On 7/13/25 16:44, Michael Ewan wrote:
How about the developers console in the browser and look for what
Xfinity expects to see, it used to be that you could fake all kinds of
stuff in the browser to fool the IE only sites.
In Firefox, clicking on the hamburger icon > more tools offers Browser
Console. That brings up the following:
---------------------------------------------------------------------------------
1752452115816 addons.xpi WARN Force scan SCOPE_PROFILE
(app-system-addons location missing from XPIStates)
1752452115819 addons.xpi WARN Checking
/snap/firefox/6495/usr/lib/firefox/distribution/extensions for addons
1752452115820 addons.xpi WARN Checking
/snap/firefox/6495/usr/lib/firefox/distribution/extensions/locale-en-US
for addons
HTTPS-First Mode: Upgrading insecure speculative TCP connection
“http://www.jigzone.com/ <http://www.jigzone.com/>” to use “https”.
WebGL context was lost. 2 Troubleshoot.sys.mjs:727:17
---------------------------------------------------------------------------------
That looks like something that could be useful, but I have no idea what
to do with it. Recommendations?
--
Regards,
Dick Steffens