{"id":1589,"date":"2013-04-03T12:16:51","date_gmt":"2013-04-03T16:16:51","guid":{"rendered":"http:\/\/blog.nccomputertech.com\/?p=1589"},"modified":"2013-04-03T12:16:51","modified_gmt":"2013-04-03T16:16:51","slug":"as-mozilla-turns-15-firefox-20-debuts-with-new-privacy","status":"publish","type":"post","link":"https:\/\/nccomputertech.com\/techtalk\/2013\/04\/03\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy\/","title":{"rendered":"As Mozilla turns 15, Firefox 20 debuts with new privacy"},"content":{"rendered":"<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2032875\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy.html\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/nccomputertech.files.wordpress.com\/2013\/04\/mozilla-15years-graphic-100031644-large.png\" \/><\/a><\/p>\n<p>Late last year Mozilla revealed a new private-browsing feature that was in the works for an upcoming version of its Firefox browser, and that&#8217;s just what appeared in Mozilla&#8217;s Final Release channel on Tuesday.<br \/>\nSpecifically, Firefox 20 made its official debut with a desktop version for Windows, Mac, and Linux, and a mobile version for Android.<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2032875\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy.html\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/nccomputertech.files.wordpress.com\/2013\/04\/firefox_logo-100030562-small.jpg\" \/><\/a><\/p>\n<p>\u201cFirefox includes a new enhancement to private browsing that allows you to open a new private browsing window without closing or changing your current browsing session,\u201d explains the post officially announcing Firefox 20 on the Mozilla Blog. \u201cYou can shop for a birthday gift in a private window with your existing browsing session uninterrupted.\u201d<br \/>\nA new download panel in the Firefox toolbar, meanwhile, makes it easier to download files with Firefox by allowing users to monitor, view, and locate downloaded files without having to switch to another window, as shown in the video below.<br \/>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/0iJO9iF3MKE?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><br \/>\n50 million more phones<br \/>\nOn the mobile side, Firefox 20 for Android supports private browsing on a per-tab basis, Mozilla said, giving users a way to open a new private browsing tab during their current browsing session and to switch between private and standard tabs within the same browsing session.<br \/>\nAlso new in Firefox for Android are a way to customize the shortcuts on the home screen with the user&#8217;s most frequently visited sites and support for additional devices running on ARMv6 processors, including the Samsung Galaxy Next, HTC Aria, HTC Legend, Samsung Dart, Samsung Galaxy Pop, and the Samsung Galaxy Q. The result, Mozilla says, is a better Web experience on almost 50 million more phones.<br \/>\nNumerous critical bug fixes and developer features round out the new release of the free and open source browser, which is now available as a download on the Mozilla site.<br \/>\n&#8216;A Web that&#8217;s more open&#8217;<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2032875\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy.html\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/nccomputertech.files.wordpress.com\/2013\/04\/mozilla-foundation-100031649-orig.png\" \/><\/a><\/p>\n<p>Also on Tuesday, meanwhile, Mozilla announced that it turned 15 on March 31, sparking several looks back at what it has achieved during that time.<br \/>\n\u201cMozilla has helped shift the center of gravity to a Web that\u2019s more open \u2014 that gives more people the opportunity to create and enjoy the Web on *their* terms,\u201d wrote Mitchell Baker, chair of the Mozilla Foundation, in a blog post on the topic. \u201cBillions of people experience the openness of the Web every day as they create, connect and invent in ways that reflect their goals and dreams, without needing the permission of a few commercial organizations.\u201d<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/www.pcworld.com\/article\/2032875\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy.html\"><img decoding=\"async\" alt=\"\" src=\"http:\/\/nccomputertech.files.wordpress.com\/2013\/04\/selection_031-100031650-medium.png\" \/><\/a><\/p>\n<p>At the same time, the Web now faces threats just as big as those 15 years ago, Baker warned.<br \/>\n\u201cAs the role of data grows and device capabilities expand, the Internet will become an even more central part of our lives,\u201d she explained. \u201cThe need for individuals to have some control over how this works and what we experience is fundamental.\u201d<br \/>\nIn the coming years, Mozilla aims to play a key role in that battle, Baker added.<br \/>\nA slideshow on Mozilla&#8217;s site illustrates key milestones in its 15-year history.