By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
BrinkeraBrinkeraBrinkera
  • HOME
  • NEWS
    • SECURITY
    • SOFTWARE
    • PRIVACY
    • TECH
    • GADGET
  • EMAIL
    • BEST SECURE EMAIL SERVICES
    • PROTON MAIL REVIEW
    • STARTMAIL REVIEW
    • TUTA MAIL REVIEW
  • PASSWORD
    • NORDPASS REVIEW
    • PROTON PASS REVIEW
  • VPN
    • BEST VPN SERVICES
    • VPN REVIEWS
      • NORDVPN REVIEW
      • SURFSHARK VPN REVIEW
      • PROTON VPN REVIEW
  • MESSAGING
Search
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Reading: Firefox 147 Improves Security and Reduces Data Sharing with Google
Share
Notification Show More
Font ResizerAa
BrinkeraBrinkera
Font ResizerAa
Search
  • NEWS
  • SECURITY
  • SOFTWARE
  • PRIVACY
  • Tech
  • Gadget
  • Crypto
  • Editorial
  • Entertainment
  • VPN
    • BEST VPN SERVICES
    • NORD VPN REVIEW
    • SURFSHARK VPN REVIEW
    • PROTON VPN REVIEW
  • EMAIL
    • PROTON MAIL REVIEW
    • TUTA MAIL REVIEW
Follow US
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Brinkera > News > Firefox 147 Improves Security and Reduces Data Sharing with Google
NewsSoftware

Firefox 147 Improves Security and Reduces Data Sharing with Google

Last updated: January 28, 2026 3:12 pm
Michael Dawson
Share
Firefox 147 Enhances Web Security and Limits Data Shared with Google
SHARE

Mozilla has introduced Firefox 147 to its stable channel, offering stronger web protection with the Safe Browsing V5 protocol, better video playback performance on AMD hardware, native WebGPU for Apple Silicon Macs, and patches for several critical security issues.

Privacy and Security Enhancements

A major feature of this release is the browser’s update from Safe Browsing V4 to Safe Browsing V5, aligning Firefox’s defenses with Google’s most recent anti-phishing and malware framework.

Safe Browsing V5 adds a “local list mode” where Firefox keeps a privacy-focused list of threat indicators locally and only contacts remote servers when truly necessary. This design reduces the amount of user data exposed while still offering up-to-date protection against threats like phishing and malicious sites.

Instead of the older allow-by-default model, the updated system uses check-by-default to improve detection and blocking of harmful content. Firefox also leverages Google’s Global Cache — a curated set of safe domains — so that fewer remote checks are needed and most threats are handled locally while only anonymized hash prefixes are sent for validation when required.

The Safe Browsing V5 protocol additionally supports Oblivious HTTP (OHTTP), which enhances privacy further by hiding user IP addresses from Google using a third-party relay that doesn’t collude with Google.

- Advertisement -

For users who have Enhanced Tracking Protection (ETP) set to “Strict”, Firefox 147 now enforces local network access restrictions by default. This prevents websites from interacting with devices on your home or office network — such as printers or routers — without explicit permission, lowering the chance of abuse or exploitation.

Performance and Hardware Support

Firefox 147 also brings important performance upgrades. Most notably, WebGPU support is now enabled on Apple Silicon Macs, significantly boosting graphics performance for browsers and web applications that use GPU acceleration.

In addition, systems equipped with AMD graphics cards now benefit from zero-copy hardware video decoding, which enhances playback quality and efficiency. This improvement brings AMD feature support closer to what Firefox already offers for Intel and NVIDIA GPUs.

Security Vulnerabilities Resolved

Firefox 147 patches 15 security flaws, including several high-severity issues that could have enabled sandbox escapes, use-after-free bugs, and memory corruption leading to arbitrary code execution if exploited.

  • CVE-2026-0878 to CVE-2026-0880: Multiple graphics component vulnerabilities that could enable sandbox escapes via boundary condition errors and integer overflows, reported by Oskar L.
  • CVE-2026-0882: A use-after-free flaw in the IPC (Inter-Process Communication) component, with potential for high-impact exploitation.
  • CVE-2026-0887: A clickjacking and information disclosure bug in Firefox’s built-in PDF viewer, reported by Lyra Rebane.
  • CVE-2026-0891 and CVE-2026-0892: Memory safety issues identified by Mozilla’s internal fuzzing teams, presumed exploitable under certain conditions.

