Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible Mull replacement spotted: Ironfox (Mull fork) #665

Open
DKB-91 opened this issue Jan 3, 2025 · 20 comments
Open

Possible Mull replacement spotted: Ironfox (Mull fork) #665

DKB-91 opened this issue Jan 3, 2025 · 20 comments
Labels
enhancement New feature or request

Comments

@DKB-91
Copy link

DKB-91 commented Jan 3, 2025

Is your feature request related to a problem? Please describe.

No.

Describe the solution you'd like

In the future, if the developers show reasonable update speeds and reliability like the Mull developer, adding Ironfox to the browser selection.

Additional context

https://gitlab.com/ironfox-oss/IronFox

A developer was spotted in this topic:

https://discuss.privacyguides.net/t/ironfox-a-new-mull-fork/23638

Something to keep and eye for in the future, for those who want an easy hardened Firefox install instead of suffering manually changing every single value in Fennec.

Edit: forgot to delete template text.

@DKB-91 DKB-91 added the enhancement New feature or request label Jan 3, 2025
@chris122380
Copy link

chris122380 commented Jan 6, 2025

Why do we need a Mull fork? I couldn't find that answered in the gitlab for Ironfox. I'd kind of like to know that before I'd use it or have it added to FFupdater.

Update: I just think I found the answer to my own question. 😢 #662
https://divestos.org/pages/news#end

I would like to see how maintained this fork is before deciding on anything. First of all there is already Firefox 134.0 but no Fennec 134.0 and no Ironfox134.0. What good is a fork that can't be maintained. There are already too many buggy chromium based browsers because they don't keep current with the upstream project. Do we really want the same problem with Firefox forks (just a thought).

@DKB-91
Copy link
Author

DKB-91 commented Jan 6, 2025

Why do we need a Mull fork? I couldn't find that answered in the gitlab for Ironfox. I'd kind of like to know that before I'd use it or have it added to FFupdater.

Update: I just think I found the answer to my own question. 😢 #662
https://divestos.org/pages/news#end

Sorry to have been the bearer of bad news 🤣

I would like to see how maintained this fork is before deciding on anything. First of all there is already Firefox 134.0 but no Fennec 134.0 and no Ironfox134.0. What good is a fork that can't be maintained. There are already too many buggy chromium based browsers because they don't keep current with the upstream project. Do we really want the same problem with Firefox forks (just a thought).

Again, this feature request is for the future, read again and I said IF they manage to prove themselves as reliable as the Mull maintainer.

Adding Ironfox now is pre-mature even for me, but this is still worth keeping tabs, if the developers prove the in the next months to be as reliable and fast like Mull, because Firefox has trackers and Fennec does not come pre-hardened (not to mention Fennec updates too slowly, Mull was always faster and more secure.)

Also WTF are you located, or are you using a beta? Firefox stable is still 133.0.3 for us Europeans and the official calendar (https://whattrainisitnow.com/) still shows 134 to be released tomorrow...and the calendar is global.
Fennec and Mull (Ironfox too by proxy) have always used the stable release for both stability and privacy. (betas and nightly have more telemetry you can not disable)

@chris122380
Copy link

Again, this feature request is for the future, read again and I said IF they manage to prove themselves as reliable as the Mull maintainer.

Sorry I must have missed that or misunderstood. I agree with you on this.

Also WTF are you located, or are you using a beta? Firefox stable is still 133.0.3 for us Europeans and the official calendar (https://whattrainisitnow.com/) still shows 134 to be released tomorrow...and the calendar is global. Fennec and Mull (Ironfox too by proxy) have always used the stable release for both stability and privacy. (betas and nightly have more telemetry you can not disable)

Must be something strange with Mozilla and the Google Play store. I received the 134 update about a week ago (December 30th) in the United States but FFupdater still shows the most current version for it as being 133.0.3. I probably should disable the Auto updater in the play store. I only keep Firefox for version comparisons and seldom use it. My primary browser is brave. I did recently install Ironfox to test it out and to see how maintained it will be. So far it seems to be quicker then the same mull version. Could be do to a fresh install rather than a upgrade (or possible other factors).

