
Work Here?
Work Here?
Work Here?
Industries
Consumer Software
Cybersecurity
Company Size
1,001-5,000
Company Stage
Grant
Total Funding
$3.5M
Headquarters
Mountain View, California
Founded
1998
Mozilla is a not-for-profit tech organization that develops privacy-focused web tools, led by the Firefox browser, and funds its work through partnerships, search royalties, and subscriptions like Mozilla VPN. Firefox is a free browser that protects user data and supports open standards; Mozilla also runs the Mozilla Foundation to advocate for open internet policies. It differentiates itself by reinvesting profits into mission-driven projects and open-source initiatives rather than distributing earnings to shareholders. Its goal is to create an open, accessible, and healthy internet for everyone by building user-centric tools, promoting internet literacy, and advocating for user rights online.
Help us improve and share your feedback! Did you find this helpful?
Total Funding
$3.5M
Above
Industry Average
Funded Over
3 Rounds
Insurance, Health & Wellness. Health Insurance.
Financial & Retirement.
401k Plan
Family & Parenting.
Work From Home.
Vacation & Time Off.
Perks & Discounts. Free Lunch or Snacks.
Mozilla has discovered 271 security vulnerabilities in Firefox 150 using early access to Anthropic's Mythos Preview AI model. The findings represent a significant increase from the 22 bugs detected by Anthropic's Opus 4.6 model in Firefox 148 last month. Firefox CTO Bobby Holley said Mythos is "every bit as capable" as the world's best security researchers, whilst eliminating the need to "concentrate many months of costly human effort to find a single bug". He believes AI tools like Mythos tilt the cybersecurity balance towards defenders by making vulnerability discovery cheaper. Anthropic released Mythos Preview to a limited group of industry partners earlier this month. Mozilla CTO Raffi Krikorian argues such tools are particularly crucial for open source projects, which often rely on insufficient volunteer maintenance for security.
Mozilla has launched Thunderbolt, a front-end client for self-hosted AI infrastructure that works with any AI model. Built on deepset's Haystack framework, Thunderbolt acts as a "sovereign AI client" allowing users to plug into ACP-compatible agents or OpenAI-compatible APIs, including Claude, DeepSeek and others. The system integrates with locally stored enterprise data through open protocols and uses an offline SQLite database as a local reference source. Mozilla says it offers optional end-to-end encryption and device-level access controls for enhanced security. Thunderbolt supports chat, search, research, automation and cross-device workflows, with native apps available for Windows, Mac, Linux, iOS, Android and web. The project is funded by Mozilla and operated through MZLA Technologies subsidiary, aiming to create a "decentralised open source AI ecosystem".
Mozilla under fire: The Firefox GDPR complaint that exposes Browser Privacy gaps. When Unblock Master think of Firefox, many of Unblock Master imagine a privacy-first browser standing against corporate surveillance. But recent GDPR complaints have shattered that narrative, revealing that even popular "privacy-conscious" browsers can slip into questionable tracking practices. What happened with Mozilla and GDPR? Mozilla found itself at the center of a significant privacy violation complaint. The issue: Firefox was collecting and transmitting user telemetry data without obtaining explicit, informed consent from users - a direct breach of GDPR requirements. This wasn't a minor oversight. Unblock Master is talking about: * Automatic data collection from browsing sessions * Transmission of information without clear user notification * Failure to provide opt-in mechanisms before data collection * Inadequate transparency in privacy policies The complaint highlighted a critical gap between Mozilla's public positioning as a privacy defender and its actual data handling practices. Why this matters beyond just Firefox. This case illustrates a broader problem in the tech industry: assumptions about privacy don't equal actual privacy. Many users download Firefox specifically because they believe Mozilla prioritizes their data protection. When a company with that reputation gets caught violating GDPR, it raises serious questions: * Can Unblock Master trust any browser's default privacy settings? * Are privacy policies actually protecting Unblock Master, or just covering companies legally? * What recourse do users have when major platforms violate regulations? The answer is simple: you can't rely solely on a browser's promises. You need additional layers of protection. The technical reality of