Files
IronFox/docs/Network-Connections.md
celenity e6c69ef28d IronFox v144.0
ironfox-oss/IronFox!92
____

## Changes

- [Added a separate toggle in settings to enable/disable JIT for **extensions**](48a42e213a) when JIT is otherwise disabled globally *(**Disabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Security` -> **`Enable JavaScript Just-in-time Compilation (JIT) for extensions`**.
- [Added support for natively enabling/disabling WebGL per-site](5e1acb19a6) via FPP overrides. **It is now recommended to disable the uBlock Origin `Block WebGL` lists** *(The `Block WebGL` lists will be removed from the uBlock Origin config entirely in the near future, but we're keeping them for now to ex. give users time to update)*. See [Notes](#notes) below for details, such as how you can manually allow desired websites to use WebGL.
- [Added a toggle in settings to enable or disable our default WebGL overrides](c9298799ee) *(**Enabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Privacy` -> **`Enable WebGL overrides from IronFox`**. When WebGL is enabled, this setting enables WebGL by default for certain websites, to reduce breakage/unexpected behavior. Note that this list is **NOT** fetched/updated remotely.
- [Added a toggle in settings to enable or disable spoofing the timezone to `UTC-0`](c8cb5064e4) *(**Disabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Privacy` -> **`Spoof timezone to UTC-0`**.
- [Added a toggle in settings to enable or disable our default timezone overrides](c8cb5064e4) *(**Enabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Privacy` -> **`Enable timezone spoofing overrides from IronFox`**. When timezone spoofing is enabled, this setting disables timezone spoofing by default for certain websites, to reduce breakage/unexpected behavior. Note that this list is **NOT** fetched/updated remotely.
- [Added a toggle in settings to enable or disable *Mozilla's* default fingerprinting protection overrides](64e3706be8) to reduce website breakage *(**Enabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Privacy` -> **`Enable fingerprinting protection overrides from Mozilla`**. Note that this list **IS** fetched/updated remotely.
- [Added a toggle in settings to enable or disable *our* default fingerprinting protection overrides](64e3706be8) to reduce website breakage *(**Enabled** by default)*, located at `Settings` -> `IronFox` -> `IronFox settings` -> `Privacy` -> **`Enable fingerprinting protection overrides from IronFox`**. This toggle does **not** disable fingerprinting protection overrides that we set to **harden** protection for certain websites. Note that this list is **NOT** fetched/updated remotely.
- [Implemented](522770b2dc) [Phoenix's extension blocklist](https://codeberg.org/celenity/Phoenix/src/branch/pages/build/policies/blocklist.json) to block malicious/phishing/sketchy extensions.
- [Locked Gecko preferences controlled by UI settings](bc9df5c52c) *(See [details](https://gitlab.com/ironfox-oss/IronFox/-/blob/dev/docs/FAQ.md#why-are-certain-preferences-locked))*.
- [Prevented the JIT toggle from controlling `javascript.options.main_process_disable_jit`](8171a4da48), as this pref is not required for JIT to function, and is preferable to leave on - even when JIT is enabled, to improve security.
- Updated to Firefox [`144.0`](https://firefox.com/firefox/android/144.0/releasenotes/).
- Updated microG to [`v0.3.10.250932`](https://github.com/microg/GmsCore/releases/tag/v0.3.10.250932).
- Updated Phoenix to [`2025.10.12.1`](https://codeberg.org/celenity/Phoenix/releases/tag/2025.10.12.1).
- [Other minor tweaks, adjustments, and enhancements](https://gitlab.com/ironfox-oss/IronFox/-/merge_requests/92/diffs).

## Notes

You can manually allow websites to use WebGL with the `privacy.fingerprintingProtection.granularOverrides` preference at `about:config`. For instance, if I want to allow **`example.com`** to use WebGL, I would set the value of `privacy.fingerprintingProtection.granularOverrides` to:

```sh
[{"firstPartyDomain":"example.com","overrides":"-DisableWebGL"}]
```

If I *also* wanted to allow `example2.com`, I'd set the value to:

```sh
[{"firstPartyDomain":"example.com","overrides":"-DisableWebGL"},{"firstPartyDomain":"example2.com","overrides":"-DisableWebGL"}]
```

**[Please report websites that require WebGL to us if possible](https://gitlab.com/ironfox-oss/IronFox/-/issues)**, so that we can investigate and potentially add them to the default WebGL overrides list.

MR-author: celenity <celenity@celenity.dev>
Co-authored-by: Weblate <hosted@weblate.org>
Co-authored-by: Akash Yadav <itsaky01@gmail.com>
Approved-by: celenity <celenity@celenity.dev>
Merged-by: celenity <celenity@celenity.dev>
2025-10-16 04:14:42 +00:00

16 KiB

Network Connections

This page serves to document connections commonly made by IronFox. It will explain the purpose of each connection, what data is shared, and how to disable (or override if applicable) the connection if desired.

Default

These connections are made by default, out of the box.