@DKB-91
Copy link
Author

DKB-91 commented Jan 6, 2025

Sorry I must have missed that or misunderstood. I agree with you on this.

No problem, I might also not have written it well enough, English is not my primary language.

Must be something strange with Mozilla and the Google Play store. I received the 134 update about a week ago (December 30th) in the United States but FFupdater still shows the most current version for it as being 133.0.3. I probably should disable the Auto updater in the play store. I only keep Firefox for version comparisons and seldom use it. My primary browser is brave. I did recently install Ironfox to test it out and to see how maintained it will be. So far it seems to be quicker then the same mull version. Could be do to a fresh install rather than a upgrade (or possible other factors).

This is weird as hell and sketchy...
Screenshot_20250106_160950_Aurora Store.jpg

Please do disable it if possible, I couldn't no matter how I changed the settings and that is why I disabled it and update my non-foss app through Aurora...
I tried Ironfox and most likely it is a fresh install because it ran the same, I also use mainly Brave for ephemeral browsing and default link opener and Cromite to log in websites.

Mull (and as of now Firefox, until Ironfox proves itself) was used mainly to create custom filters with uBlock, and to compare as well. Until a sandbox for processes is still missing I too will continue to use mainly nonspyware Chromium on android for security reasons.

@Tobi823
Copy link
Owner

Tobi823 commented Jan 6, 2025

IF they manage to prove themselves as reliable as the Mull maintainer.

👍🏻

FYI: I'm query https://archive.mozilla.org/pub/fenix/releases/ for Firefox updates and there is only 134 beta, no real release available.

@glidingthrough
Copy link

A heads up that IronFox released 134 two days ago

@chris122380
Copy link

A heads up that IronFox released 134 two days ago

I saw that. Almost a day after the official Firefox. I'm still playing around with it. I make some about:config changes because I find Firefox to be way too slow on Android by default.

I say if they continue to release just as fast that we go ahead and add it to FFupdater

@DKB-91
Copy link
Author

DKB-91 commented Jan 11, 2025

I've only noticed now but it's going to be interesting how it will probably slightly do it own thing.

Replaced Arkenfox & Brace preferences with ones from Phoenix 2025.01.06.1. These are specifically tailored for Android, and contain additional privacy & security hardening.
...
Added support for Google Safe Browsing (disabled by default)
...
In the future, we plan to set-up a proxy for Safe Browsing & potentially enable it by default (or at least expose it in the UI or on the onboarding).

If they keep this pace and properly introduce this, we could potentially have the first mobile browser with private safe browsing support.

For those who don't know, safe browsing leaks to google in every android browser, including Brave, due to either trackers, direct connection and/or google play dependency.
Privacy Guides even points to disabling it for Brave users, as they can only proxy and anonymize in the desktop version. (thanks Android version of chromium, built to directly communicate to Google Play Services.)

This may not be big for us tech literate people but for normal people who can't tell the difference between blatant malware/phishing and safe sites/downloads, this is rather significant.

Ironfox could be the first browser to have anonymized safe browsing in android, that's wild.

@CaseOf
Copy link

CaseOf commented Jan 12, 2025

their f-droid repo is now unavailable for ffupdater:

Stacktrace:

