what is it?

The NoScript status bar menu
Proudly sponsored by NLNet Foundation

There's a browser safer than Firefox...
...it is Firefox, with NoScript!

2006 PC World World Class

The NoScript Firefox extension provides extra protection for Firefox, Seamonkey and other mozilla-based browsers: this free, open source add-on allows JavaScript, Java, Flash and other plugins to be executed only by trusted web sites of your choice (e.g. your online bank).

NoScript also provides the most powerful anti-XSS and anti-Clickjacking protection ever available in a browser.

NoScript's unique whitelist based pre-emptive script blocking approach prevents exploitation of security vulnerabilities (known and even not known yet!) with no loss of functionality...

You can enable JavaScript, Java and plugin execution for sites you trust with a simple left-click on the NoScript status bar icon (look at the picture), or using the contextual menu, for easier operation in popup statusbar-less windows.
Watch the "Block scripts in Firefox" video by cnet.

Staying safe has never been so easy!
Experts will agree: Firefox is really safer with NoScript!

V. - Friendly Security

If you find any bug or you'd like an enhancement, please report here or here. Many thanks!

Main good news
  • Multiple ABE reliability enhancements (thanks AlbertMTom and barbaz).
  • Improved XSS filter sensitivity (thanks Masato Kinugawa).
  • Dramatically improved user interface performance when managing huge whitelists (thanks barbaz for patch).
  • New login.persona.org Script Surrogate (thanks barbaz).
  • Improved protection against various XSS exfiltration attacks (thanks Masato Kinugawa and File Descriptor AKA XSS Jigsaw for reporting).
  • User-facing "Reload the current tab only" option (in the "General" tab).
  • Experimental "Allow HTTPS scripts globally on HTTPS documents" mode (thanks the Tor Project for RFE).
  • New NoScript Options|Advanced|Trusted|Cascade top document's permissions to 3rd party scripts preference for users who prefer the convenience of whitelisting just the top-level domain to make everything work on the fly over the higher security provided by the default finer-grained policy.
  • New NoScript Options|Advanced|Untrusted|Block scripting in whitelisted subdocuments of non-whitelisted pages prevents scripts from running in iframes even if whitelisted, unless the top-level document's site is whitelisted as well.
  • Fixed XSS false positive in the new gmx.com webmail login and in other services (e.g. mail.com) using the same back-end.
  • Better compatibility with script inclusion enforcers such as Require.js.
  • Safer toStaticHTML() implementation (thanks .mario for reporting).
  • Several XSS filter improvements (thanks Masato Kinugawa for reporting).
  • CAPS-independent, finer-tuned version of the "Allow local links" feature.
  • Better ClearClick compatibility with recent Youtube changes.
  • New Script Surrogate for addthis.com scripts emulation.
  • Fixed bugs in regexp-based embed blocking exceptions (thanks barbaz for reporting)
  • Fixed ClearClick incompatibility with latest Google+ based Youtube comments system.
  • No Google Analytics, because NoScript blocks every cross-site request to GA, no matter the type or the file name).
  • New "Security Downgrade Warning" suggests blacklist mode as a better option than uninstalling, in order to retain scripting-unrelated protections.
  • Improved Google Analytics Surrogate, makes more sites work correctly with google-analytics.com blocked.
  • Holding the left mouse button down on an absolutely positioned page element and hitting the DEL key will remove it if scripts are disabled (useful to forcibly kill in-page popups). This feature can be disabled by setting the noscript.eraseFloatingElements about:config preference to false.
  • Right-clicking on NoScript menu items copy site domains to the clipboard (useful for reporting and investigating sites, thanks Tom T. for RFE)
  • Browserid.org has been added to the default whitelist.
  • "Click to play" protection against WebGL exploitation, now also on whitelisted sites (can be enabled in NoScript Options|Embeddings)
  • Security and Privacy Info page is shown whenever you middle-click on sites exposed by NoScript's UI, either in the menus or in the Whitelist options tab.
  • Middle clicking NoScript's toolbar button temporarily allows all on current page.
More in the changelog...

Experts do agree...

03/10/2014, Edward Snowden endorses NoScript as a countermeasure against state Surveillance State.

08/06/2008, "I'd love to see it in there." (Window Snyder, "Chief Security Something-or-Other" at Mozilla Corp., interviewed by ZDNet about "adding NoScript functionality into the core browser").

03/18/2008, "Consider switching to the Firefox Web browser with the NoScript plug-in. NoScript selectively, and non-intrusively, blocks all scripts, plug-ins, and other code on Web pages that could be used to attack your system during visits" (Rich Mogull on TidBITS, Should Mac Users Run Antivirus Software?).

11/06/2007, Douglas Crockford, world-famous JavaScript advocate and developer of JSON (one of the building blocks of Web 2.0), recommends using NoScript.

03/16/2007, SANS Internet Storm Center, the authoritative source of computer security related wisdom, runs a front-page Ongoing interest in Javascript issues diary entry by William Stearns just to say "Please, use NoScript" :)
Actually, NoScript has been recommended several times by SANS, but it's nice to see it mentioned in a dedicated issue, rather than as a work-around for specific exploits in the wild. Many thanks, SANS!

05/31/2006, PC World's The 100 Best Products of the Year list features NoScript at #52!

Many thanks to PC World, of course, for grokking NoScript so much, and to IceDogg who kindly reported these news...

In the press...

Download in a Flash... with FlashGot! Proudly hosted by easyspeedy