Firefox
Using Firefox in Kicksecure.
Kicksecure is not officially associated with Mozilla Firefox. See Disclaimer.
Stable Version[edit]
Firefox Extended Support Release (ESR) is installed by default in Kicksecure. It is installed from Debian packages sources.
Other Versions[edit]
Rapid Release[edit]
For information on how to get the rapid release version of Firefox, please press Expand on the right.
Installation[edit]
One option might be to install the rapid release version of Firefox using might be using flatpak from flathub
. Special instructions are also required in this case.
Install org.mozilla.firefox
via flatpak.
1. Add a Flatpak repository.
A : Kicksecure
===Already enabled by default. (system-wide). No additional stepss needed to enable the Flathub repository.
B : Kicksecure-Qubes Template
===kicksecure-17
)Already enabled by default. (system-wide). No additional stepss needed to enable the Flathub repository.
C : Kicksecure-Qubes App Qube
kicksecure
)The user needs to Enable the Flathub Repository . Must be enabled per-user.
2. Install the flatpak org.mozilla.firefox
package.
B : Kicksecure-Qubes Template
===Kicksecure-Qubes Template (kicksecure-17
) [2]
Note: Advanced users that uninstalled the qubes-core-agent-passwordless-sudo
package should see forum thread Warning: Flatpak system operation Deploy not allowed for user.
http_proxy=http://127.0.0.1:8082 https_proxy=$http_proxy flatpak install flathub org.mozilla.firefox
C : Kicksecure-Qubes App Qube
Kicksecure-Qubes App Qube (kicksecure
) [3]
flatpak --user remote-add --if-not-exists flathub https://dl.flathub.org/repo/flathub.flatpakrepo
flatpak --user install flathub org.mozilla.firefox
3. Done.
The procedure of installing org.mozilla.firefox
is complete.
4. Upgrades notice.
Note: this procedure will not keep the software up-to-date. How to update installation installed by flatpak is also documented on the Operating System Software and Updates wiki page.
Usage[edit]
flatpak run org.mozilla.firefox
Update[edit]
- Kicksecure: flatpak update
- Kicksecure for Qubes Template: http_proxy=http://127.0.0.1:8082 https_proxy=http://127.0.0.1:8082 flatpak update
Qubes Specific[edit]
flatpak installed applications do not show up in Qubes start menu
Disclaimer[edit]
There are two different entities.
- A) Mozilla: Developer of the Mozilla Firefox browser. Versus,
- B) Kicksecure: An independent Linux distribution.
Kicksecure is not officially associated with Mozilla Firefox. The Mozilla Firefox logo is trademarked by Mozilla.
Why this disclaimer? See Firefox Potential Legal Risk.
Related[edit]
Footnotes[edit]
- ↑
Kicksecure:
- system-wide (requires administrative ("root") rights) (compatible with noexec): flatpak install flathub {{{package}}}
- per-user (no administrative rights required) (probably not compatible with noexec): flatpak --user install flathub {{{package}}}
- <>usability:</> Flathub is enabled by default system-wide but not per-user.
- multi-user: On a multi-user system (probably if multiple human users use the same computer, which is rare nowadays), system-wide might be preferable as this saves disk space.
- At preset: Does not make any difference.
- Future-proof: Per-user might be more future-proof. It would be compatible with future Kicksecure security improvements user-sysmaint-split. However, noexec for the home folder is to be considered later, at which point this documentation needs to be updated once that has been implemented.
- ↑
Kicksecure-Qubes Template:
flatpak
cannot be used with the--user
option. This is because in case of using a Qubes Template, the flatpak needs to be installed system-wide into the/var/lib/flatpak
folder. This is due to Qubes Persistence. If the--user
option was used, the flatpak would only be available in the Template's home folder but not in any App Qube based on that Template, because App Qubes have their own independent home folder. - ↑
Kicksecure-Qubes App Qube:
flatpak
should be used with the--user
option. This is because in case of using an App Qube, the flatpak needs to be installed per-user only into the~/.local/share/flatpak
folder and not system-wide. This is due to Qubes Persistence. If the--user
option was not used, the flatpak would only be available in the App Qube's non-persistent/var/lib/flatpak
folder located in the root image.
We believe security software like Kicksecure needs to remain Open Source and independent. Would you help sustain and grow the project? Learn more about our 12 year success story and maybe DONATE!