Bonum Certa Men Certa

Mozilla Finishes Sabotaging SeaMonkey. Highlights From IRC and SeaMonkey Meeting Minutes.



Reprinted with permission from Ryan Farmer

F

rom IRC and the Meeting Notes for today.



First off, Mozilla is “cutting SeaMonkey loose” and not allowing them to use any infrastructure soon. I think they’re just angry that the Suite they threw away in 2006 gets updates and is still cooler than Firefox.



Mozilla finally decided to fully cut us loose in Q3. Formally and legally this is all in order.



  • Source code will probably be removed from comm-central because it seems parts of MZLA and/or the Thunderbird council are eager to do the same.


  • Fortunately we are mostly independent already and it will not affect the 2.53 line or building releases.
    • Depending on when this will happen we will have a deplayed release and maybe broken updates for one release too.


  • If this happens it is unlikely we will pursue upstream fixes for suite any longer and just concentrate on the 2.53 fork


  • We need to find replacements for bugzilla, translations via Pontoon, add-on and the distribution site.
    • Reviews for SeaMonkey add-ons seem to no longer be done anyway. We don’t have any access there.
SeaMonkey Meeting Minutes for August 20, 2023


There were also some disturbing notes about the status of SeaMonkey’s infrastructure:



Our infrastructure is using Azure.



  • ewong has been looking at Kallithea, RhodeCode and other similar tools which are needed later to automate source code management for non mozilla repos (tools, website and others).
    • Also evaluation of Ansible and Terraform going together with it is done.
SeaMonkey Meeting Minutes for August 20, 2023


Usage of Azure for anything is troubling, as it’s just not possible to make Microsoft products secure.



 According to data from Google Project Zero, Microsoft products have accounted for an aggregate of 42.5% of all zero-days discovered since 2014.



Microsoft’s lack of transparency applies to breaches, irresponsible security practices and vulnerabilities, all of which expose their customers to risks they are deliberately kept in the dark about.



In March 2023, a member of Tenable’s Research team was investigating Microsoft’s Azure platform and related services. The researcher discovered an issue which would enable an unauthenticated attacker to access cross-tenant applications and sensitive data, such as authentication secrets. To give you an idea of how bad this is, our team very quickly discovered authentication secrets to a bank. They were so concerned about the seriousness and the ethics of the issue that we immediately notified Microsoft.



Did Microsoft quickly fix the issue that could effectively lead to the breach of multiple customers’ networks and services? Of course not. They took more than 90 days to implement a partial fix – and only for new applications loaded in the service.



That means that as of today, the bank I referenced above is still vulnerable, more than 120 days since we reported the issue, as are all of the other organizations that had launched the service prior to the fix. And, to the best of our knowledge, they still have no idea they are at risk and therefore can’t make an informed decision about compensating controls and other risk-mitigating actions. Microsoft claims that they will fix the issue by the end of September, four months after we notified them. That’s grossly irresponsible, if not blatantly negligent. We know about the issue, Microsoft knows about the issue, and hopefully, threat actors don’t.

-Tenable CEO Amit Yoran “Microsoft: The truth Is even worse than you think”


It’s good that they’re getting away from Azure for building the binaries from their official Web site (apparently?). Should have never used it. Have no idea what Microsoft might be stuffing in there and there’s no reproducible build data that comes with the binaries, afaik.



Unfortunately, they also consider Azure CDN for hosting the binaries themselves. *facepalm*



Some Capacity planning to find the best price/performance ratio is carried out.



  • Other than azure hosting options because of price are also evaluated.


  • ewong started to look at Azure CDN as a download server.
-SeaMonkey Meeting Minutes for August 20, 2023


Mozilla has “stopped testing” 32-bit Linux builds of Firefox, but SeaMonkey plans to stop providing 32-bit builds on any platform as well, it seems. It affects SeaMonkey even more because it’s single-process and the Web is so bloated and full of trash that 4 GB of RAM is no longer enough to contain all of the shit people are loading in a Web browser.



frg proposes to end 32 bit release support in 2024. Main reason is that modern websites are memory hungry and the 32 bit only architecture cause more and more oom crashes and subsequent complaints. Mozilla recently stopped testing Linux x86 releases too.



  • No consensus reached about it yet. So far building it is possible with gcc 8.3.1 under CentOS 7 and clang under Windows.
-SeaMonkey Meeting Minutes for August 20, 2023


An interesting insight into Mozilla’s Firefox build process. It seems they no longer use shit-ass Windows to create builds for shit-ass Windows. They cross-compile them from Linux in a process that needs Wine? :/



Mozilla switched Windows builds to cross compile on Linux.



  • This would need backports but is not 100% native (needs Wine). So currently no plans to do this for SeaMonkey.