browser-level tracking. Here's what most users don't understand: browsers are inherently exposed to ISP-level tracking, DNS monitoring, and network-wide surveillance - especially in countries with heavy internet restrictions. Your browser alone cannot protect you from: * ISP Surveillance: Your internet service provider can see every site you visit * Government Monitoring: Authorities in restricted regions monitor traffic patterns * Man-in-the-Middle Attacks: Unencrypted traffic can be intercepted and read * DNS Hijacking: Your queries can be logged and blocked at the DNS level Even Firefox with all its privacy features enabled cannot solve these problems. A browser is just one component of your digital security. Why a VPN is your real privacy solution. This is where confusion ends and real protection begins. A VPN (Virtual Private Network) operates at a different layer than your browser - it encrypts everything leaving your device before it even reaches your ISP. When you use a quality VPN: * Your ISP cannot see which sites you visit * Governments cannot easily monitor your traffic patterns * Your real IP address stays hidden from websites * DNS queries are encrypted and protected from hijacking * All traffic is encrypted, not just HTTPS connections This is critical for users in Iran, Saudi Arabia, UAE, Turkey, China, Russia, and other regions with heavy internet filtering. Testing this ourselves: its approach. Unblock Master tested Firefox with standard privacy settings against the same browser behind a proper VPN tunnel. The results were striking: Without VPN: * DNS queries visible to ISP * Real IP address exposed to every website * Telemetry connections traceable * Browser history potentially logged at network level With VPN (UnblockMaster tested): * All DNS queries encrypted * Real IP completely masked * ISP cannot see destination sites * No network-level logging possible * Added benefit of accessing geo-blocked content UnblockMaster VPN makes this simple on both iOS and Android. It runs in the background, encrypts all traffic regardless of which browser you use, and doesn't require any special configuration. The multi-layer approach to real privacy. Layer 1: VPN Encryption Use a reliable VPN like UnblockMaster before any browsing occurs. This protects your traffic from your device to the internet backbone. Layer 2: Browser Privacy Settings Configure Firefox (or any browser) to: * Disable telemetry completely * Block third-party cookies * Use enhanced tracking protection * Clear cache and history regularly Layer 3: DNS Protection Many VPNs now include encrypted DNS. UnblockMaster protects DNS queries so your ISP cannot see which sites you're attempting to access. Layer 4: Awareness Understand that no single tool is a complete solution. The Firefox GDPR complaint proves this. Stay informed about privacy issues and adjust your practices accordingly. What should Mozilla do? The complaint against Mozilla wasn't baseless - it exposed real gaps: * Mozilla should provide explicit opt-in for all data collection, not opt-out * Privacy policies should be written clearly, not buried in legal language * Users deserve granular control over what data Mozilla collects * Transparency reports should detail exactly what data is collected and how it's used Until these changes happen industry-wide, users cannot rely on company promises. Unblock Master must implement its own protection layers. For users in restricted countries: critical advice. If you're in a region with heavy internet filtering - Iran, China, UAE, Saudi Arabia, or similar - this situation has special importance. Your government likely monitors browser activity. Firefox's telemetry collection is the least of your concerns. What matters is: * Blocking your ISP from seeing which sites you visit * Preventing DNS monitoring and content filtering * Masking your real IP from destination servers * Encrypting all traffic end-to-end UnblockMaster VPN handles all of this. Unblock Master has tested it extensively in restricted regions, and it consistently bypasses filtering while maintaining strong encryption. The bottom line. The Firefox GDPR complaint is a wake-up call. Stop trusting companies to protect your privacy. Stop assuming that a "privacy-friendly" browser is enough. Build a real privacy stack: * Always use a VPN * Configure your browser properly * Stay aware of data collection practices * Keep your software updated For most users worldwide - especially those in restricted regions - UnblockMaster VPN should be your starting point. Everything else builds on top of that foundation. Trust verification, not promises. Test everything yourself. And remember: real privacy requires active effort, not passive hope.