<br \/>\nvia <a href=\"http:\/\/www.pcworld.com\/article\/2032875\/as-mozilla-turns-15-firefox-20-debuts-with-new-privacy.html\" target=\"_blank\">As Mozilla turns 15, Firefox 20 debuts with new privacy | PCWorld<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Late last year Mozilla revealed a new private-browsing feature that was in the works for an upcoming version of its [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2,5,9],"tags":[152,369,717,772],"class_list":["post-1589","post","type-post","status-publish","format-standard","hentry","category-apple","category-microsoft","category-software","tag-browsers","tag-firefox","tag-mozilla","tag-open-source"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/papNkV-pD","jetpack-related-posts":[{"id":9450,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/11\/20\/are-passwords-immortal-security-now-690\/","url_meta":{"origin":1589,"position":0},"title":"Are Passwords Immortal? &#8211; Security Now 690","author":"NCCT","date":"November 20, 2018","format":false,"excerpt":"https:\/\/youtu.be\/mOSTtkK7vy0 Pwn2Own, the Future of Passwords. -- All the action at last week's Pwn2Own Mobile hacking contest -- The final word on processor mis-design in the Meltdown\/Spectre era -- A workable solution for unsupported Intel firmware upgrades for hostile environments -- A forthcoming Firefox breach alert feature -- The expected\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/mOSTtkK7vy0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9818,"url":"https:\/\/nccomputertech.com\/techtalk\/2024\/11\/11\/intel-is-cooked\/","url_meta":{"origin":1589,"position":1},"title":"Intel is cooked.","author":"NCCT","date":"November 11, 2024","format":false,"excerpt":"https:\/\/youtu.be\/ub27Ol4igwY 0:00 Welcome to Paul\u2019s Tech News - Nov 10, 2024 1:33 AMD Ryzen 9800X3D Post Launch Diagnosis - sold out in minutes 3:18 AMD May Add 3D V-cache to Mobile APUs, Threadripper 4:15 Nvidia ousts Intel from Dow Jones Index after 25-year run 5:43 For the first time ever,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/ub27Ol4igwY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9428,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/10\/28\/all-the-presidents-phones-this-week-in-tech-690\/","url_meta":{"origin":1589,"position":2},"title":"All the President&#8217;s Phones &#8211; This Week in Tech 690","author":"NCCT","date":"October 28, 2018","format":false,"excerpt":"https:\/\/youtu.be\/pmfcU05twvo IBM buys Red Hat, worst Windows 10 ever, Right to Repair wins, and more. -- What's in store for Apple's big event this Tuesday? -- Tim Cook vs the \"data industrial complex\" -- Amazon's government controversies -- IBM buys Red Hat for $34 billion - the largest software purchase\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/pmfcU05twvo\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9393,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/08\/19\/this-week-in-tech-680-hacky-hack-hack\/","url_meta":{"origin":1589,"position":3},"title":"This Week in Tech 680: Hacky Hack Hack","author":"NCCT","date":"August 19, 2018","format":false,"excerpt":"https:\/\/youtu.be\/7ClMz3MkTJk This Week in Tech Elon's Twitter addiction, $1200 iPhone XS+, Movie Pass Fail, Pai's lie, and more. --Leave Elon alone! Tesla tumbles after Musk laments his \"most difficult and painful year.\" --Google employees revolt over China rumors; town hall meeting shut down due to \"kerfuffle\" tweets. --Apple thinks that\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/nccomputertech.com\/techtalk\/category\/technology\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/7ClMz3MkTJk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9528,"url":"https:\/\/nccomputertech.com\/techtalk\/2019\/03\/10\/third-party-dog-hats-this-week-in-tech-709\/","url_meta":{"origin":1589,"position":4},"title":"Third-Party Dog Hats &#8211; This Week in Tech 709","author":"NCCT","date":"March 10, 2019","format":false,"excerpt":"https:\/\/youtu.be\/-nUG1REHhwU Location Tracking, Facebook Privacy, Breaking Up Big Tech, and More! -- Foursquare Location Tracking Leaps Past the Creepy Line -- Will Zuck Make Facebook Private? -- Thousands of New Millionaires are Coming to San Francisco -- Apple has Big Plans for Self-Driving Cars -- Elizabeth Warren Wants to Break\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/nccomputertech.com\/techtalk\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/-nUG1REHhwU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":9343,"url":"https:\/\/nccomputertech.com\/techtalk\/2018\/05\/27\/this-week-in-tech-668-how-many-cups-in-a-stone\/","url_meta":{"origin":1589,"position":5},"title":"This Week in Tech 668: How Many Cups in a Stone?","author":"NCCT","date":"May 27, 2018","format":false,"excerpt":"https:\/\/youtu.be\/i1oqaFyVcQ0 --The FBI wants you to reboot your router right now. FBI agents have gained control of a huge Russian botnet. If your router is affected you just need to reboot it. --Facebook and Russian ads - how should government react in the age of cyber warfare? --Amazon sells facial\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/nccomputertech.com\/techtalk\/category\/security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/i1oqaFyVcQ0\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/1589","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/comments?post=1589"}],"version-history":[{"count":0,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/posts\/1589\/revisions"}],"wp:attachment":[{"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/media?parent=1589"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/categories?post=1589"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nccomputertech.com\/techtalk\/wp-json\/wp\/v2\/tags?post=1589"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}