  • Discussion for later when setting up jenkins. Even buildbot had some version specific files outside the tree.
-SeaMonkey Meeting Minutes for August 20, 2023


Some talk about wanting to eliminate excessive different compilers.



Microsoft compilers are garbage and the way I understand it, since 2019 they shove telemetry crap in your program whether you want it or not.



When I was looking at WavPack binaries for 64-bit Windows, I ended up using the MinGW builds that were cross-compiled from Linux because Microsoft’s compiler added bloat, ran slower on the CPU, and also pointlessly dropped Windows XP support (both 32-bit and 64-bit x86) although the MinGW builds were smaller, faster and even run on Windows 2000.



To reduce the use of different compilers we are looking into compiling future 2.53 Windows releases with clang 14 or later.



  • Currently CentOS 7 can not use the mozilla provided compilers because of a downlevel libstdc.


VS2022 is supported since 2.53.10b1 pre but building is spotty because of changes in new compiler releases.



  • The Windows build server will not be switched to it for now and currently compiling with it is broken.
-SeaMonkey Meeting Minutes for August 20, 202


Needs User Agent Hacks, per-site. This tracks with what I’ve experienced. Globally advertising Firefox UA is radically destructive. Currently, I advertise Firefox 102.14 ESR and then set per-site UAs to something else as-needed through about:config. This is advanced user stuff that most people wouldn’t want to do. I mentioned that I do this for GMail in an older blog post so Google’s “Secure Apps” shuts the hell up and gives me my email.



Because of bad user agent sniffing we updated the base UA version some time ago from Gecko 68 to 91.



  • Youtube no longer seems to display correctly for some users only advertizing Firefox in the UA.


  • Further enhancements are planned for a later release in bug 1737436.


  • We want to implement overrides for bad web sites like Waterfox does using a json file containing the UA replacements.
    • The Fedora maintainer already added some of this and we will likely use this in the official release.
-SeaMonkey Meeting Minutes for August 20, 202


Google is being nasty and especially with YouTube. There’s major jank and I usually use it through Piped or Invidious proxies. It’s very helpful that my search engine, Searx Belgium, directs me to Invidious or Piped and also to Old Reddit, as these aren’t rotting bloated trash meant for Google Chrome. I ended up activating Web Components even though it’s not ready because it makes github and gitlab work again.



We are looking into adding support for Custom Elements and Shadow DOM in a later release. No ETA yet.



  • What is there has been activated in the current prerelease for testing. Shadow Dom support is mostly still missing.


  • Google owned/based websites like youtube are likely to break because of this in the near future. There are already reports of broken functionality on youtube.


  • Some good progress has been made and sites which do not need shadow dom start to work with dom.webcomponents.customelements.enabled and dom.webcomponents.enabled set to true.
-SeaMonkey Meeting Minutes for August 20, 202


The situation for add-ons is horrible. Fortunately, old versions of ublock origin and NoScript work for me, and those are the only really important extension types anyway.



SeaMonkey can’t easily handle all of the JavaScript Garbage anymore considering that it doesn’t just hide the mess on other processor cores like Google Chrome and Firefox do.



Without the ads and JavaScript Crap, SeaMonkey normally works fine for me. I route my news and weather to the Gemini resources from gemi.dev over mozz.us’s Web proxy. Then I can get those without the absolute shit show that unfolds in a sad modern browser. There’s a gopher proxy that proxies Reddit to Gopher then mozz.us proxies it back into the Web.



My dad always said where there’s a will there’s a way around it. I took it to heart.



Of course sometimes I just access this stuff over Lagrange. It’s a browser for Gemini and Gopher, which don’t suck. You can read Reddit on Netscape Communicator 4 through Gopher through the native gopher support. Unfortunately, the images can’t be grabbed unless you have a TLS proxy like Crypto Ancienne.



There’s no technical reason why you can’t access information from the Internet except they want to be a big fat goddamn pain in the ass unless you’ve updated your browser 10 times this month and buy a new computer every few years that you shouldn’t need so you can deal with fucking Reddit again.



It’s all spyware and tracking nonsense. It’s basically the only reason you need new computers and the browsers that run on them.



If you’re not fighting them, you’re helping them, and Mozilla isn’t fighting them.



Mozilla claims they have a security app for Linux and can’t figure out what the root account does. (I swear the only reason I write these articles is the opportunity to make some sick burns.)



Anyway,



  • WebExtension support in SeaMonkey is tracked in bug 1320556.
    • Work on theme or extension support has not started.


    • Support for Webextension dictionaries and language packs has been added.


    • Manifest v3 support will be mandatory in 2023. Google will no longer accept new extensions using v2 in 2022.
      • We do not plan to support this in the near future.


