Table of Contents
⚒️ Limitations
Your web browser is a tool; as such, it's important to use the right tool for the right job. You wouldn't use a bulldozer to unscrew a screw, or a feather as a knife.
Please take the time to threat model. Determine what you're trying to protect, why you're trying to protect it, who you're trying to protect it from, etc. Everyone has their own unique threat model and different needs/goals/desires/etc.; you must determine yours.
When using Phoenix, you must understand the following:
Fingerprinting
Phoenix can not defeat sophisticated fingerprinting. Nothing besides Tor Browser can. Please use Tor Browser if your threat model calls for it (Ex. whistleblowers, political dissidents, journalists, etc.). Phoenix still takes steps to protect users against fingerprinting (which we believe are sufficient for most threat models), but this is something important to keep in mind.
🛡️ Security
It should be noted that Firefox-based web browsers have security deficiencies when compared to Chromium. This is especially notable on Android, but also applies to desktop (albeit to a lesser extent). For more details, see this article from GrapheneOS, and this article from madaidan (a security researcher). Depending on your threat model, it may be preferable to use a Chromium-based browser, such as Vanadium on GrapheneOS, Trivalent on desktop Linux, or Cromite.
Phoenix - A suite of configurations & advanced modifications for Mozilla Firefox, designed to put the user first.