de.marmaro.krt.ffupdater.network.exceptions.NetworkException: Unable to fetch the latest update for MULL_FROM_REPO.
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$DefaultImpls.findStatusAndCacheIt(InstalledAppStatusFetcher.kt:55)
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$DefaultImpls.access$findStatusAndCacheIt(InstalledAppStatusFetcher.kt:17)
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$findStatusAndCacheIt$1.invokeSuspend(InstalledAppStatusFetcher.kt:0)
	at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
	at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
	at android.os.Handler.handleCallback(Handler.java:959)
	at android.os.Handler.dispatchMessage(Handler.java:100)
	at android.os.Looper.loopOnce(Looper.java:232)
	at android.os.Looper.loop(Looper.java:317)
	at android.app.ActivityThread.main(ActivityThread.java:8592)
	at java.lang.reflect.Method.invoke(Native Method)
	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:580)
	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:878)
Caused by: de.marmaro.krt.ffupdater.network.exceptions.NetworkException: Request of HTTP-API https://divestos.org/fdroid/official/index-v1.json failed.
	at de.marmaro.krt.ffupdater.network.file.FileDownloader$downloadAsBufferedReader$2.invokeSuspend(FileDownloader.kt:136)
	at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
	at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
	at kotlinx.coroutines.internal.LimitedDispatcher$Worker.run(LimitedDispatcher.kt:115)
	at kotlinx.coroutines.scheduling.TaskImpl.run(Tasks.kt:103)
	at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:584)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:793)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:697)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:684)
Caused by: javax.net.ssl.SSLHandshakeException: Chain validation failed
	at com.android.org.conscrypt.SSLUtils.toSSLHandshakeException(SSLUtils.java:356)
	at com.android.org.conscrypt.ConscryptEngine.convertException(ConscryptEngine.java:1134)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1089)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:876)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:747)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:712)
	at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:896)
	at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket(Unknown Source:0)
	at com.android.org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:236)
	at com.android.org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:218)
	at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.kt:379)
	at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.kt:337)
	at okhttp3.internal.connection.RealConnection.connect(RealConnection.kt:209)
	at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.kt:226)
	at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.kt:106)
	at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.kt:74)
	at okhttp3.internal.connection.RealCall.initExchange$okhttp(RealCall.kt:255)
	at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.kt:32)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.kt:95)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.kt:83)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.kt:76)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.connection.RealCall.getResponseWithInterceptorChain$okhttp(RealCall.kt:201)
	at okhttp3.internal.connection.RealCall$AsyncCall.run(RealCall.kt:517)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
	at java.lang.Thread.run(Thread.java:1012)
Caused by: java.security.cert.CertificateException: Chain validation failed
	at com.android.org.conscrypt.TrustManagerImpl.verifyChain(TrustManagerImpl.java:719)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:549)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:570)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:615)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:505)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:425)
	at com.android.org.conscrypt.TrustManagerImpl.getTrustedChainForServer(TrustManagerImpl.java:353)
	at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:94)
	at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:90)
	at com.android.org.conscrypt.ConscryptEngineSocket$2.checkServerTrusted(ConscryptEngineSocket.java:163)
	at com.android.org.conscrypt.Platform.checkServerTrusted(Platform.java:260)
	at com.android.org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1638)
	at com.android.org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
	at com.android.org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:568)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1095)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1079)
	... 27 more
Caused by: java.security.cert.CertPathValidatorException: OCSP response error: TRY_LATER
	at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:135)
	at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:222)
	at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:140)
	at sun.security.provider.certpath.PKIXCertPathValidator.engineValidate(PKIXCertPathValidator.java:79)
	at java.security.cert.CertPathValidator.validate(CertPathValidator.java:309)
	at com.android.org.conscrypt.TrustManagerImpl.verifyChain(TrustManagerImpl.java:715)
	... 42 more
Caused by: java.security.cert.CertPathValidatorException: OCSP response error: TRY_LATER
	at sun.security.provider.certpath.OCSPResponse.verify(OCSPResponse.java:399)
	at sun.security.provider.certpath.RevocationChecker.checkOCSP(RevocationChecker.java:709)
	at sun.security.provider.certpath.RevocationChecker.check(RevocationChecker.java:363)
	at sun.security.provider.certpath.RevocationChecker.check(RevocationChecker.java:337)
	at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:125)
	... 47 more

Logs:

de.marmaro.krt.ffupdater.network.exceptions.NetworkException: Unable to fetch the latest update for MULL_FROM_REPO.
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$DefaultImpls.findStatusAndCacheIt(InstalledAppStatusFetcher.kt:55)
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$DefaultImpls.access$findStatusAndCacheIt(InstalledAppStatusFetcher.kt:17)
	at de.marmaro.krt.ffupdater.app.impl.base.InstalledAppStatusFetcher$findStatusAndCacheIt$1.invokeSuspend(InstalledAppStatusFetcher.kt:0)
	at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
	at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
	at android.os.Handler.handleCallback(Handler.java:959)
	at android.os.Handler.dispatchMessage(Handler.java:100)
	at android.os.Looper.loopOnce(Looper.java:232)
	at android.os.Looper.loop(Looper.java:317)
	at android.app.ActivityThread.main(ActivityThread.java:8592)
	at java.lang.reflect.Method.invoke(Native Method)
	at com.android.internal.os.RuntimeInit$MethodAndArgsCaller.run(RuntimeInit.java:580)
	at com.android.internal.os.ZygoteInit.main(ZygoteInit.java:878)
Caused by: de.marmaro.krt.ffupdater.network.exceptions.NetworkException: Request of HTTP-API https://divestos.org/fdroid/official/index-v1.json failed.
	at de.marmaro.krt.ffupdater.network.file.FileDownloader$downloadAsBufferedReader$2.invokeSuspend(FileDownloader.kt:136)
	at kotlin.coroutines.jvm.internal.BaseContinuationImpl.resumeWith(ContinuationImpl.kt:33)
	at kotlinx.coroutines.DispatchedTask.run(DispatchedTask.kt:106)
	at kotlinx.coroutines.internal.LimitedDispatcher$Worker.run(LimitedDispatcher.kt:115)
	at kotlinx.coroutines.scheduling.TaskImpl.run(Tasks.kt:103)
	at kotlinx.coroutines.scheduling.CoroutineScheduler.runSafely(CoroutineScheduler.kt:584)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.executeTask(CoroutineScheduler.kt:793)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.runWorker(CoroutineScheduler.kt:697)
	at kotlinx.coroutines.scheduling.CoroutineScheduler$Worker.run(CoroutineScheduler.kt:684)
Caused by: javax.net.ssl.SSLHandshakeException: Chain validation failed
	at com.android.org.conscrypt.SSLUtils.toSSLHandshakeException(SSLUtils.java:356)
	at com.android.org.conscrypt.ConscryptEngine.convertException(ConscryptEngine.java:1134)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1089)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:876)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:747)
	at com.android.org.conscrypt.ConscryptEngine.unwrap(ConscryptEngine.java:712)
	at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.processDataFromSocket(ConscryptEngineSocket.java:896)
	at com.android.org.conscrypt.ConscryptEngineSocket$SSLInputStream.-$$Nest$mprocessDataFromSocket(Unknown Source:0)
	at com.android.org.conscrypt.ConscryptEngineSocket.doHandshake(ConscryptEngineSocket.java:236)
	at com.android.org.conscrypt.ConscryptEngineSocket.startHandshake(ConscryptEngineSocket.java:218)
	at okhttp3.internal.connection.RealConnection.connectTls(RealConnection.kt:379)
	at okhttp3.internal.connection.RealConnection.establishProtocol(RealConnection.kt:337)
	at okhttp3.internal.connection.RealConnection.connect(RealConnection.kt:209)
	at okhttp3.internal.connection.ExchangeFinder.findConnection(ExchangeFinder.kt:226)
	at okhttp3.internal.connection.ExchangeFinder.findHealthyConnection(ExchangeFinder.kt:106)
	at okhttp3.internal.connection.ExchangeFinder.find(ExchangeFinder.kt:74)
	at okhttp3.internal.connection.RealCall.initExchange$okhttp(RealCall.kt:255)
	at okhttp3.internal.connection.ConnectInterceptor.intercept(ConnectInterceptor.kt:32)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.cache.CacheInterceptor.intercept(CacheInterceptor.kt:95)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.http.BridgeInterceptor.intercept(BridgeInterceptor.kt:83)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.http.RetryAndFollowUpInterceptor.intercept(RetryAndFollowUpInterceptor.kt:76)
	at okhttp3.internal.http.RealInterceptorChain.proceed(RealInterceptorChain.kt:109)
	at okhttp3.internal.connection.RealCall.getResponseWithInterceptorChain$okhttp(RealCall.kt:201)
	at okhttp3.internal.connection.RealCall$AsyncCall.run(RealCall.kt:517)
	at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)
	at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:644)
	at java.lang.Thread.run(Thread.java:1012)
Caused by: java.security.cert.CertificateException: Chain validation failed
	at com.android.org.conscrypt.TrustManagerImpl.verifyChain(TrustManagerImpl.java:719)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:549)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:570)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrustedRecursive(TrustManagerImpl.java:615)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:505)
	at com.android.org.conscrypt.TrustManagerImpl.checkTrusted(TrustManagerImpl.java:425)
	at com.android.org.conscrypt.TrustManagerImpl.getTrustedChainForServer(TrustManagerImpl.java:353)
	at android.security.net.config.NetworkSecurityTrustManager.checkServerTrusted(NetworkSecurityTrustManager.java:94)
	at android.security.net.config.RootTrustManager.checkServerTrusted(RootTrustManager.java:90)
	at com.android.org.conscrypt.ConscryptEngineSocket$2.checkServerTrusted(ConscryptEngineSocket.java:163)
	at com.android.org.conscrypt.Platform.checkServerTrusted(Platform.java:260)
	at com.android.org.conscrypt.ConscryptEngine.verifyCertificateChain(ConscryptEngine.java:1638)
	at com.android.org.conscrypt.NativeCrypto.ENGINE_SSL_read_direct(Native Method)
	at com.android.org.conscrypt.NativeSsl.readDirectByteBuffer(NativeSsl.java:568)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextDataDirect(ConscryptEngine.java:1095)
	at com.android.org.conscrypt.ConscryptEngine.readPlaintextData(ConscryptEngine.java:1079)
	... 27 more
Caused by: java.security.cert.CertPathValidatorException: OCSP response error: TRY_LATER
	at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:135)
	at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:222)
	at sun.security.provider.certpath.PKIXCertPathValidator.validate(PKIXCertPathValidator.java:140)
	at sun.security.provider.certpath.PKIXCertPathValidator.engineValidate(PKIXCertPathValidator.java:79)
	at java.security.cert.CertPathValidator.validate(CertPathValidator.java:309)
	at com.android.org.conscrypt.TrustManagerImpl.verifyChain(TrustManagerImpl.java:715)
	... 42 more
Caused by: java.security.cert.CertPathValidatorException: OCSP response error: TRY_LATER
	at sun.security.provider.certpath.OCSPResponse.verify(OCSPResponse.java:399)
	at sun.security.provider.certpath.RevocationChecker.checkOCSP(RevocationChecker.java:709)
	at sun.security.provider.certpath.RevocationChecker.check(RevocationChecker.java:363)
	at sun.security.provider.certpath.RevocationChecker.check(RevocationChecker.java:337)
	at sun.security.provider.certpath.PKIXMasterCertPathValidator.validate(PKIXMasterCertPathValidator.java:125)
	... 47 more