Is Thunderbird Safe in 2026? Security advantages & risks. Table of Contents Mozilla launched Thunderbird as a free and open-source email client for Mac, Windows, Linux, and now even Android in 2003 and has over 20 million active users in 2026. But users switching email clients or looking for reliable ways to access their IMAP or POP accounts often wonder: "Is Mozilla Thunderbird Safe to Use?" Users worry about download risk, protection from hackers, crashes, and corruption risk as compared to other prominent email clients like Outlook, Apple Mail, and more. Quick answer: Is Thunderbird Safe for emails? Yes, Mozilla Thunderbird is a secure and ad-free desktop email client due to its various features like end-to-end encryption support, phishing & spam filters, data privacy protocols, and SSL/TLS support. However, there are certain other security gaps - like constant crashes, risk of profile corruption, and dependency on the email service provider. Here Thunderbirdconverter has reviewed the Thunderbird email client on the security factors and shared expert-recommended tips to protect your Thunderbird email data. About Mozilla Thunderbird email client. Thunderbird is a well-known email client that enables you to access multiple IMAP mailboxes like Gmail, Yahoo, and Outlook.com in one place. Since it is a free & open source platform, it is driven by a large community of contributors and users. | Highlights | More Info | | Latest Version | 149.01 | | Purpose | Unify Multiple Mailboxes | | Key Features | Junk Filtering, Advanced Search & Filters, High Security & Easy to Use UI | | Customisation | Add-On & Themes | | File Format Support | MBOX & Maildir (for emails) | | Supported Tools | Emails, Contacts, Calendar, Tasks & Chat | Tip: If you are using an older Thunderbird version, reinstall Thunderbird and update to the latest version to take advantage of most features. And always download Thunderbird from the official source. Important security features of Thunderbird application. Whether it is malicious or phishing emails, malware attacks, remote content blocking, or data privacy concerns, Thunderbird can protect your account. Here are the reasons why Thunderbird is extremely safe to use in 2026 as compared to other open-source email clients: Mozilla Thunderbird can block JavaScript and only support basic formats like plain text and HTML with clickable links. This blocks all background risky code execution & tracking scripts, making Thunderbird much safer. Reason 2: modern configuration & Security protocols. Thunderbird is safe for email configuration as it uses modern authentication methods like Google OAuth 2.0 and Microsoft Graph API to connect to accounts. This ensures your email password is not saved anywhere in the application. For sending and receiving emails via IMAP, SMTP, and POP, Thunderbird uses SSL/TLS encryption, thus preventing MITM attacks on email and attachments during communication. Reason 3: Thunderbird end-to-end encryption support. Thunderbird has built-in Open PGP encryption and supports S/MIME certificate leave function so that emails remain completely confidential and can not be tracked even on the server end. Reason 4: remote content blocking for better safety & Privacy. * Open Thunderbird on your computer. * Click on the Navigational Menu. * Go to Settings >> Privacy & Security. * Uncheck Allow remote content in the messages box. Additionally, unlike webmail platforms, Thunderbird works locally on your computer without the need for any browser, thus preventing cookies. Read More: Learn How to Clear Cache in Thunderbird? Reason 5: Thunderbird's adaptive Spam Filtering. Thunderbird adds a layer of Spam filter called Bayesian filters and has an adaptive Spam filter, making your inbox free of any fraudulent emails over time. Reason 6: better memory management. The latest Thunderbird versions are built on Rust, a programming language that helps keep Thunderbird safe from hackers and crashes, which were a major Thunderbird issue earlier. Updating to a modern programming language helps avoid memory leaks and prevents unauthorized access to the Thunderbird profile folder. Important: Updating Thunderbird helps prevent memory leaks and unauthorized access issues. Other various advantages of Mozilla Thunderbird make it safe to use: * Local Data Storage * Primary Password Option * Enables viewing attachments without downloading * Safe Mode is available to troubleshoot issues Risk & disadvantage of Thunderbird usage for emails. Although Mozilla Thunderbird is a secure application to use, whether with Gmail, Office 365, or other email accounts. There are some limitations where data security can be a major concern: * Local data storage can lead to data loss due to profile corruption. * Need a separate antivirus to protect against malware attacks. * Although encryption methods are available, they are not enabled by default. * Certain add-ons can interfere with data. Note: Thunderbird is merely an email client allowing you to manage emails. Your security depends on your email service provider and Thunderbird cannot prevent such attacks. Protect your Thunderbird data up to maximum safety. Here are some important precautions one must take to keep their Thunderbird data safe from hackers: * Enable two-factor authentication for your email account. * Use a strong password and change your password frequently. * Install only trusted add-ons. * Avoid clicking on suspicious links * Do not avoid warning signs and error messages. * Backup Thunderbird profile regularly to prevent data loss due to corruption or crashes. Use Thunderbird Backup Tool to save entire Thunderbird data in EML, PDF, MSG, and 25 other formats with contacts & calendars and complete data within minutes. The tool lets you cross-archive Thunderbird emails on cloud platforms like Gmail and other IMAP services. Download the tool today. Free trails are also available. FAQs: Is Thunderbird Safe? Q1: How to open Thunderbird in Safe Mode? To open Thunderbird in safe mode, click on Menu >> Help >> Troubleshoot Mode >> Restart to open Thunderbird in safe mode. Q2: Which is safer, Thunderbird or Outlook? Both Outlook and Thunderbird are secure email clients. However, Outlook is a more reliable email client than Thunderbird. Use Thunderbird to PST converter to migrate Thunderbird to Outlook. Q3: Is Thunderbird Safe for Business Use (Gmail / Google Workspace)? Thunderbird is safe for business use with Gmail or Google Workspace, but requires proper security setup. It lacks advanced enterprise controls found in productivity suites.