Firefox users are urged to update to version 147.0 immediately to benefit from the latest security fixes and improved browsing safeguards. The browser typically updates automatically, but users can also check manually via the “About Firefox” menu.

- Advertisement -

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Previous Article atest security protocols and protection mechanisms. IMAGE 1 PLACEMENT HERE Alt text: "VPN security configuration settings showing modern encryption protocols" Caption: "ProtonVPN is upgrading to more secure VPN protocols. Image by Brinkera." Users currently relying on legacy OpenVPN configurations will need to transition to newer connection methods supported by ProtonVPN. The company has stated it will provide ample notice and migration resources to ensure a smooth transition for affected users. ProtonVPN emphasized that this decision reflects its commitment to maintaining the highest security standards in an evolving threat landscape. The VPN provider noted that legacy protocols may contain vulnerabilities that could potentially be exploited by sophisticated adversaries. The transition away from legacy OpenVPN configs aligns with industry-wide movements toward more secure and efficient VPN protocols. Many VPN providers have been gradually phasing out older connection methods in favor of modern alternatives that offer better performance and stronger security guarantees. ProtonVPN users are encouraged to update their VPN clients to the latest versions, which support current OpenVPN implementations and alternative protocols like WireGuard. The company has indicated that its official applications will continue to receive full support and automatic updates. IMAGE 2 PLACEMENT HERE Alt text: "Modern VPN protocol comparison showing security features" Caption: "Comparison of legacy and modern VPN security protocols. Image by Brinkera." The security-focused VPN service has built its reputation on providing robust privacy protection and transparency. This latest move demonstrates ProtonVPN's proactive approach to addressing potential security weaknesses before they can be exploited. For users who have manually configured OpenVPN connections using legacy config files, ProtonVPN will provide detailed migration guides and support documentation. The company has assured users that the transition process is designed to be straightforward and minimize disruption to VPN services. Industry security experts have generally supported the decision, noting that maintaining legacy systems can create unnecessary security risks. By standardizing on modern protocols, VPN providers can focus their security efforts more effectively and respond more quickly to emerging threats. ProtonVPN has not yet announced a specific timeline for the complete phase-out of legacy OpenVPN configurations, but the company indicated that users will receive advance notification with sufficient time to make necessary adjustments to their VPN setups. The privacy-conscious VPN provider continues to recommend using its official applications for the best security and user experience. These applications automatically implement the latest security features and protocol updates without requiring manual configuration changes from users. This security enhancement initiative reflects ProtonVPN's ongoing commitment to protecting user privacy in an increasingly complex digital threat environment. As cyber threats continue to evolve, VPN providers must regularly update their security infrastructure to maintain effective protection for their users. ProtonVPN to Retire Legacy OpenVPN Configs in 2026
Next Article free vpn Is there any 100% free VPN?
- Advertisement -

You Might also Like

CryptoNews

Bitcoin advances two critical steps toward quantum and AI-powered future

Laura Mitchell
9 Min Read
Feeling lonely this Valentine's
CryptoNews

Feeling lonely this Valentine’s? Federal prosecutors issue crypto romance scam alert

Jennifer Hall
Jennifer Hall
4 Min Read
NewsSoftware

Discord Mass Exodus 2026: Why Users Switch to Matrix

Laura Mitchell
3 Min Read

About Us

  • About Us
  • Contact Us
  • Advertise with us

Categories

  • Security
  • Software
  • Privacy
  • Editorial
  • Crypto
  • Tech

Reviews

  • VPN Reviews 2026: Honest Testing and Analysis
  • Best Secure Email Services 2026
Subscribe to Our Newsletter
Subscribe to our newsletter to get our newest articles instantly!

BrinkeraBrinkera
Follow US
© 2026 Brinkera – Latest Cybersecurity and Tech News, Research & Analysis. | About Us | Privacy Policy | Terms of Use
Join Us!
Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.