Add-on Updates

  • https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=2&*

If you install add-ons from outside of the AMO (addons.mozilla.org), you may notice additional connections to other servers as part of this functionality (as specified by the extension(s) you install).

Operator: Mozilla - Privacy policy

Purpose: Downloads updates for installed extensions and themes.

Type(s) of data shared: Identifiers of installed add-ons, Current versions of installed add-ons, Browser version, User Agent, public IP address.

How often the connection occurs: Hourly (extensions.update.interval).

Control: You can disable add-on updates globally by setting extensions.update.enabled to false in your about:config.

You can also disable updates for individual add-ons by setting extensions.{GUID}.update.enabled to false in your about:config, replacing {GUID} with the ID of your desired add-on (IDs of your installed extensions can be found at about:support). For example: if I wanted to disable updates for uBlock Origin, I would set extensions.uBlock0@raymondhill.net.update.enabled to false.

Note that disabling add-on updates is NOT recommended.

Autograph

  • https://content-signature-2.cdn.mozilla.net/g/chains/*

Operator: Mozilla - Privacy policy

Purpose: Provides signing/verification for various functionality, including: content signatures, and extension signing (1, 2).

Type(s) of data shared: User Agent, public IP address.

How often the connection occurs: Every browser launch, and periodically after.

Control: This request can be disabled by appending ,content-signature-2.cdn.mozilla.net to the value of network.dns.localDomains in your about:config (or by blocking content-signature-2.cdn.mozilla.net on the network level); though it is NOT recommended to disable or block this connection.

DNS over HTTPS

  • https://dns.quad9.net/dns-query

Operator: Quad9 - Privacy policy

Purpose: Provides encrypted domain name resolution.

Type(s) of data shared: Domain names of servers you connect to, User Agent, public IP address.

How often the connection occurs: Every time you connect to a domain.

Control: You can change DNS providers by navigating to Privacy and security -> DNS over HTTPS in settings. Under Max Protection (or your chosen mode)-> Choose provider:, you can either select one of our presets:

  • AdGuard - https://dns.adguard-dns.com/dns-query - Privacy policy
  • AdGuard (Unfiltered) - https://unfiltered.adguard-dns.com/dns-query - Privacy policy
  • Cloudflare - https://mozilla.cloudflare-dns.com/dns-query - Privacy policy
  • Cloudflare (Malware Protection) - https://security.cloudflare-dns.com/dns-query - Privacy policy
  • DNS0 - https://dns0.eu - Privacy policy
  • DNS0 (ZERO) - https://zero.dns0.eu - Privacy policy
  • DNS4EU (Ad Blocking) - https://noads.joindns4.eu/dns-query - Privacy policy
  • DNS4EU (Protective) - https://protective.joindns4.eu/dns-query - Privacy policy
  • DNS4EU (Unfiltered) - https://unfiltered.joindns4.eu/dns-query - Privacy policy
  • Mullvad (Base) - https://base.dns.mullvad.net/dns-query - Privacy policy
  • Mullvad (Unfiltered) - https://dns.mullvad.net/dns-query - Privacy policy
  • NextDNS - https://firefox.dns.nextdns.io/ - Privacy policy
  • Wikimedia - https://wikimedia-dns.org/dns-query - Privacy policy

Or you can add your own provider by selecting Custom, and entering your desired URL.

You can also set DNS over HTTPS to use your system's DNS resolver, by selecting Default Protection from the same screen.

Initial add-on installation

  • https://addons.mozilla.org/firefox/downloads/latest/uBlock0@raymondhill.net/latest.xpi

Operator: Mozilla - Privacy policy

Purpose: Downloads and installs the uBlock Origin extensions.

Type(s) of data shared: User Agent, public IP address.

How often the connection occurs: Once, on initial set-up.

Control: Uncheck the box to install uBlock Origin on the onboarding if desired, though doing so is NOT recommended.

Push Service

  • wss://push.services.mozilla.com/

Operator: Mozilla - Privacy policy

Purpose: Provides support for web push notifications and Remote Settings.

Type(s) of data shared: Random identifier (dom.push.userAgentID), User Agent, public IP address.

How often the connection occurs: Every browser launch, and periodically after.

Control: You can disable this functionality by setting the following preferences in your about:config:

  • dom.push.connection.enabled -> false
  • dom.push.userAgentID ->

Note that disabling this feature is NOT recommended.

Remote Settings

  • https://firefox.settings.services.mozilla.com/v1/buckets/blocklists/collections/*
  • https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/*
  • https://firefox.settings.services.mozilla.com/v1/buckets/monitor/collections/changes/changeset?_expected=*
  • https://firefox.settings.services.mozilla.com/v1/buckets/security-state/collections/*
  • https://firefox-settings-attachments.cdn.mozilla.net/bundles/security-state--intermediates.zip
  • https://firefox-settings-attachments.cdn.mozilla.net/bundles/startup.json.mozlz4
  • https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/tracking-protection-lists/*
  • https://firefox-settings-attachments.cdn.mozilla.net/security-state-staging/cert-revocations/*

Operator: Mozilla - Privacy policy

Purpose: Downloads configurations and databases for various functionality, including: Add-on blocklists, Certificate Revocations, Certificate Transparency logs, Intermediate Certificates, Tracking Protection lists, Translation models, etc.