  • NoScript Classic 5.x is still available. Currently 5.1.9.


  • uBlock Origin is still available. The latest classic version is currently 1.16.4.30.


  • Session Manager is still being updated. Latest version is 0.8.1.14 and supports SeaMonkey 2.53.x.


  • Enigmail is supported again. Big thanks.


  • The Stylish forks stylem and stylem df version work in 2.53.13.


  • DownThemAll fixed 3.1.2 version for 2.53.10 and up.


  • Palefill generic polyfill can be used for accessing github, gitlab and other broken sites. Latest working version version is 1.23. Later versions are no longer working in SeaMonkey because of the developers decision to not fix some incompatible changes. Please disable updates or uninstall it.


  • github-wc-polyfill can be used for accessing github and gitlab. Both need Custom Elements support right now. Latest version is 1.2.19.
    • The add-on is outdated.
-SeaMonkey Meeting Minutes for August 20, 202


Finally, from IRC…



I gather that 2.53.18 will be a decent-sized release. 2.53.17 seems to have just cleaned up some build environment garbage and made a few changes to JavaScript and such.



More Web platform stuff seems to be on its way.



[8/20/23 09:22] Status of the SeaMonkey Source Tree
[8/20/23 09:23] All building I think. Need to do some central checkins but was real busy in the last weeks.
[8/20/23 09:24] Trying to get SpiderMonkey updated for 2.53. Great progress locally but not yet fully stable with the latest regexp stuff.
[8/20/23 09:28] Not much else here from me for source. But updating masters in git and hg is still just a matter of time. patching becomes slow.
[8/20/23 09:29] what’s the next big Javascript shiny in the radar?
[8/20/23 09:30] * njsg imagines Oracle implementing a JVM on top of Javascript
[8/20/23 09:31] tomman bigint and dynamic modules. But I need to fix my local queue first.
[8/20/23 09:32] dynamic modules are indeed getting a pest, thankfully the regex stuff seems solid on the .18b1 builds
[8/20/23 09:33] tomman yeah crahses pretty fast now in my queue so this needs to work.
[8/20/23 09:33] I either need to fix it or put more stuff in so that the original stuff applies clean(er).
[8/20/23 09:34] Release Train
[8/20/23 09:36] 2.53.17 is done. Wonder if we should do the next beta fast to get the regexp stuff out. Missing support now breaks tons of sites.
[8/20/23 09:39] probably
[8/20/23 09:40] Let my try to fix my queue and if not we do it next week.
[8/20/23 09:41] frg: yes, it would be nice to get your local queue in
[8/20/23 09:44] Extensions Tracking
[8/20/23 09:45] The pref changes still cause fallout but nothing else I think. Fortunately an easy fixer.

Recent Techrights' Posts

EPO Workers Point Out that the EPO is Destroying the Planet Under the Guise of "Hey Hi" (It Also Grants Many Invalid Patents Illegally
On 12 March and 16 June 2025, staff representation met with the administration in the Local Occupational Health, Safety and Ergonomics Committee (LOHSEC) in Munich
How the European Union (EU) Fell Out of Love With Free/Libre Software
Lots of bribery
Certificate Authority Let's Encrypt Has Almost Gone Down to Zero, Nearly Totally Extinct in Geminispace, the Few Capsules Still Using It Are Spam/Dead/Stagnant
This represents another decrease for Let's Encrypt; the last decrease was last week
Trying to Silence Techrights Was a Huge Mistake
Peter Thiel attacked a publisher for asserting, correctly, that he was gay. Now everyone knows it.
 
