Mozilla Firefox To Block Malicious Crypto Mining With Its Next Update

The next update for the popular Mozilla Firefox Internet browser will add a feature to shield against background crypto mining programs. The Firefox will try putting an end to cryptojacking, a malicious practice that usurps the processing power of the user’s device or hardware to mine for cryptocurrencies.

Firefox will block the scripts inserted into web pages that perform cryptojacking, as the browser’s upcoming update focuses on preventing data collection techniques that violate user privacy, a practice known as tracking. The update will aim to “protect” and “give a voice” to internet users who are victims of “deceptive practices that collect (and use) information invisibly” and user processing power, according to the official statement.

According to Nick Nguyen, the vice president of Firefox, the new security features will be running in the testing phase of the Firefox Nightly version throughout September.

Mozilla Firefox will tackle background crypto mining, joining Opera and Google Chrome in this regard

With this update, Mozilla Firefox joins the Opera and Google Chrome browsers who have already taken steps to tackle background crypto mining programs. In the case of Opera, however, the company announced in January of this year the implementation of new levels of protection against unauthorized mining in its browser.

On the other hand, Google Chrome removed extensions that offer crypto mining services from its Chrome web store. This measure, unlike Opera’s, also affected those applications that informed users that they would use their device’s ability to mine crypto coins. This decision occurred after Chrome accepted these extensions while they were exclusively dedicated to in-browser crypto mining. However, most of these did not meet the conditions.

Keep in mind that web crypto mining is not a malicious activity, in essence. However, cryptojacking (the practice to use victims devices’ computing power to mine for cryptocurrencies) is considered a malicious attack.

You might like

About the Author: Anna Galvez

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.