Device information:

Key Value
FFUpdater version 79.3.1 (177) release Github
Device FP3 (lineage_FP3, FP3, FP3)
Manufacturer Fairphone (Fairphone)
Supported ABIs arm64-v8a, armeabi-v7a, armeabi
Android version 14 (SDK: 34)
OS d900d91c1dc3, root, release-keys, 1734481110000

@celenityy
Copy link

their f-droid repo is now unavailable for ffupdater:

Our F-Droid repo was acting funny, though it should be sorted. I wonder if it works now?

FYI: We're also publishing the APK files as GitLab Releases on our repo.

Please let me know if there's anything we can do to help or make this easier for you :)

@sankhababu
Copy link

Mull dev was so responsible person, that he discontinued the app only after latest release and given the time to come forward other dev to continue. Hat's off to him 🫡

IF dev team rapidly released the current version and continuing updates like Mull, so users should not be out of protection.
We can perceive that they are a responsible group with a mission.

Morning shows the day - isn't often true?

Let's follow the journey optimistically. 🙋

@Tobi823
Copy link
Owner

Tobi823 commented Jan 22, 2025

IF dev team rapidly released the current version and continuing updates like Mull, so users should not be out of protection.
We can perceive that they are a responsible group with a mission.

Agreed. I try to do it at the weekend

@Uj947nXmRqV2nRaWshKtHzTvckUUpD
Copy link

Uj947nXmRqV2nRaWshKtHzTvckUUpD commented Jan 29, 2025

related #658
mull and mulch are gone and must be removed from ffupdater

so far ironfox looks great, but it still has 4 trackers as seen in "app manager"

@celenityy
Copy link

it still has 4 trackers as seen in "app manager"

It doesn't. We stub the proprietary/tracking libraries, just as Mull did and Fennec F-Droid does. Since the libraries are stubbed, naive 'tracker' scanning apps may falsely claim the libraries are still present, when in reality they aren't.

