Limitations

Whilst these limitations are not necessarily deal-breakers, it’s good to be aware of them.

Citadel does not:

  • protect against detection countermeasures by sophisticated and / or malicious users
  • detect threats using heuristic analysis of behavior or page content
  • perform virus scans on files
  • filter all outgoing connections (it filters HTTP, HTTPS, WS and WSS, but not for example QUIC)
  • filter IPV6 traffic (contact me if you find a reliable IPv6 blacklist)
  • detect perfectly if sites are “authenticated” (the heuristics use header names, cookie names and URLs)
  • analyze all use of passwords (only forms with “password” fields, not Basic Auth passwords or use of navigator.credentials API)
  • know at all times which account is being used (just the last one that it detected)
  • guarantee that reports are generated as planned (ex. if machines are turned off, they only report when turned on again)
  • generate one report per user (since users may have multiple machines, or even just multiple browsers or profiles within a browser)
  • manage the duration of “session” cookies (if Citadel would set their expiration date that would store them, which is also problematic)

Be aware that Firefox has a “safe mode” or “troubleshoot mode” that allows users to disable all extensions, even if they were “force installed”. Firefox also does not allow automated disabling of extensions.