On 7/13/25 16:44, Michael Ewan wrote:
How about the developers console in the browser and look for what
Xfinity expects to see, it used to be that you could fake all kinds of
stuff in the browser to fool the IE only sites.


In Firefox, clicking on the hamburger icon > more tools offers Browser Console. That brings up the following:

---------------------------------------------------------------------------------
1752452115816 addons.xpi WARN Force scan SCOPE_PROFILE (app-system-addons location missing from XPIStates) 1752452115819 addons.xpi WARN Checking /snap/firefox/6495/usr/lib/firefox/distribution/extensions for addons 1752452115820 addons.xpi WARN Checking /snap/firefox/6495/usr/lib/firefox/distribution/extensions/locale-en-US for addons HTTPS-First Mode: Upgrading insecure speculative TCP connection http://www.jigzone.com/ <http://www.jigzone.com/>” to use “https”.

WebGL context was lost. 2 Troubleshoot.sys.mjs:727:17
---------------------------------------------------------------------------------

That looks like something that could be useful, but I have no idea what to do with it. Recommendations?

--
Regards,

Dick Steffens

Reply via email to