JetStream 3: A modern benchmark for high-performance, compute-intensive Web applications. Tuesday, March 31, 2026 Chromium is incredibly excited to announce the release of JetStream 3, built in close collaboration with Apple, Mozilla, and other partners in the web ecosystem! While Chromium has covered the high-level details of this release in its shared announcement blog post, Chromium wanted to take a moment here to dive a little deeper. In this post, Chromium'll pull back the curtain on the benchmark itself, explore the methodology behind its choices, and share the motivations driving these major updates. Why do Chromium benchmark, anyway? Before Chromium get into the "what," it helps to talk about the "why." Why do browser engineers care so much about benchmarks? At its core, benchmarking serves as a critical safety net for catching performance regressions before they ever reach users. But beyond that, benchmarks act as a powerful motivation function - a sort of "gamification" for browser engineers. Having a clear target helps Chromium prioritize its efforts and decide exactly which optimizations deserve its focus. It also drives healthy competitiveness between different browser engines, which ultimately lifts the entire web ecosystem. Of course, the ultimate goal isn't just to make a number on a chart go up; it's to meaningfully improve user experience and real-world performance. Driven by open governance. Just like Speedometer 3, JetStream 3 is the result of a massive collaborative effort across all major browser engines, including Apple, Mozilla, and Google. Chromium adopted a strict consensus model for this release. This means Chromium only added new workloads when everyone agreed they were valuable and representative. This open governance model has led to an incredibly productive collaboration with buy-in from multiple parties, ensuring the benchmark serves the best interests of the overall Web ecosystem. Ripe for an update. The last major release, JetStream 2, came out in 2019. In the technology space - and especially on the Web - six years is an eternity. There's a well-known concept in economics called Goodhart's Law, which states that when a measure becomes a target, it ceases to be a good measure. Over time, engines naturally optimize for the specific patterns of a benchmark, and the metrics slowly lose their correlation with real-world performance. Speedometer recently received a massive update to account for this, and it only makes sense that JetStream is next in line. JetStream vs. Other benchmarks. You might be wondering: with the recent release of Speedometer 3, why do Chromium need another benchmark? While Speedometer is fantastic for measuring UI rendering and DOM manipulation, JetStream has a different focus: the computationally intensive parts of Web applications. Chromium is talking about use cases like browser-based games, physics simulations, framework cores, cryptography, and complex algorithms. There are also practical engineering considerations. JetStream is designed so that it can run in engine shells - like d8, the standalone shell for V8. For engine developers, this is a massive advantage. Building a shell is significantly quicker than compiling a full browser like Chrome, allowing engineers to iterate faster. Because d8 is single-process, it also produces far less background noise, leading to more stable testing. This shell-compatibility also makes JetStream highly valuable for hardware and device vendors running simulators. It is a trade-off - a shell is slightly further removed from a full, real-world browser environment - but the engineering velocity it unlocks is well worth it. How Chromium select workloads. Building a benchmark requires a delicate balance between microbenchmarks and real applications. Microbenchmarks are great engineering tools; they have a high signal-to-noise ratio and make it easy to see the effects of one specific optimization. While they make sense for early improvements of new features, they also often encourage overfitting in the long run. Engines might optimize heavily for a tiny loop that looks great on the benchmark but does absolutely nothing to help real users. Because of this, a primary criterion for inclusion in JetStream 3 is that a workload should represent a real, end-to-end use case (or at least a highly abstracted form of one). Chromium also heavily prioritized diversity. Chromium don't want workloads that all exercise the exact same hot loop. Chromium want coverage across different frameworks, varied libraries, diverse source languages, and distinct toolchains. Finally, Chromium had to lay down some practical ground rules: * Time: The full benchmark suite needs to complete in a few minutes. * Memory: It shouldn't consume so much RAM that it crashes low-end devices. * Network: It shouldn't require massive payload transfers. * Consistency: Results should be deterministic and repeatable