Type(s) of data shared: User Agent, public IP address.

How often the connection occurs: Hourly (services.settings.poll_interval).

Control: This functionality can be disabled globally by setting browser.ironfox.services.settings.allowedCollections to in your about:config, though it is NOT recommended to disable this feature.

You can also disable certain individual parts of this functionality if desired by setting the following preferences in your about:config:

Note that disabling this functionality is NOT recommended.

Safe Browsing

  • https://safebrowsing.ironfoxoss.org/v4/fullHashes:find?$ct=application/x-protobuf&*
  • https://safebrowsing.ironfoxoss.org/v4/threatListUpdates:fetch?$ct=application/x-protobuf&*
  • https://safebrowsing.ironfoxoss.org/v5/hashes:search?*
  • https://safebrowsing.ironfoxoss.org/v5/hashLists:batchGet?*

Operator: IronFox OSS - Privacy policy

Purpose: Provides real-time protection against malware and phishing (Proxies https://safebrowsing.googleapis.com).

Type(s) of data shared: Partial URL hashes upon potential matches, User Agent, public IP address.

How often the connection occurs: Every browser launch, and every 30 minutes after.

Control: See our Safe Browsing page for more details, including how to disable Safe Browsing or change providers if desired. Note that disabling Safe Browsing is NOT recommended.

System Add-on Updates

  • https://archive.mozilla.org/pub/system-addons/*
  • https://aus5.mozilla.org/update/3/SystemAddons/*

Operator: Mozilla - Privacy policy

Purpose: Downloads and updates system add-ons.

Type(s) of data shared: Browser version, locale, OS, OS architecture, OS version, User Agent, public IP address.

How often the connection occurs: Hourly.

Control: You can disable this functionality by setting extensions.systemAddon.update.enabled to false in your about:config; though this is NOT recommended.

uBlock Origin

  • https://cdn.jsdelivr.net/gh/uBlockOrigin/uAssetsCDN@main/* - Privacy Policy
  • https://cdn.statically.io/gh/uBlockOrigin/uAssetsCDN/main/* - Privacy Policy
  • https://filters.adtidy.org/extension/ublock/filters/* - Privacy Policy
  • https://gitlab.com/celenityy/BadBlock/-/raw/* - Privacy Policy
  • https://gitlab.com/celenityy/Phoenix/-/raw/* - Privacy Policy
  • https://gitlab.com/DandelionSprout/adfilt/-/raw/master/* - Privacy Policy
  • https://gitlab.com/hagezi/mirror/-/raw/main/dns-blocklists/adblock/* - Privacy Policy
  • https://malware-filter.gitlab.io/urlhaus-filter/urlhaus-filter-ag-online.txt - Privacy Policy
  • https://malware-filter.pages.dev/urlhaus-filter-ag-online.txt - Privacy Policy
  • https://pgl.yoyo.org/adservers/serverlist.php?hostformat=hosts&showintro=1&mimetype=plaintext
  • https://publicsuffix.org/list/public_suffix_list.dat - Privacy policy
  • https://raw.githubusercontent.com/fmhy/FMHYFilterlist/main/filterlist-basic.txt - Privacy Policy
  • https://raw.githubusercontent.com/yokoffing/filterlists/main/* - Privacy Policy
  • https://secure.fanboy.co.nz/*
  • https://someonewhocares.org/hosts/hosts
  • https://ublockorigin.github.io/uAssets/* - Privacy Policy
  • https://ublockorigin.github.io/uAssetsCDN/* - Privacy Policy
  • https://ublockorigin.pages.dev/* - Privacy Policy

Purpose: Downloads and updates for filterlists and other resources in uBlock Origin.

Type(s) of data shared: User Agent, public IP address.

How often the connection occurs: Periodically.

Control: You can disable uBlock Origin by navigating to Advanced -> Extensions -> uBlock Origin in settings, and selecting Enabled. You can also uninstall uBlock Origin entirely from the same screen, by selecting Remove; though disabling or uninstalling uBlock Origin is NOT recommended.

Additional

The following are optional, non-standard connections that IronFox might make, depending on the features you decide to use.

Geolocation

  • https://api.beacondb.net/v1/geolocate

Operator: BeaconDB - Privacy policy

Purpose: Serves as a fallback to provide geolocation when the system's provider is unavailable.

Type(s) of data shared: Strength and general information of nearby cellular towards and Wi-Fi networks (if available/supported), User Agent, public IP address.

How often the connection occurs: When/if you grant a website permission to access your location and if your system's geolocation provider is unavailable.

Control: You can simply choose not to grant websites permission to access your location, or you can disable the network geolocation provider entirely by setting geo.provider.network.url to in your about:config; though doing so may cause issues with geolocation if your system's geolocation provider is unavailable.

You can also change the network geolocation provider if desired by setting the value of geo.provider.network.url to your preferred URL in the about:config.