@Uj947nXmRqV2nRaWshKtHzTvckUUpD

it still has 4 trackers as seen in "app manager"

It doesn't. We stub the proprietary/tracking libraries, just as Mull did and Fennec F-Droid does. Since the libraries are stubbed, naive 'tracker' scanning apps may falsely claim the libraries are still present, when in reality they aren't.

that sounds awesome. i'm going to use it then

@slcw
Copy link

slcw commented Feb 2, 2025

I saw that. Almost a day after the official Firefox. I'm still playing around with it. I make some about:config changes because I find Firefox to be way too slow on Android by default.

Would you mind sharing your about:config changes to increase the speed of the browser on Android?

Also, I've been playing with Iron Fox for the past week and I also believe it's faster than Mull. Otherwise, it appears to be very similar. Since both Mull and Mulch have gone EOL, I think Iron Fox would be a great addition to ffupdater. I'm currently using Obtainium for Iron Fox, but all my other browsers are updated through ffupdater. It's driving my OCD crazy!

@slcw
Copy link

slcw commented Feb 2, 2025

Mull dev was so responsible person, that he discontinued the app only after latest release and given the time to come forward other dev to continue. Hat's off to him 🫡

Agreed. It was a one-man show, and he did a great job keeping both Mull and Mulch up to date. Iron Fox has a 3-person team at this time, and the lead dev seems to be committed to the project. I hope it works out, and Iron Fox remains updated for the foreseeable future. I like it so far.

@Uj947nXmRqV2nRaWshKtHzTvckUUpD

I saw that. Almost a day after the official Firefox. I'm still playing around with it. I make some about:config changes because I find Firefox to be way too slow on Android by default.

Would you mind sharing your about:config changes to increase the speed of the browser on Android?

Also, I've been playing with Iron Fox for the past week and I also believe it's faster than Mull. Otherwise, it appears to be very similar. Since both Mull and Mulch have gone EOL, I think Iron Fox would be a great addition to ffupdater. I'm currently using Obtainium for Iron Fox, but all my other browsers are updated through ffupdater. It's driving my OCD crazy!

btw iron fox is on neo store as well, fixed my ocd :)

@chris122380
Copy link

chris122380 commented Feb 2, 2025

I saw that. Almost a day after the official Firefox. I'm still playing around with it. I make some about:config changes because I find Firefox to be way too slow on Android by default.

Would you mind sharing your about:config changes to increase the speed of the browser on Android?

Also, I've been playing with Iron Fox for the past week and I also believe it's faster than Mull. Otherwise, it appears to be very similar. Since both Mull and Mulch have gone EOL, I think Iron Fox would be a great addition to ffupdater. I'm currently using Obtainium for Iron Fox, but all my other browsers are updated through ffupdater. It's driving my OCD crazy!

Most of these I found through Google and AI searching. I can't guarantee their privacy. That's probably why in some cases they're turned off or on but then they make the browser so slow (For example, allowing prefetching. You would also need to turn off disable prefetching in ublock origin) One needs to be adjusted to allow Instagram photos and came from an issue with Mull.
I'm just a user like you. I'm sure there are probably better ways to improve Firefox on Android (I'm often complaining about it in reviews in the play store and on X to Mozilla in hopes they will make it better).

network.http.referer.XOriginPolicy - 0 network.dns.disablePrefetchFromHTTPS - False network.dns.disablePrefetch - False network.predictor.enable-prefetch - True network.prefetch-next- True nglayout.initialpaint.delay - 0 nglayout.initialpaint.delay_in _oopif - 0

Any other suggestions to allow a faster smoother Firefox or Iron Fox on Android would be great. Load times are still slower than chromium-based browsers. I use Brave as my default and have Firefox based browser as a backup. Chromium ones can load a page in an average of less than 5 seconds. Well Firefox based ones usually take 15 seconds or more. I just wish Mozilla would spend just as much time on their mobile version as they do their desktop version.

@ethanc8
Copy link

ethanc8 commented Feb 28, 2025

The LibreWolf developers now recommend to use IronFox.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

10 participants