Hi Joni and Betsy, thanks for putting those up. I looked over them and they look great! A few nits:
To evade the cost, cryptojackers deploy these scripts on other people’s computers without their consent to leach energy and power. Tracking content
That video contains trackers. on (https://support.mozilla.org/en-US/kb/trackers-and-scripts-firefox-blocks-enhanced-track?as=u&utm_source=inproduct#w_tracking-content): Technically it would be more correct to say "The code that loads the video contains trackers"
If parts of a page don’t work or appear, open the shield to turn protections off. This will allow all content to load, including its trackers.: Maybe a link to the other article about turning off would be good here?
Check the email address in the sender's field. Firefox Monitor emails will always come from firstname.lastname@example.org. That seems like really bad advice. It is trivial to spoof the sender of an email.
I'm not sure what the exact threat model for spoofed monitor emails is, so take my advice with some caution, but I presume the biggest issue could be pretend "breaches" that lead to sites that ask you to verify your email and password in order to see if they were "really breached". In this case it's probably a better idea to call out that we will never ask for passwords or other personal information (apart from the initially entered email address) and that users should always make sure that links from these emails really lead to "monitor.firefox.com" directly. In doubt it is always better to type "monitor.firefox.com" in your address bar.
Let me know if you have any questions!