Gemini Links 08/09/2025: Socialist Computer Museum and GAFAM/ByteDance/TikTok-Dominated Net
Links for the day
Links 08/09/2025: Tim Crook Disappoints Apple Faithfuls and Zuckerberg Lies (Financial Fraud) for Cheeto King
Links for the day
Turn Off Microsoft's Restricted Boot ("Secure Boot")
We're still running a series on this issue
Social Control Media Sites Have Become Bot Farms (Not Limited to LLMs and Automation)
linkedin.com was nothing but trouble and losses for Microsoft
Deep in Debt With the Magnitude of Losses Quickly Growing, Microsoft "Open" "Hey Hi" Now Uses Broadcom for Vapourware, Pretending It'll Do OK Next Year
At some stage it'll collapse
You Can Tell Microsoft is in Trouble When Its Own Fans and Staff Blast it
"Microsoft sinks billions into chasing artificial intelligence fads to hype up its share price."
Multiple Undersea Cable Cuts and We're Still OK
Microsoft customers experience problems
Lawyers Who Think They Are Online Assassins Don't Deserve a Licence to Operate
they've become a laughing stock in their "sector"
Microsoft Windows Fell to 3.9% "Market Share" in Bahamas
Based on statCounter
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Sunday, September 07, 2025
IRC logs for Sunday, September 07, 2025
Gemini Links 07/09/2025: Scanner, Slop, and Chadobear
Links for the day
The UEFI 9/11 is 3 Days Away
Nobody denies that bad things will happen
Google Versus Journalism
Google played a big role in the demise of news sites
Gemini Links 07/09/2025: Advertising, Decentralized Archival, and Outsourcing to Bezos
Links for the day
Not Much Left in News Cycles
To be very clear, this does not describe "Linux" anything; it's true in just about every facet of news, except the paid-for fake "journalism" about "hey hi" (sites getting paid explicitly to maintain or rekindle hype)
Throwing Away "Old" Computers (Mozilla and Other Climate Deniers)
Mozilla is not leftist
The UEFI 9/11 - Part VIII - Denial of Service and Selling Us WSL (Windows) Instead of "Risky" (Prone by Breakage by Microsoft) GNU/Linux
Restricted Boot (so-called 'SecureBoot') does not improve security. It is nothing but trouble. It's meant to trouble non-Windows users. In dual-boot setups, SecureBoot is a recipe for disaster because Microsoft keeps erasing or tampering with the boot sector, to paraphrase an associate
Slop is Extremely Rare in Geminispace, Slop Images Are Unheard Of (Despite Images Being Supported)
As long as Geminispace grows in terms of domains it's safe to predict the protocol will still be used in 2029 and hence Geminispace will turn 10
Links 07/09/2025: Robodebt Class Action, Fines, and Copyright Settlement
Links for the day
Links 07/09/2025: Yle Impersonated in Social Control Media, Boat-Attacking Orcas, Midjourney Sued Again
Links for the day
Slopwatch: LinuxSecurity, Linux Journal, and the Serial Slopper
Google won't tackle the issue because Google participates not only in relaying slop but also in generating lots of it
Links 07/09/2025: Google Fines in EU and "Your Internet Access Is at Risk"
Links for the day
Gemini Links 07/09/2025: Little Brother and Corporate Theatre
Links for the day
Links 07/09/2025: More Harms of Slop and Anthropic's Nightmare Scenario (Huge Legal Liabilities for Slop)
Links for the day
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Saturday, September 06, 2025
IRC logs for Saturday, September 06, 2025
Microsoft Sites Now Talking About September's Mass Layoffs at Microsoft
It's noteworthy that even Microsoft's MSN now covers the latest revelations about mass layoffs
Gemini Links 06/09/2025: SpellBinding Moving and "The Cloud" Ridiculed
Links for the day
Slopwatch: On "the Apology Industry", Chatbots (Punchbag for Customers), and Fake Articles About "Linux"
"news reporting priorities changed"
Links 06/09/2025: "Covid Incidence on the Rise" and Many Attacks on the Press Worldwide
Links for the day
The Register Bill
The Register MS - putting the "MS" in your centre of the universe
Analogies for "Memory Safety" in Rust
Don't worry, it's Rust! It can do anything!
Nobody Denies That SecureBoot Will Cause Problems After September 11
Not even Microsoft
Gemini Links 06/09/2025: Infinite Scrolling and Posting from Emacs
Links for the day
Links 06/09/2025: GitHub Meltdown Over Slop, "U.S. Jury Says Google Should Pay $425 Million in Privacy Lawsuit"
Links for the day
Despite Its Severe Financial Problems Gnome Foundation Inc Paid Rosanna Yuen Over 100,000 Dollars Last Year
maybe relocation should be considered
The "Left" and the Right"
It poisons everything
Mozilla and Rust Are Not Leftists
they're part of the mass consumerism machine
Disposable to Microsoft
There is an extensive set of people who got used by Microsoft, only to be thrown away a month later or a year later or a decade later
The UEFI 9/11 - Part VII - This Coming Week Many PCs Will Refuse to Boot "Linux" (Because of Microsoft's Expired Certificate)
The real solution is, disable "secure boot" or "SecureBoot" while it's still possible. [...] Just like submarine patents, a lot of this problem was "hibernating" for a while
The Thing Nobody in Red Hat Wants to Talk About Openly
There is a real sentiment or worry among Red Hatters, Europeans and Americans in particulars (because of higher salary expectations)
Slopwatch: Small Parade of Fake News About "Linux" and Scams Borrowing the Name (or Word) "Linux"
In practice, LLMs are a risk
Over at Tux Machines...
GNU/Linux news for the past day
IRC Proceedings: Friday, September 05, 2025
IRC logs for Friday, September 05, 2025