mirror of
				https://github.com/arkenfox/user.js.git
				synced 2025-11-03 23:35:26 +01:00 
			
		
		
		
	59 deprecated/removed prefs [part 1]
This commit is contained in:
		
				
					committed by
					
						
						Thorin-Oakenpants
					
				
			
			
				
	
			
			
			
						parent
						
							2a402310cc
						
					
				
				
					commit
					3192027f52
				
			
							
								
								
									
										60
									
								
								user.js
									
									
									
									
									
								
							
							
						
						
									
										60
									
								
								user.js
									
									
									
									
									
								
							@@ -188,12 +188,8 @@ user_pref("toolkit.telemetry.shutdownPingSender.enabled", false); // (FF55+)
 | 
			
		||||
user_pref("toolkit.telemetry.updatePing.enabled", false); // (FF56+)
 | 
			
		||||
user_pref("toolkit.telemetry.bhrPing.enabled", false); // (FF57+) Background Hang Reporter
 | 
			
		||||
user_pref("toolkit.telemetry.firstShutdownPing.enabled", false); // (FF57+)
 | 
			
		||||
/* 0333a: disable health report ***/
 | 
			
		||||
/* 0333: disable health report ***/
 | 
			
		||||
user_pref("datareporting.healthreport.uploadEnabled", false);
 | 
			
		||||
/* 0333b: disable about:healthreport page (which connects to Mozilla for locale/css+js+json)
 | 
			
		||||
 * If you have disabled health reports, then this about page is useless - disable it
 | 
			
		||||
 * If you want to see what health data is present, then this must be set at default ***/
 | 
			
		||||
user_pref("datareporting.healthreport.about.reportUrl", "data:text/plain,");
 | 
			
		||||
/* 0334: disable new data submission, master kill switch (FF41+)
 | 
			
		||||
 * If disabled, no policy is shown or upload takes place, ever
 | 
			
		||||
 * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1195552 ***/
 | 
			
		||||
@@ -359,12 +355,6 @@ user_pref("browser.ping-centre.telemetry", false);
 | 
			
		||||
 * [1] https://en.wikipedia.org/wiki/Pocket_(application)
 | 
			
		||||
 * [2] https://www.gnu.gl/blog/Posts/multiple-vulnerabilities-in-pocket/ ***/
 | 
			
		||||
user_pref("extensions.pocket.enabled", false);
 | 
			
		||||
/* 0511: disable FlyWeb (FF49+)
 | 
			
		||||
 * Flyweb is a set of APIs for advertising and discovering local-area web servers
 | 
			
		||||
 * [1] https://flyweb.github.io/
 | 
			
		||||
 * [2] https://wiki.mozilla.org/FlyWeb/Security_scenarios
 | 
			
		||||
 * [3] https://www.ghacks.net/2016/07/26/firefox-flyweb/ ***/
 | 
			
		||||
user_pref("dom.flyweb.enabled", false);
 | 
			
		||||
/* 0512: disable Shield (FF53+)
 | 
			
		||||
 * Shield is an telemetry system (including Heartbeat) that can also push and test "recipes"
 | 
			
		||||
 * [1] https://wiki.mozilla.org/Firefox/Shield
 | 
			
		||||
@@ -792,14 +782,6 @@ user_pref("network.stricttransportsecurity.preloadlist", true);
 | 
			
		||||
user_pref("security.mixed_content.block_active_content", true);
 | 
			
		||||
/* 1241: disable insecure passive content (such as images) on https pages - mixed context ***/
 | 
			
		||||
user_pref("security.mixed_content.block_display_content", true);
 | 
			
		||||
/* 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests (FF51+)
 | 
			
		||||
 * Allow resources from domains with an existing HSTS cache record or in the HSTS preload list
 | 
			
		||||
 * to be upgraded to HTTPS internally but disable sending out HSTS Priming requests, because
 | 
			
		||||
 * those may cause noticeable delays e.g. requests time out or are not handled well by servers
 | 
			
		||||
 * [NOTE] If you want to use the priming requests make sure 'use_hsts' is also true
 | 
			
		||||
 * [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1246540#c145 ***/
 | 
			
		||||
user_pref("security.mixed_content.use_hsts", true);
 | 
			
		||||
user_pref("security.mixed_content.send_hsts_priming", false);
 | 
			
		||||
/** CIPHERS [see the section 1200 intro] ***/
 | 
			
		||||
/* 1260: disable or limit SHA-1
 | 
			
		||||
 * 0=all SHA1 certs are allowed
 | 
			
		||||
@@ -982,8 +964,6 @@ user_pref("plugin.sessionPermissionNow.intervalInMinutes", 0);
 | 
			
		||||
 * [NOTE] You can still over-ride individual sites e.g. youtube via site permissions
 | 
			
		||||
 * [1] https://www.ghacks.net/2013/07/09/how-to-make-sure-that-a-firefox-plugin-never-activates-again/ ***/
 | 
			
		||||
   // user_pref("plugin.state.flash", 0);
 | 
			
		||||
/* 1804: disable plugins using external/untrusted scripts with XPCOM or XPConnect ***/
 | 
			
		||||
user_pref("security.xpconnect.plugin.unrestricted", false);
 | 
			
		||||
/* 1805: disable scanning for plugins [WINDOWS]
 | 
			
		||||
 * [1] http://kb.mozillazine.org/Plugin_scanning
 | 
			
		||||
 * plid.all = whether to scan the directories specified in the Windows registry for PLIDs.
 | 
			
		||||
@@ -1047,8 +1027,6 @@ user_pref("media.getusermedia.screensharing.enabled", false);
 | 
			
