Note, this doesn't involve any interaction beyond opening the browser and waiting a few minutes. What I found were dozens of requests, which loaded nearly 16 MB in data. Lets break down what I saw.pic.twitter.com/csegTyjuJF
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Note, this doesn't involve any interaction beyond opening the browser and waiting a few minutes. What I found were dozens of requests, which loaded nearly 16 MB in data. Lets break down what I saw.pic.twitter.com/csegTyjuJF
Let's first look at which endpoints were hit, and how often. Firefox launched with a http://mozilla.org tab opened in a blurred tab. Resources loaded from there would explain the 26 calls. Some of these other hosts should be familiar, if you've read my other browser threads.pic.twitter.com/zsXoKQw0dD
The first 5 requests were for http://detectportal.firefox.com over the HTTP protocol. These are meant to detect public networks, like that available at the coffee shop. If the response does not contain 'success', it's a good indicator you're on a portal.pic.twitter.com/r8nsqAa5CZ
Next up were 2 identical requests for http://ocsp.digicert.com . OCSP is the Online Certificate Status Protocol, and is used to check for revocation of bad certs. I assume FF is testing its own certificate, since the browser opens with a Mozilla tab. No clue why it checked twice.
A call to http://snippets.cdn.mozilla.net is next. The path carries information about the device I am using: OS, 32 or 64 bit, lang, etc. The call redirects to 12 KB of JSON. Snippets are small messages displayed on the New Tab.pic.twitter.com/ijzQAT6GL8
Two Remote Settings calls are made to the http://tiles.services.mozilla.com host. They are nearly identical bits of JSON. One is for the cfr provider, and the other is for cfr-fxa, per the https://github.com/mozilla/gecko/blob/central/testing/profiles/common/user.js#L9-L10 … resource. I have no remote settings, which explains ASR_RS_NO_MESSAGES.pic.twitter.com/lTTuA5A6n7
A third "http://tiles.services .moz" call is made, with a different body. It contains a client_id. Along with it were a few other bits of data: event=AS_ENABLED locale=en-US profile_creation_date=18134 region=UNSET release_channel=release topic=main value=0 version=68.0.2
The http://mozilla.org tab discussing the importance of Privacy loads in the background, bringing along with it the Google Tag Manager and Google Analytics. Hello, Google.pic.twitter.com/SlNY9Bltss
It looks like we aren't done talking with Google either. Firefox makes its next move in downloading Safe Browsing bits from Google APIs. This is common among browsers today (Exception: @brave proxies the call through http://brave.com , keeping users out of Google's hands).
Next up, http://normandy.cdn.mozilla.net . Mozilla says it "…is a feature that allows Mozilla to change the default value of a preference for a targeted set of users, without deploying an update to FF." It returns a JSON file with a handful of URLs. Firefox will use these URLs at times.pic.twitter.com/nyLsLHUxFB
In fact, part of the Normandy response included a URL for the classify-client action. Firefox makes a call for that next. The server returns a bit of JSON that specifies the users country, and a request time: {"country":"US","request_time":"2019-08-26T02:41:45.823283Z"}
The Normandy work doesn't stop there. Next we see calls to http://firefox.settings.services.mozilla.com . Each with a different path. The first request carries the bits that make up the path for the second request. And the third looks like the Snippets file from earlier.pic.twitter.com/mA4bUNVOzQ
The last normandy response above then instructs Firefox to download numerous certificates from http://content-signature-2.cdn.mozilla.net . At this point, Firefox takes a break and checks for available updates. It doesn't find any, so we get an XML response with an empty <updates> object.pic.twitter.com/x4kFeTQtho
Another Normandy call to retrieve settings is made. This one results in a large list of buckets or records; I'm not sure of the nomenclature here. Either way, we see numerous calls for more data made as a result. For instance, "Have I Been Pwned" data is retrieved.pic.twitter.com/sw2iG4spSO
After a few more normandy calls, we now see a request to the aus5 sub on http://mozilla.org . This also passes device information, resulting in an XML response containing addons to download/install. The OpenH264 addon is requested over HTTP. I hope they do integrity checking!pic.twitter.com/OswiXN0wJy
Also, it looks like these identical files are being downloaded twice. Is it a coincidence that Firefox opens with 2 tabs, and makes 2 identical calls? The 2nd addon is WideVine. This is requested directly from Google's http://gvt1.com domain. Hello again, Google.
Firefox has been open for a few minutes, and Mozilla would like to know about me, my machine, and how I have Firefox configured. 37,097 bytes of information are sent to http://incoming.telemetry.mozilla.org .pic.twitter.com/KLr5iYMDSt
Of all browsers I've reviewed recently, Firefox is one of the most active upon installation. I think it may be the only one to immediately collect telemetry data too. I would like to see them proxy calls to Google endpoints, and avoid the initial http://mozilla.org tab.
That pretty much covers what Firefox does when you first run the browser after installation. If you enjoyed this thread, see the others I did on Opera, Vivaldi, Brave, Dissenter, and Chrome. Take care!https://twitter.com/jonathansampson/status/1165392803687542790 …
I also reviewed Google Chrome, for those interested:https://twitter.com/jonathansampson/status/1165493206441779200 …
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.