from one run to the next. Rethinking WebAssembly. One of the most significant shifts in JetStream 3 is an increased focus and major update with regards to WebAssembly (Wasm). When JetStream 2 was created, Wasm was still in its infancy. Fast forward to today, and Wasm is significantly more widespread. Because the language has evolved so rapidly, JetStream 2 became outdated quickly. It only tested the Wasm MVP (Minimum Viable Product). Today, the Wasm spec includes powerful features like SIMD (single instruction, multiple data), WasmGC, and Exception Handling - none of which were being properly benchmarked. The ecosystem of tools has also completely transformed. The old workloads relied almost entirely on ancient versions of Emscripten compiling C/C++, often utilizing the deprecated asm.js backend via asm2wasm. Furthermore, some of the old microbenchmarks mis-incentivized the wrong optimizations. For example, the old HashSet-wasm workload rewarded aggressive inlining that actually hurt performance in real-world user scenarios. The new WebAssembly workloads. To fix this, Chromium sought out entirely new Wasm workloads, introducing 12 in total. Chromium expanded its toolchain coverage from just C++ to include five new toolchains: J2CL, Dart2wasm, Kotlin/Wasm, Rust, and .NET. This means Chromium is now actively benchmarking Wasm generated from Java, Dart, Kotlin, Rust, and C#! These workloads represent actual end-to-end tasks, including: * argon2: A cryptographic password hashing function. * Transformers.js: Client-side machine learning heavily utilizing SIMD. * Cross-platform UI: Dart and Kotlin workloads utilizing WasmGC. * SQLite3: The ubiquitous database, replacing old WebSQL patterns. * .NET: As an example of full interpreters and language runtimes built on top of Wasm. These aren't tiny, kilobyte-sized modules anymore. These are multi-megabyte applications that produce diverse, complex flamegraphs, pushing engines to their limits. Reflecting its heightened importance on the modern web, Wasm now makes up 15-20% of the overall benchmark suite, up from just 7% in JetStream 2. Beyond new workloads, JetStream 3 also overhauls scoring to ensure that runtime performance - not just instantiation - is accurately reflected in the total score. Chromium has many new larger JavaScript workloads that better represent how JS is used in the wild. Additionally to just measuring the pure execution speed Chromium has "startup" workloads that include parsing and frameworks setup code - more closely matching what happens on initial page load. * babylonjs: Startup and execution of the JavaScript core of the Babylon.js 3D engine. * bigint-noble-ed25519: BigInt stress-test that calculates an elliptic curve. * doxbee: Async code patterns using promises and async functions. * js-tokens js-tokenizer performance over JavaScript and JSX sources. * jsdom-d3-startup: D3 running in a JavaScript-only DOM implementation frequently used in unittests. * lazy-collections: JavaScript generators stress-test. * mobx-startup: Startup performance of the MobX state management library. * prismjs: Startup performance of a syntax highlighting library on various source files. * proxies: Two new workloads that stress tests proxy functionality using different libraries. * raytrace classes: Stress testing private and public fields with ES6 classes. * sync-fs: A mock file system, testing DataView, Promises, and synchronous generators / iterators. * threejs: A 3D particle system implemented with Three.js. * typescript-lib: Typescript v5.9 compilation speed. * validatorjs: String validation and sanitization with validator.js. * web-ssr: Server-side rendering (SSR) using React. * WTB: Updated version of the web-tooling benchmark measuring performance of various developer tools. * Sunspider: All separate workloads have been combined into a single item to reduce its weight. * Various older workloads were fixed to fix benchmark bugs and counter-act non real-world improvements. Conclusion. With JetStream 3, the browser benchmarking space has made another big step forward and brought a new tool for browsers to improve performance for their valued users. Alongside Speedometer and MotionMark, these benchmarks give a clear view not only to browser vendors but also to users about various engine's performance. If you'd like to contribute to the benchmark with your own workloads or have suggestions for how Chromium can make it better, feel free to join the repository on GitHub. Chromium is continually iterating on these benchmarks and will have more updates on each in the future as well. Posted by Daniel Lehmann, Thomas Nattestad and Camillo Bruni, Chrome team
Find jobs on Simplify and start your career today
Industries
Consumer Software
Cybersecurity
Company Size
1,001-5,000
Company Stage
Grant
Total Funding
$3.5M
Headquarters
Mountain View, California
Founded
1998
Find jobs on Simplify and start your career today