Issue 41

Mozilla, internet villain

Delivered on 16 July 2019 by Justin Pyvis. About a 5 min read.

Last week the United Kingdom's Internet Services Providers’ Association (ISPA), a Trade Association lobby group, released its finalists for internet 'hero' and 'villain' of the year, listing Mozilla - creator of the Firefox web browser - as one of three finalists in the villain category. After some serious backlash, it subsequently withdrew both Mozilla's nomination and the villain category altogether.

Let's take a quick look at why Mozilla, "a non-profit organization that promotes openness, innovation and participation on the Internet", might have been nominated. But first, the other contenders.

Joining Mozilla as finalists for internet villain of the year was the European Union's Article 13 Copyright Directive, "for threatening freedom of expression online", and President Donald Trump, "for causing a huge amount of uncertainty across the complex, global telecommunications supply chain in the course of trying to protect national security".

I actually took little issue with those two, which are both deserving for the reasons cited, although I might have nominated Peter Dutton for Australia's ill-conceived encryption bill instead of the EU's Article 13. But Mozilla? It was listed because of its plan to allow Firefox to use DNS over HTTPS (DoH, a relatively new method to encrypt DNS requests directly in the browser):

" such a way as to bypass UK filtering obligations and parental controls, undermining internet safety standards in the UK."

Right. It might as well have rephrased that to:

" such a way as to bypass the UK government's censorship and undermine our members' ability to monetise consumer browsing activity."

For those unaware, DNS requests are the last bastion of the old internet yet to undergo a cryptographic revolution. DNS requests - that is, requests to a public directory that translates domain names (e.g. into corresponding IP addresses (e.g. - are sent in plain text and so can be used by internet service providers to monitor people's browsing history.

This can happen even if you're using a VPN (as shown in this image) unless you've manually changed your DNS server or enabled what is called "DNS leak protection", which routes all DNS queries to the provider through the encrypted VPN tunnel.

As you might expect, the whole plain-text DNS data collection process can be quite lucrative to ISPs when that data are on-sold to advertisers or any other organisation that might be interested in people's digital footprints.

Work to fix the DNS privacy hole has been under way for some time. For example, Cloudflare, Google and Quad9 have all been pushing for DNS over TLS (DoT), a similar technology to DoH but one which uses its own unique port, 853.

However, the advantage of DoH is that requests are effectively buried in the rest of the internet's encrypted traffic on port 443, making it indistinguishable from the vast majority of data that flow across the internet every day. This is how many VPNs operate in places such as China, where conventional VPN ports are blocked as part of its "great firewall". Without DNS leaks and with everything funnelled through port 443, the only way to censor people would be to effectively turn the internet off (and yes, that happens more than you think). Being able to properly encrypt data, including something as seemingly simple as browsing history, can literally be a matter of life and death for some people.

Essentially Mozilla should be praised, not condemned, for trying to improve privacy on the internet by allowing people to enable DoH directly in their browser. The real villains are those such as the ISPA and its political lackeys, whose constant attacks on encryption are nothing but a blatant attempt by lobbyists to keep the gravy train flowing, all under the opaque guise of national security (kudos to UK provider Andrews & Arnold for donating the equivalent of an ISPA membership fee to Mozilla).

Mozilla's Firefox 68 was released last week. If you use Chrome or one of Microsoft's god-awful browsers, consider giving it a whirl. You can enable DoH by going to Preferences -> General -> Network Settings -> Enable DNS over HTTPS.

Google's creepiness

What a week for Google. First it was revealed that, like Amazon, the things Google Home devices record are listened to by humans (as I've said many times, that's how "artificial intelligence" - as the term is being improperly used, anyway - works). Worse, it was recording private conversations without first being "triggered" by the user.

Then we have more "business as usual" news, such as Google making your private photos semi-public and oh yeah, it's also "helping China’s authoritarian government conduct mass surveillance against its citizens". Do no evil, right...

Learn more:


That didn't take long: Huawei is back in business. Maybe not for 5G in the countries that banned it for "national security", but all of its consumer devices should be fine (which are more of a threat to national security than Huawei's network infrastructure).

Learn more:

Other bits of interest

Image of the week

This week's data breaches

The bigger the database, the more valuable it is to hackers.

The breaches:

Issue 41: Mozilla, internet villain was compiled by Justin Pyvis and delivered on 16 July 2019. Join the conversation on the fediverse at