrow-down
      1
      ·
      edit-2
      17 hours ago

      Then why are they not offering at least a low cost subscription? Why are they spending money on infrastructure and support but getting no revenue in return?

      Either they are okay with losing even more money, OR they plan to enshittify.

      For this and many many other reasons, it’s time to switch to a privacy fork like LibreWolf or WaterFox

      • AmbitiousProcess (they/them)@piefed.social
        link
        fedilink
        English
        arrow-up
        4
        ·
        15 hours ago

        Why are they spending money on infrastructure and support but getting no revenue in return?

        I already addressed this in my comment. If you want me to expand on how they most definitely can make money from something like this, Mozilla:

        • Gets revenue from their paid VPN service that already exists, and it would be a way to convert users to a revenue source, since the thing being taken away after the data cap is itself a VPN
        • Gets donations, which more users with a good opinion of the browser will bring
        • Has sponsored integrations, which pay money on a per-click basis, (e.g. AccuWeather integration where Mozilla gets paid if you click through to their website, pinned sites like Amazon that appear on the new tab page for new users) and ones that are influenced by overall number of Firefox users (e.g. Google’s deal to be the default search engine when you first install Firefox)

        If this feature brings in new users, they can get revenue from any of these 3 sources, especially the sponsored listings. If this feature is just a benefit for existing users that might have already changed all their defaults and disabled sponsored content, it increases the chance of VPN conversions and donations, and increases the likelihood someone will recommend Firefox to a friend.

        Either they are okay with losing even more money, OR they plan to enshittify.

        Or they’re trying to get and retain users, which helps them make money from existing revenue options without having to make anything worse, while also providing a beneficial feature. I’m not saying there’s no chance they’ll enshittify, but I don’t think unconditional pessimism is the right move here.

        For this and many many other reasons, it’s time to switch to a privacy fork like LibreWolf or WaterFox

        I can’t speak to Waterfox myself, but I would agree with saying LibreWolf is a good idea if you care.

        I just personally haven’t bothered switching since Firefox currently works fine for me, and anything they’ve done I dislike is fairly easy to just disable in settings and never see again.

    • Orygin@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      5
      arrow-down
      4
      ·
      19 hours ago

      Get out of here with your level headed take. The pitchforks already have been distributed and it has been decided Mozilla will sell the data asap! /s

  • ZombieCyborgFromOuterSpace@piefed.ca
    link
    fedilink
    English
    arrow-up
    15
    arrow-down
    2
    ·
    19 hours ago

    Yeah, but they also added an AI feature that’s enabled by default that I never asked for.

    And I normally advocate for Firefox. It’s been a good solid privacy focused browser for a while but now I’m starting to think maybe not as much.

    • infinitesunrise@slrpnk.net
      link
      fedilink
      English
      arrow-up
      7
      ·
      edit-2
      17 hours ago

      Still better than the Chrome-alikes, but all the same I’ve switched to Librewolf. Problem is, foss mozilla teams like Librewolf are small and underfunded, and their ability to continue sanitizing and debloating the app forever is not garaunteed. A new vanguard FOSS browser project is needed, ideally one that continues the Netscape lineage of open and non-coercive web standards with a more durable and democratic organizational structure.