		||||
user_pref("media.getusermedia.screensharing.allowed_domains", "");
 | 
			
		||||
user_pref("media.getusermedia.browser.enabled", false);
 | 
			
		||||
user_pref("media.getusermedia.audiocapture.enabled", false);
 | 
			
		||||
/* 2023: disable camera stuff ***/
 | 
			
		||||
user_pref("camera.control.face_detection.enabled", false);
 | 
			
		||||
/* 2024: set a default permission for Camera/Microphone (FF58+)
 | 
			
		||||
 * 0=always ask (default), 1=allow, 2=block
 | 
			
		||||
 * [SETTING] to add site exceptions: Page Info>Permissions>Use the Camera/Microphone
 | 
			
		||||
@@ -1174,8 +1152,6 @@ user_pref("dom.popup_maximum", 3);
 | 
			
		||||
 * default is "change click dblclick mouseup pointerup notificationclick reset submit touchend"
 | 
			
		||||
 * [1] http://kb.mozillazine.org/Dom.popup_allowed_events ***/
 | 
			
		||||
user_pref("dom.popup_allowed_events", "click dblclick");
 | 
			
		||||
/* 2416: disable idle observation ***/
 | 
			
		||||
user_pref("dom.idle-observers-api.enabled", false);
 | 
			
		||||
/* 2418: disable full-screen API
 | 
			
		||||
 * false=block, true=ask ***/
 | 
			
		||||
user_pref("full-screen-api.enabled", false);
 | 
			
		||||
@@ -1829,7 +1805,7 @@ user_pref("dom.workers.sharedWorkers.enabled", false);
 | 
			
		||||
user_pref("browser.sessionstore.privacy_level_deferred", 2);
 | 
			
		||||
// ***/
 | 
			
		||||
/* FF46
 | 
			
		||||
// 0333a: disable health report
 | 
			
		||||
// 0333: disable health report
 | 
			
		||||
   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1234526
 | 
			
		||||
user_pref("datareporting.healthreport.service.enabled", false); // (hidden pref)
 | 
			
		||||
user_pref("datareporting.healthreport.documentServerURI", ""); // (hidden pref)
 | 
			
		||||
@@ -2061,6 +2037,38 @@ user_pref("browser.casting.enabled", false);
 | 
			
		||||
   // [-] https://bugzilla.mozilla.org/show_bug.cgi?id=1401238
 | 
			
		||||
user_pref("browser.bookmarks.showRecentlyBookmarked", false);
 | 
			
		||||
// * * * /
 | 
			
		||||
// FF59
 | 
			
		||||
// 0333b: disable about:healthreport page (which connects to Mozilla for locale/css+js+json)
 | 
			
		||||
   // If you have disabled health reports, then this about page is useless - disable it
 | 
			
		||||
   // If you want to see what health data is present, then this must be set at default
 | 
			
		||||
   // [-] https://bugzilla.mozilla.org/1352497
 | 
			
		||||
user_pref("datareporting.healthreport.about.reportUrl", "data:text/plain,");
 | 
			
		||||
// 0511: disable FlyWeb (FF49+)
 | 
			
		||||
   // Flyweb is a set of APIs for advertising and discovering local-area web servers
 | 
			
		||||
   // [1] https://flyweb.github.io/
 | 
			
		||||
   // [2] https://wiki.mozilla.org/FlyWeb/Security_scenarios
 | 
			
		||||
   // [3] https://www.ghacks.net/2016/07/26/firefox-flyweb/
 | 
			
		||||
   // [-] https://bugzilla.mozilla.org/1374574
 | 
			
		||||
user_pref("dom.flyweb.enabled", false);
 | 
			
		||||
// 1242: enable Mixed-Content-Blocker to use the HSTS cache but disable the HSTS Priming requests (FF51+)
 | 
			
		||||
   // Allow resources from domains with an existing HSTS cache record or in the HSTS preload list
 | 
			
		||||
   // to be upgraded to HTTPS internally but disable sending out HSTS Priming requests, because
 | 
			
		||||
   // those may cause noticeable delays e.g. requests time out or are not handled well by servers
 | 
			
		||||
   // [NOTE] If you want to use the priming requests make sure 'use_hsts' is also true
 | 
			
		||||
   // [1] https://bugzilla.mozilla.org/show_bug.cgi?id=1246540#c145
 | 
			
		||||
   // [-] https://bugzilla.mozilla.org/1424917
 | 
			
		||||
user_pref("security.mixed_content.use_hsts", true);
 | 
			
		||||
user_pref("security.mixed_content.send_hsts_priming", false);
 | 
			
		||||
// 1804: disable plugins using external/untrusted scripts with XPCOM or XPConnect
 | 
			
		||||
   // [-] (part8) https://bugzilla.mozilla.org/1416703
 | 
			
		||||
user_pref("security.xpconnect.plugin.unrestricted", false);
 | 
			
		||||
// 2023: disable camera stuff
 | 
			
		||||
   // [-] (part7) https://bugzilla.mozilla.org/1416703
 | 
			
		||||
user_pref("camera.control.face_detection.enabled", false);
 | 
			
		||||
// 2416: disable idle observation
 | 
			
		||||
   // [-] (part7) https://bugzilla.mozilla.org/1416703
 | 
			
		||||
user_pref("dom.idle-observers-api.enabled", false);
 | 
			
		||||
// * * * /
 | 
			
		||||
// ***/
 | 
			
		||||
 | 
			
		||||
/* END: internal custom pref to test for syntax errors ***/
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user